Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:39

General

  • Target

    $PLUGINSDIR/nsRandom.dll

  • Size

    77KB

  • MD5

    d86b2899f423931131b696ff659aa7ed

  • SHA1

    007ca98f5d7921fe26fb9b8bd8a822dd5ae09ed6

  • SHA256

    8935cba8e9b276daa357a809e0eca3bebf3fdc6d0d3466ab37fb2cbbfacd3a94

  • SHA512

    9a4437ab484e4e22597c642d21b0107a063a208a582df3a5bf276466ad8d0ba9aeebac6de8dcf1372939984bb187d58e94c799918cfbe80e85c958bf0a537fc7

  • SSDEEP

    1536:/lKXi95r2UwOpUtoqoQvfDrghNT+2w8mbJ1/NfSttVx:sgr2eGoqVvbaNXubJ1JI

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsRandom.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsRandom.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2012
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 232
        3⤵
        • Program crash
        PID:1116

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    41ce7f9363acb8d666f98bd4fcdf3cd2

    SHA1

    a137778ad1ae103918ba6a133a19873164b8b6e1

    SHA256

    dec10b96123132858b3f1857aa0d935fbd6d2dcfebb1afb768be72fb24092025

    SHA512

    b13035dd8cbaf446a449c75940b2ef80c6b9f2dd96c69ad527bea6fd0b285fd1aa662a1cf8cdd0ddcdedd8f4afb0b169ecfe20fa653a2d4435bf7e988ad0f7b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f131820b06e5149535cd4a500d38d4ab

    SHA1

    a0967626134ec78e5debdb07a7c60879c5ca92c4

    SHA256

    48f9413811fef503e1d3a086521d104400e871ffaa46d0cb7111954c4c6f632b

    SHA512

    c4db8dcbffbc62b48bad1ebf219fb582471760d449329177fa960de2b1e8dbc91178ce1b7b6b9f1309635cb223e5552eecce21f1ce412b54598fe612170abb2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    54b04eb107e3ff1e31442a1534e9b8b6

    SHA1

    99c2dec6a4fd52d3783fca3df92c852813fef8e9

    SHA256

    00aaef35ba1d5f6137d5b0386746c40ee6c081bc97da904f8aae67852b20512b

    SHA512

    ef55441c4aa9a6ee96c5dba75594417c5f5e0446f59aafeec2fe6f2ddbad168fdfc3ccb70df2c14e20987037264a82e8d514de4b6fa8bc992415237beb05935c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    08e324b01815f565acb133aad190201a

    SHA1

    9a0922777edc413d1d3256109cdff77fc0722b80

    SHA256

    ae8dc7561a6286857aa960021e520dbc664658bdc717fea55f9be6f77f5690b6

    SHA512

    6afc3291136ca68e5a7591b84c746da053bcd84a979859be9138a1c992f2f178a3fd7dcd28cc362adf5126f0cd48c55ce8f5c68e5335736574b2b5a58b16befd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d6608f0810a471d5e9de1270e0092f68

    SHA1

    96d8d7ded8289f43bec4e4aeb61b5fe23aeeb13c

    SHA256

    782adf66daa0d0b80023368407a8b2b8d4d27874d4bb77ae6c44b40cc089c0d5

    SHA512

    6b146fc49af1d3fa9b0696a4cc106765a8521a6924e7c6fedb315b13c04ef5079ce1093c9b8f68e1222b70e4b79d24bbe0dc19830679a155987a84ad27434bd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    57fd83252b1d926f21ad7c92b6cee791

    SHA1

    acc3e4f916aed6d2fb7b5fdadd8b471138b3b8a7

    SHA256

    3a01f1e8987e8925ae1a20a0ac3224fd2bf0ba538d5b773b0df76bb9cce0794b

    SHA512

    53ff2c95db40bc75268232affa82c55a85634b2805068db70a48b0e31403532c40134c04e83d2dcc700a929a346deed1f7bccec4d0aafebbd1b6c0ecc2236144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0df0730250074cbdce7e196c012b2c2e

    SHA1

    d1c86e75936e8c8658c45f0b77f66bd2b10356eb

    SHA256

    09b80423b67e94bcc1e970a2ea9bd910050e6640a597df468e1a9eead103bd81

    SHA512

    40dfe0ba4a78fb55579139069a3385de015e71cce1e2cc5f0253e1e80db2358a374ae49985ab37ef93fc4918ef604266bdb52d446a2bb81e7e0f03cfb4d7a8f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6f8a16226cf45a1dbe6b675c7252f658

    SHA1

    ab8d56928ff16f27f3d16624edac3dc9649338d1

    SHA256

    b505355a573bdda583fc4e4eb0a21d96c8a1a3d12ed72772ffafd04abdb21f4e

    SHA512

    ec10385e23c7f0834614ff82eb433cc74fc4f0388a6f8aeed4873ab4e78d7072c8afb952e8e5ce274dbf36929c1d46258a510547dce4f9241ef0d2a6d051e53c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e49f3fbf309e3b8714250c6ba691463a

    SHA1

    5806d7ef9f2671c79eff16226e3c96f365b66457

    SHA256

    31f7d5d24c632f2142709c16ddb265b1a2efcd939043dfb9a836a8ff6c7cbbc2

    SHA512

    948ec03d88b3be8991a6fc40d48de16b1bb39ecf22ed841ba12988a37a4a99405d227db8e065120671f33b0095a6c284ebf1cd081276fbdc950a489756d3e943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fd81311a5801c77bb94ccd2cb03497b6

    SHA1

    91a2528eb35ff6402ce3405f805ae92d0bfa4412

    SHA256

    7f932f234733090291cfd8a4e7a67059a2655a02a74a572b66b9eb8d52bbf248

    SHA512

    9d9ecc272cf8008a702ce2bbd63b604b3841c540b6dafad8615170ee8d1e17adbf1c1b3fa22e783315eb30b180abe1c948dd0cef0d945c74caee564c0e1404fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e2bc353a2a5203d6b841cb531c5e2f54

    SHA1

    0cadf4b0a798870ca9c55fa6d2bcf1469b5f2dc7

    SHA256

    a9a1bd8734e2a72d0df7fbcc9dd7bb81de623e04174d527100248e7d394a4260

    SHA512

    9a573665f863b376eda6066a8e4f0762e776ee37437cd74dac3653303a300bfc6614841c68f932aae22a53c8de33debe7da032dc5720f683a127eb5e71b1c145

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    df2e2472f35f73c663c679a09f1a8f2b

    SHA1

    228a898e4579511773750897437184a17fe809d1

    SHA256

    139759b1ca4648dadaf2912c1774bae15ab89e55313304c6dc13203fc39f63b9

    SHA512

    e91d7e3e5e0e2be4a45a6c1a48546ea8bd655f853f67d567e5049b7831dd10ba90464f9e0b74dbe213b9e02f3d5bb7093a561d787d3e1d1d539ae56eaf2861ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a4739c7ccde388a079b8247b35dbb49c

    SHA1

    d9e07b68fd237e0014064bb26aeaf06f309f17c6

    SHA256

    1c2ff0193e3c096017b5b272abb89087dbdc3d316fb30dcec4e8518681c972f0

    SHA512

    4068a97a3941b22c40bc572630ee5f427c7e866c80f05c0f70e5e168cba952f31c415df44f6d26269e846e22fe93bbeea8038a45eb50fdf2c83e79a96a9f0547

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a708883ca7474182afc2a8090a4691f9

    SHA1

    7b3b075b343bc46e812af65db72d1f64cd57699d

    SHA256

    97970086b7c1169406347df5584bdf24b99d940e006d111e1b2dea6f93d54c3f

    SHA512

    e87cc69de826bd93d095da014d6ad14168912b7506d14828734b3a4f7c371e1613f2d8c5e1aad1b33ad153c5585dcb4b09152a52026a91b028ac50a5f041f64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    90a2f888a84c122f0f25dd01339949c3

    SHA1

    83dc337259cd38077d15e9aa1a8194733eaf13e7

    SHA256

    8cb2875e940abef8e4af41d3ff0b7e934f1debab7a2c015e0216d8d0ee76b59f

    SHA512

    fd27e50e574b511b4376bb2a3f48a2de9cb79f37ccf990f7f681c049aefbab1169c686e5880d276b417e39e1586c5ecdd456f751abf945ec80a223c66f36acf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e4a06ae15a5c68405b26e35cb8beb1ba

    SHA1

    a161575ffe1a7b4481e8a0c26bc242ca13175513

    SHA256

    6427c72e152a844de691b3fb5a12c834b1c5ccedee4c501814fc12009a8c3bc8

    SHA512

    0030f160a13ebe214e41099d999761c3df8304a286e38199bcb83de430539e0209d31e113cbe2b84c9d71e66d15c7fbcbdc58f86d67a3f2c8e682a831b4e8451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    131c15348d94ac499ea22174dff73106

    SHA1

    01cab5e6c75266b876d9f1e93789e3817fcb79e0

    SHA256

    c0d2d207e409cc9f0cfd3ba2d233e6e3fc3a1acb37ce2eaf98b10f0090fe9b3e

    SHA512

    f5c6bda2de5abaebb555cf4953ca4b75bb71ef2ce9606e7f83316212f1a279b2a9e4b481f971ac1ab31515c1b08dc7b12d71d38e58c87dcbc93b6e92d87998c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    915c85cfbbac6da22acab170b024ec1e

    SHA1

    5fb27decb1e9bea633c689d48b886f243a999f18

    SHA256

    4365ba35f8c7d1e81358cdd72eeb797b5c36675aeb77d31a948528b4f766f060

    SHA512

    2556b1ffa369d1a0f947e5d6da0aa045e6b0cd60a834c8849a3eb4bbc03ccaf49dd51a6823c4a32f9631ddd8be2f98594f2e040c8cab7c5fabe3927a145cfc6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c1fb6bb0324e038266430256a360ec24

    SHA1

    9d3ccf6a085012221f10cd75f17601224e31994d

    SHA256

    ffedd668cc09c125c49e07a6ef4b987ccafd6087c68eeafb7b1d0f7fdbaf7a46

    SHA512

    583acbc6654d3e4087992134f03183874f6f0926cc04bbecd423982a6a103944e7441ae0194fc2b38d3d5c106332de6c71a9b7d602de1e9e6b2483da64ea240c

  • C:\Users\Admin\AppData\Local\Temp\Cab6BDE.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6C8F.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2368-19-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2368-18-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2368-17-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2772-8-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2772-9-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2868-1-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB

  • memory/2868-450-0x00000000001D0000-0x00000000001FE000-memory.dmp
    Filesize

    184KB

  • memory/2868-3-0x00000000001D0000-0x00000000001FE000-memory.dmp
    Filesize

    184KB

  • memory/2868-242-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB