Analysis

  • max time kernel
    133s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:39

General

  • Target

    $PLUGINSDIR/System.dll

  • Size

    67KB

  • MD5

    bd05feb8825b15dcdd9100d478f04e17

  • SHA1

    a67d82be96a439ce1c5400740da5c528f7f550e0

  • SHA256

    4972cca9555b7e5dcb6feef63605305193835ea63f343df78902bbcd432ba496

  • SHA512

    67f1894c79bbcef4c7fedd91e33ec48617d5d34c2d9ebcd700c935b7fe1b08971d4c68a71d5281abac97e62d6b8c8f318cc6ff15ea210ddcf21ff04a9e5a7f95

  • SSDEEP

    1536:2IfbmtOpUtoqoQvfDrghNT+2w8mbJ1/NfSttVx:bfi4GoqVvbaNXubJ1JI

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 224
        3⤵
        • Program crash
        PID:1448

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4ec8046bcbda0f995db5a4bc13cc3bee

    SHA1

    65378bec017a829d399bb175b9ab0cc291d0be2c

    SHA256

    dacbcdb205020b89a79245d8b4fc132bf105c0901e86d2015ba90f9284ff6d00

    SHA512

    d48ca31701c6df39b85407ccd8317a03cf42c7f20e9d8612c0381e1d5db62085515a32c4838d8725a3415402ea78676c9934260e3d997014215e35345c2da8d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    099d28d94a85a37e0b140361c91e282a

    SHA1

    e47c7e01b52bd3aac2ce06edf8e1486e8f615c8b

    SHA256

    42f9b81204d02c81f7f1c62baa7b2cd884eb6c09d98ae96c2168775e7a035df9

    SHA512

    ec8b1cf9321d642e3f4efddd62c5b89547cb7aeef109f10f2b58026f81b0de87104a38e306615584a47af9399a7304269df6aeba4096cc6d04efff197479ffe8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e549d930f5c70afee08a36d4e0a8fe3e

    SHA1

    5c49a6f91a7819aefeffec8ba0b077b7fd34201e

    SHA256

    7ee678a096da1c20a01655b5465c5196bafede04a009caa62986cfa339590e18

    SHA512

    01fa223bf5968ffca68ca0377cda3c4501f1a9490e244cfcef853476812d95bd9d28373b2d17735033d9d580001ee9a4d256223db12f5ffa821172e77858d75d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    69d3a4ca51b1deca7c16370e914c52ef

    SHA1

    2a31fb4fb5da7b16c17e5c7b9667da9f3818c733

    SHA256

    05d3bea7cc04bc455ecc0e62ff51d78e254e0a30dde8f1aceab84896a4ca5a33

    SHA512

    f9978b81be395ffbc8c38d808475962f0ae069ba9c4416de230f74693ea065a47d09c5eebee5e1c553b72ce13afa9d09b6b0f50a2dfe9a052c30dfef03de5b85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    71ed659c43b2da8fb7c14a90eb57364d

    SHA1

    8233e0e22ef5878f61e8060e62df94eaafec3c51

    SHA256

    fcd462aca11c4aa514b9f1412fad1633394a9ed2b88cc94258dc8c11fa778ceb

    SHA512

    0ba9955ddd8a299d1416b77e50bf3819c73faf4e18d013c1ccaf320cb55abfa7a3485d8c29dad3e8fee2e401288bd9f848b7bfb6632370433ff0efa31284778b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    084f06222648c0bafad05f3a135fbc1b

    SHA1

    566f983934f27157985950b378b99601c684bdd2

    SHA256

    074be1866eb1772884ec5ec7dd1c1aa95604bdfdaac34c5af93e627f156cb149

    SHA512

    f1315fc6bfb9dd5fc8087a2aa38ada09ea437bc706f8b4135b2c0dbdc521bb408922fb3c41fabb4d0f2a43bda97c004e96c50e9053ca2a41df0c6a3cd2066d20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e4912506ff00f9a4863e31de7c7d654c

    SHA1

    1eb05fb59b5c4a5bb41e785ef5e976f7a4420512

    SHA256

    4f3d27da11a24547845f501cc6e3c1ee87a4425b74e577a080b36b0820f66d29

    SHA512

    bfd0e93c272f7078e30c60082575f85ae418f11274fe1fd2019d9c5a1fd16521d37446f77432c23c56ed9c87b305355bea3c81b0896c0da5f36bf914c4ace932

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    358ff08d91393df694a8040ed8686c59

    SHA1

    fe38a1ca9c6db7cb494ea663e4c294574d3dbd5d

    SHA256

    8d0c420796aae286e0594225dde64455462d471c9463332219bb0ae4cd65d1df

    SHA512

    c1e17ad23b124756f709a25add2429336cdc8284a27e1b98170fadf8e79d0688f76ca54a9f44a24ba001bb09d682327ff29ea20b651057c4ca38e77b8086a6d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5131ec3981cf4c1cadb9785771a9e4d5

    SHA1

    4cf698c67e2d723db50b51508e62ee137c599c3d

    SHA256

    26c5fe2513a5e83936cab61324819ebdc6306311ac72c6edee582df2b57709fb

    SHA512

    63d41227186b045298390792a75f201cc9369aa1c90b4af6228644ac14594d307680e23d276e5380c94fe9b1646518e92d796a16487c7a0f0495cb63f9750060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    dc110145b343b3d04e76c499eedccc14

    SHA1

    0e954a1e5efb36296e5619344e4ce1001d351a94

    SHA256

    0c6fb305346fca093e8e6408f9f445868239261f52435f2b068a7c027dc0f56e

    SHA512

    60d5ed9ef540fa27f5812dd29274431bf90f2deac706cd0a4bd35afd6241a90ed7fe48ced52121be166e9b498cde550ce14246a15ca6fd4e1ca84ffa0111b001

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b962b8d9bc31656df4be3d746a097d85

    SHA1

    43382f4d8b404895e549d9be64505e3614c5348e

    SHA256

    f279648c9b933b414610c574c966007bd982b5760b80f6cc069f9bafefabaf43

    SHA512

    b2f7770f2452f2db3d86030e4fa516318104cc697edfed33d1581b0d438a88ce24a39daaac796905cd8c8e094792f3107ff213bb47bb75e78d4be5d3b14d6dfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0910f05ad45f5c7ddde74ccbe7f0e0c0

    SHA1

    764a593d52b2d46373cda05d7fc4b9b9b011fa30

    SHA256

    193e6b4c622344777eff12caa0d12da2fa2660668e1452fbbd1314ac46b602a5

    SHA512

    f33b24e89102a6b5d9c8f12fbca1c98730b67a6185f1d457355e4d09d298d743251e1e2f7e4249e5e46a211b7c6b226a26f89bd35050965610d23a2c0d00c7ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c8ad6c44a963c7d15d1c65fa98836143

    SHA1

    dfb6c955c712fd6658d870570a41a729d58ebcdd

    SHA256

    ca1d05f347a3c5d8282b58bcd810c582a18d3725b8b543e0db096b2e4a5037d7

    SHA512

    2fe47b520fb4235c875d3618a9ae27a513b74914f5746b52643a01dd48ffb13556473248d58916a54a681f79c1a19c1effc0195e7996b67f769861a3d7bb2a75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b4dfbafb898b862e7eb1f68a1b4ffb0e

    SHA1

    93e42e640e49c97d093ff0a640a1dc920b93e526

    SHA256

    f01be33c04197cc6a9bc11b13e38117fa89daa5b58e4f88225ed4fe9820a13fc

    SHA512

    bfd6f898943f1a48c43d3db77827d9b2c3bfff66f9bd47851ee1a97b03a817263f77fca4f692348ec4af9eafa9eef87fc70ce3ddc2bea6849b49cbae32901c09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b87b2890ae9216f9478865df8b1524b0

    SHA1

    22596cff1522f5de751f0b0f2a7a99c63815aff7

    SHA256

    8bfd5b5ef38042cd93865661dedfea234810b69b3abcd433b9c05d7a1f9af680

    SHA512

    36ddf5a54381826116dcbc2c4e3140cc915770e95fc7839797c482723d2ed00ff5986532b2896509f00a67e61cc98de93c0432ff7863d94aa457e356f03fa406

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b87816601d33cd7ac410e16db81a4ff8

    SHA1

    fd92eacb96ee978f57a1430470077519ab67a014

    SHA256

    d1262da857847d8d0a2f06de280697838d3bc0dc96f64516eca4ded5fdd7436b

    SHA512

    8c36b87ec24b57e3fd26862cec04dac036261e778bbe75601b2945c6182f7dc7c1c3cf19fe80319d53f311ac47fef192cfc04fe2e5b856b4ba80d3f030dcda9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8bf2040bfc09455fe4164562877c4b62

    SHA1

    ba576ddd4d67b9e62d9a618f0468376983f4fc00

    SHA256

    8e3e88b8b8ccd93f3cbb012386020cb24ef2b53eb87598cf2bc5b31f98a69a0e

    SHA512

    1c5da251cf265a2dcbc4ad45e0d1baf4b1a6e4765c5c5ca201a9a0b6bf03d72a8192ef51f1d03ea8cdb84d84d0066aac88cdc4f38a6c7f0a8c536877e324fab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2f17aa43761118e8e045a281535e9ac1

    SHA1

    8d23e9da4a11f7f982f5e3cb7b5888f2a76f3e64

    SHA256

    c068a1983b9a37562f5f1386e1a7cdb9d72c9df6a1aeeed34268d032a04098b9

    SHA512

    82c9d4f08ef20ed8ef4b54181c01f7c71c4eba7c4e4e1d8d07c47ee1371f3af902862a3cf780c37da1db766a4dd401531369304f2697cd67a7dfcbb291eebb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3f903db4313e13e1d7b310bb53adb535

    SHA1

    6f246af4f98afe5bad4cb79e0cfe4b62eab7253e

    SHA256

    0231d5bb517ccd454f1be928a1d8ddbcb08b7d3ed4c7409f144e3e823eefb60e

    SHA512

    e6777a0ce108093ec05068da3b0fdbd2ec9e282895252d9b140f4e2de7cc6f03f8c8316ba4984133d6c5d74a37b7dd550ae490817e2c853a96f06cf5a8ddec3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    62bcda3f8978c5249d33059f587f1f05

    SHA1

    08294dbeffcaee65389a2d822fde49c5bbd29556

    SHA256

    88d70751e2f45913961071028109c7925cabeae90cc3661eaefe7149df74bc38

    SHA512

    b5d34b1e057afe9eec534fccf0cd1dd7e641fc296be889c389e242b045157bbc0be757a44d7defddeb1159a65671969e8f1291b0652c2c6ce56331fbdaf43b74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ca11ab677eee28dac04a2a85f0ca7b4e

    SHA1

    12530790c2730b6a612a271adac2af41c573a7c2

    SHA256

    58ddecdef4ad5ab61b65b4ef5300bf0828ae17ba3151337d5af0ca68e59efb83

    SHA512

    43bc0b49ce406dce2bf0fff25d23643c88438316e246b943c3b948b111f3f794ef71b5f9303e65c53f990fa2651e185e01bc27247f3afc441c466b1a85cd2afc

  • C:\Users\Admin\AppData\Local\Temp\Cab3B7D.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3C8E.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1032-9-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2240-495-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2240-3-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2240-494-0x0000000010000000-0x0000000010015000-memory.dmp
    Filesize

    84KB

  • memory/2240-1-0x0000000010000000-0x0000000010015000-memory.dmp
    Filesize

    84KB

  • memory/2584-15-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2584-19-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2584-17-0x00000000001D0000-0x00000000001D1000-memory.dmp
    Filesize

    4KB