Analysis

  • max time kernel
    134s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:39

General

  • Target

    $TEMP/$_89_/MyNsisSkin.dll

  • Size

    384KB

  • MD5

    a6039ed51a4c143794345b29f5f09c64

  • SHA1

    ef08cb5dfa598d9d5b43b8af49f54b2c7dac00d4

  • SHA256

    95ae945504972cadcf2ccfb2b3d02ea8cade3ee53f2f2082e8b40b61f660877a

  • SHA512

    0ed3d0c070bfd91e2355aec5a30ad5cbaf6949c965af5e0ee1ecf2edd5f5aeba3819b4667a0301f8b52c8fd56d3bae35fa4f77063d56c8f89055784d0c0a30a8

  • SSDEEP

    6144:yOrNKQjNQnWqJolkFucBm1fXr9ICcYerKJbYm3IyU5qVvWIdjI:y4NKQjNQfqOuEm1fXncdrKJbJgtIdj

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\$_89_\MyNsisSkin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\$_89_\MyNsisSkin.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2956

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5907978b0ef55c66b3e389e5d4b57f74

    SHA1

    5fabde3fc65afd1f6206e38ac7ab28cd5731f37a

    SHA256

    0b2a7454cb4625a7b3948d6167fe062324ee2b3b1a8ecc2012700b882614451c

    SHA512

    41f9c5f21581205a3cc1f703b520abf130c254cdb63c735fc8ab547c9f2e39c41624eab15479544b422722c4d4fbe2bb3ea12f701f36e42a447ac8411540f815

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6b751e2420650a5806aa33eaee1be10b

    SHA1

    90aaa455fec01bcff17bfde39c4c68e5db123a44

    SHA256

    260b620c36a83732b47a082f1dcefb4977d52ff95e009165ad6321f5122094b0

    SHA512

    886307dede21d330a297ae52b2e4942f01cae09897ee78907108ad0d5b380065f161b4f87a83a3b90408d079e0f14f1c531e121425407490531039744b385e3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    53b15509ffa40648216655364cdc2c06

    SHA1

    3c0a3ac60a01bad1ba9c21f43d2fd8169351d8a7

    SHA256

    6cfc34f71c9e53b4f110a55b8f82b3fddcead45002406f4fd99f906d37ae85d7

    SHA512

    7ecd13546438293acf56387ab5812762611549ea4519c62db4943b353f41db44dc65ee56ab45c54352f7cfccd5fc1e3476f1984dcbaf6608d5ad91c251eef8d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7f2eb35e0eb0e12373482420789cfccb

    SHA1

    b067b8c9179c2b96ac5a535067f3a6725d5d61b0

    SHA256

    7b408c8ec6d24a2be758ddaebc864f8a226a720f21f2603b39c42f62d3283abe

    SHA512

    980ce29a23d734fce3d1a166903d7b6a794b7da93aaa1f909f3751fd403ac24b58e2a333c297ace5e4035a00c55e6963412131fffabe90707390dd4be9729058

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f750ba999eb68a113cd0e162154fb3f7

    SHA1

    5adcde54567271ba02d01ae99456ff846491ecc6

    SHA256

    38215fca0465843c8d20670da795d7a3a8507fdea9ce5a52cc1928a5ab13be09

    SHA512

    4ec3cdc31fbff7769ff003fee53b5456c87fdca92f21039211ecdda5bd44c833b809307a2e11a6d68240369499888bfd50ac624c874efe922cc7d5ab79843fd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    532de1131aff3bcb5b67899e002d7d72

    SHA1

    a696780e767559d6a492733de9594e3e37fe41d2

    SHA256

    39185978736470f64f2901b8d6477c344a51ba129e988f0b22e220b515ac0e78

    SHA512

    5acf670bf4dc73a5a4c5a6796abd6ee014a7272aa99984e5051c68a21e1c724c35d51d660aad66c689d4b35141f717b397d442325e1988045f20637648df0e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    35e174b06cfe69843b95149ecddf223d

    SHA1

    5360696b2345c28171c9de1a973a26d3be7cff42

    SHA256

    12596cd30f870f5e9ea78f27f3b498af49ef8f1ffeb9bda739d96178a459ff6c

    SHA512

    2d757853bd022c883868e4685a3ec1c0ea7042bfdb95df3dce7a0642a21e48a3c92a800392eb9220552836ac415cc870fcfc301be20e221bb0c4b9fe0f6edb94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    22f0c573d6e559f35846f7f9751b4b4e

    SHA1

    eaa6c2c24a9737bce7911caf773bd3b7d26a0529

    SHA256

    17833f4fe33e68cf37b4ea02d6fbcdca435ea933d69904361053a90ce8bc12bb

    SHA512

    2f2acf03e7f2f54b1718ad37a22ad72457c282b59e87208d8c962cb20ebb8b0b57084320c54d6fff1e9334089f50b592de47c12ad5980cc7ecccc24c9ed4cee6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f63ba2fe0d50c4817b34d5592c39cf43

    SHA1

    996b97c61ecbdeecbae18d78fb2b81204d3b639f

    SHA256

    76635abbd2e65c772d9546621aac05ea34a8932b56e93ff85f80c268c98e352c

    SHA512

    d003c59838f733b73651d87e21a9dba3afce89c7ca6de8cf4f4fffc0ff01d8656cb11ffd62a8a5bf0652c3cfcecc20d4908dae3943cc3b988647ef429a488861

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c232f1d1cb3f4c8ee27474b146a78a24

    SHA1

    8b905b96027d0666785f9a33fd58fe3c34538fdd

    SHA256

    26037ade89b4f892830af93f063035c0eb6f52b76a377cff98473266f42fc46c

    SHA512

    1902cb6aaa75fc85a04bc11e5f67dc43dd059dc140e3d1060485d0a420587c6b1458d4503bc02482fe65f913628e519f3c6944118a10fa384f6707070d3512ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8b2199c0fb0b5b6b30d8eeaa7bbfee83

    SHA1

    c1c27a6bdbd1d98ed1165e34af08a810c4c788cc

    SHA256

    d1792f15a76b59bc22b2b6cda0bade4e755bd43086ecac79d02df006cc5b1e90

    SHA512

    942b1986481c11e29a8ef82baf27d9b2937a205612a2e80d006aae75150f97edb521913887dfc11a928bccae81cf4b63590e76c22b807969b9d0304ed0592b96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    08754dbcd18b819d57d189cc770fb99a

    SHA1

    cb793e1f7774a11e91e8d9264d6d757c88be1af3

    SHA256

    812e5867b7e9ac1ba3be2eb6501516c801e20a1d94b84726516d04d28a64b317

    SHA512

    7b2f197bb7c0a13707965ffd983278ead1e628f20d90f14484a5c945ef6f2c1452fdbb00e8c0982b0935a58131185477db0ba783f0b2ad1450912b7705b663c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    188d2eaaebc8f20a3b9d1a09854c74b0

    SHA1

    e41a42f902c7181ced6dac6e5357aea92d013bd7

    SHA256

    8d93ed053a592457509abb37c61d09dfe5411046e4a3ba7c4f91aa542b413175

    SHA512

    b5e1087a26f3341ae253000fad500361dd15b450dad2bf8779b9bc37c76821c9c8445ce452f9b69969d6dee1ba01ae3dd98d6af98e9e7554b28c7c4c363099d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    af37ab035b64aad65a4abde0f8ba559d

    SHA1

    32c81e1ef13a3907eaa41ca1ba4a4bbb0d7fb6b3

    SHA256

    2bb29c4eb1edd964e9c988d183064e08a5505d7a26bf1731990b9065d1635449

    SHA512

    5ff6f60c225bc7171ca8b792240a90cee99456ec228d70496de338b760216e02eb880d37d6bced80f45f1e6b15e7b530591cbf527180f120a1293f8a518fcf36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8e96fc8db175f745ff73b2acd90adc1f

    SHA1

    9a41a4d364a843b1f81373b13abc87a1fb9e8405

    SHA256

    51a5a2c82c27ef0d1015c8bec2a4e4b12969921fd8bca2171ca70f9372abb4c0

    SHA512

    66cb1b50b42ba59356c0ce7184673c6eaf856f7d435bb8b9dd5f92ab883434cc3bb90c0bba118249001753462c32f07ffe6b66878de004866fdcb14731fb6b6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5fb413e11dd3a186b761a4346e6baab6

    SHA1

    615ee67a7253f76e9223c0f86291f4af6c1602b4

    SHA256

    272598955d2370feae6c0c8308df9f0090632ed1066df0835001cd5a785f789e

    SHA512

    2df068417a1db11b14132db9577fc58fa1f121f4487071bc1087725400afb1d35b54ee6f7955735e4684c33bd8c18d7f5d015aa802a6c9f03dabf8d966bc9350

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a973daba6b834dd7e7f98683b1ce7d19

    SHA1

    246b85c22d86c6c89d311e681c77cdc4f7978fb3

    SHA256

    0db729abaa5a7b2c302d361a34717d44fb4902ef1ddea48486fda4e9377d4fa7

    SHA512

    4c428205e319e45217fb8f279e97693931b59fbccdc18466f74e20a78ab8141c4d525f517f1e8454172dc8a41cfbe3d24877537eca965dc8b3a9606eba36fc86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0dd40515f640ef0f90d22d93346fd853

    SHA1

    dc9724d6b795c99d54e5c91704083b3aed027473

    SHA256

    d87c4c01240a335457c559d0d34947662fda07fde04242d3a03bc5c12fc214a3

    SHA512

    36c0338dc916cb5da52373b79586954e33c1f2abc04e51f1d7b21fbe8dc2e7d2f15e295ab9fc28e090ef0295bbf602e9a4d77f65d90dca7f6ab7cb319e7237f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    beff7fef031f4bf1c27abaa3a23f45a9

    SHA1

    c54ca6bf352a770a65afb23bff9923dfccce6126

    SHA256

    c7f7ece07a2d6a0251866dde5d1d8229f35fc4c02c40f5cf2b235be36f069f45

    SHA512

    f1cf717228b6b0443f868866b3761fb3233097b209875e95add9f81118f626dc6090440736aaad9f2639767715d20b2edbc29510a2b324d40b91c80103362c63

  • C:\Users\Admin\AppData\Local\Temp\Cab2BD4.tmp
    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar2CB6.tmp
    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2144-4-0x00000000001B0000-0x00000000001DE000-memory.dmp
    Filesize

    184KB

  • memory/2144-3-0x0000000010000000-0x0000000010062000-memory.dmp
    Filesize

    392KB

  • memory/2144-1-0x0000000010000000-0x0000000010062000-memory.dmp
    Filesize

    392KB

  • memory/2168-11-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2168-10-0x00000000003B0000-0x00000000003BF000-memory.dmp
    Filesize

    60KB

  • memory/2168-8-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3044-23-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3044-18-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3044-20-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3044-21-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB