Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 09:18

General

  • Target

    e6ee52f8904cf80b48007f11b1d1f230N.dll

  • Size

    656KB

  • MD5

    e6ee52f8904cf80b48007f11b1d1f230

  • SHA1

    efd4bc3ea3b43dcd25bed18da3e77aea2b7849e4

  • SHA256

    9b9a5be924d7b022d352bfdef50803781ef0f36e3c71154b1366c22d3d0ffb91

  • SHA512

    bb2e45cdecf6612aa9c711dc0f0d9a810108cfd9d9aa1b3159f0a1b98ec0e44e28f32401d370a74ee36ead9a2a84b97fe1f76327db7b51c58aa1aefd51ee0329

  • SSDEEP

    6144:BYlT0wDQOCMkJ9zIg7x2NmP9IrlIZqHSSYCu5TEGI6/Ixz8t+LnAa049s8Z:qmwDcMkXVTyrlIZE0TEw/ImYnJ/W0

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e6ee52f8904cf80b48007f11b1d1f230N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e6ee52f8904cf80b48007f11b1d1f230N.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2868
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 224
        3⤵
        • Program crash
        PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44a305d8bcd7df1ba7169053b29b6f7c

    SHA1

    d0a60fdb2ae976f1b3cd503d2e216e5d30a76327

    SHA256

    787b721d20e031e809ee436724a956d0f717054af639a164b80ce404c2c7ccbd

    SHA512

    12ce56a8f876762f4e9b3f47faca7cd6c2ef4937bfa9d03ece416bcc03702a39b61ccd69ee1cdd9b9a94db7829264601044f960628026e1434ee43930f0fb255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afdc3f297f0523d2f54a799250fab4f5

    SHA1

    809f78873b168b564bb3308af8c28b2fc938bc9e

    SHA256

    46bc26eb6349572275231ba6a9b647c82f6cf5b73332c2a086d7daf2ad73b116

    SHA512

    835c669d148acf39b1bffcc70c62ebd4665de1519fc7a98e76ae64c3e025408ac7e85e3fc89786d0cca859efd64882809c13cbcdc94c681533852719e12861e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8eb525d8566530668a9b384ca6459d80

    SHA1

    ed22fdf803977735e62866ea423cee6083672965

    SHA256

    295f3c6d381be285963a16d2c926f5bd7caadcda98a0a5716ea9703cfdbfedd1

    SHA512

    21f8c34f4ebc0d6015ae3dd78de7ec1e744a190f79d75e6caa5948a2510e007b13da525a445b7c39d9c74e4a8a2a032429e3640e04bf4492baa384360202b99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2b6542a86f2c301972e9f8ad6d105c8

    SHA1

    1b1c7f22873f0cda8d2e839b59a31c33fa0a6688

    SHA256

    04a3dd5cf1f2de40bc925bebf439fc9c0903b4b13638f76600d00fb9160c012d

    SHA512

    982fee375701bd2bc6f087715af10962df4957e8cae9175ee266d53f050592e17c5553d11980a1d12088f53bc181c3dd3adaa29091b3703f7d3e4f50a61c0ef7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8455978e3b6574df9f3408a9a0797752

    SHA1

    d9f5121c2cbd47d8358d48ab21d0d1f9f55c0b23

    SHA256

    ab072f2ff79e5554e9b1ea3c0b83037a5ebed9d736cd228a1c66fd3e82315270

    SHA512

    74b6e8683efdf50e4519d158408612a09c4f4c0f60862b9ba1cd4d794f5fb01c07b097c5ed905f456fb7d39e84195d441f12d78c446cdda3293ee7b0c0938648

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    909a8aa09d78a0503f737c13bef26f09

    SHA1

    f3d7b8610fab6578cdf6291e8a7114e98c2e218f

    SHA256

    bc2ee121eddecba6892001239ff6725f9e5ec10b9556a71631afc1616ba69abe

    SHA512

    803190e4f2563b6dae8be67582233b11dfd68e9ab9fcfd3fbf0d43f5d9d23a185ecff5509a9a80d3714789e398c9fa6b5de9a9ac63e53a27ae798855517b6219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a26a107c283b007961bb19c84e8b36c5

    SHA1

    84374547a395683300e041bae7469533432ebab6

    SHA256

    292b54d20c1ca99006be269d045a1fc9ebbf698d807acdfa249566a9c195bcb5

    SHA512

    9416df000cdb6a8fc78440d27b99a42b952dd22ec2e5c261e436069a08eca5557f0cc5c77dfc2e93e6e54db781cf1a5ceb63b28fcef76c33826255f7e343326f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    403ea6a4af45ddc98389ff32bdef69bd

    SHA1

    39bd728191915ca2e5ded9a0e2a0ccc543decdbc

    SHA256

    52f008b442da99597d7b62586a24b32772f73733167244563b895c7f8565f7ef

    SHA512

    66aa5c37566744340bd907dbc3e8f1577348b84b11832cf6df911eab97c2cee2f278207b34d07d54316a262fc6199b12f07bd719d2d04bc5425b60d66634b496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d283b90628ab6e24ef94cb9a9ae823a2

    SHA1

    93d1232eddd5c3bfa6d11d620f770382b2d7b809

    SHA256

    e181e862dcb6e4c30578305ef4a328afc0e2406c92ec05500dd9ed2d2497e112

    SHA512

    b9ab54c55397a72bc7e4645dccfd98f86a093e6c60721a972638d2f6cbf3e0035f1282a7b0c21c0b767caae4d2d520b52e850424887c6ac03eeb5b0453154d0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d09aa102dc1fd5f3d6e3bb5a87e43592

    SHA1

    c0e9411fdc6e3688d64197247198f693db6c385d

    SHA256

    abd802c382b82b8ff553b779149ee8e153706e4c618b2ae2d33e21cab5d9fe5c

    SHA512

    7a4095d9e5b5cb205cdaef48fb592f5d4131595a9354d393d06658c29404575ebd29f346aaa011b7162b7c3fb838a9c5e39348039363ce7752b1609c2de1aea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    859eda3051e717d15a633450be806835

    SHA1

    52aaf750b1e6fd14f73fbdf9ab81baf7ea646363

    SHA256

    b85144af870e2ac81571ebca123b793b14b77fb3f14280e289ed1d596cc91e13

    SHA512

    e145988de6f8f50c43df15851fa546d6b4f325f9b61b97a181f5186da0d7a9dbf46152e90fb85dbbdbc10049179473bd56691c17b1e04c2bd395742fbd50fd0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91b612563f04273ea04872bf90794577

    SHA1

    f61c7aed7faec3cdfb8607507dfee57063f0b4c4

    SHA256

    546ecdf7123063101542dae2b1dc5fd186279aad2c10695aeff5835b9791672b

    SHA512

    c52dc50201d48af4ab972e84b2103f7a5479b73fba0a857709b225aa949ffbed3b8f6b68826d69b7494bfc65bb744086c1b7f021fe4f967568739490d1ed1df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96e4d971c83e1959b26edc201695b7ce

    SHA1

    d35405491789ec3394cb19a1ad0d00ff93acba7a

    SHA256

    0b88d8f9562f19d0409942bb5dcd136709b3a219f5205d66a53dcde8e83b37c6

    SHA512

    6498cb41467ba52d8711bf57eca7ae949f79fc056fc002538c492bcaf86216f0b4fbe586b0f06ce2de65a0783d055af3dcdb0a8d7e84c0e5c2c7dde1a7a0ca46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c464205533ee0890db3347c39e57c0a9

    SHA1

    5395aecc39ec081a62fca399ca88ffc0a8530715

    SHA256

    69af3c43acdd9541d4eb6567274d811aeafedc4632bca3e1829175183c57301e

    SHA512

    9d8c3cb03f55e021be11057747df74078afef7832265fc2df88f969a0fc0535aeb4ed1ce53958dace03638311edb55243baac773bb4780bd585faa1db6bdbb63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85eceef9a86bca67cda6e70f4e840fb3

    SHA1

    02aeae3e0a99a892341ac4e9a8426a49322a05b1

    SHA256

    330c81a9a1e856517de12561593354a5ba0f3357b4bdbb711c7a03f7bff2b70a

    SHA512

    5874dc8b8d39c749ccbe71c03b6ddcb2e71f67a1c4a4cebf62314661d7f42d494b438fd7497d2b90241f6520551352947ccf8f0d945d489c787bd6955259d548

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    833fbf41c248b014ce141016acdd5e03

    SHA1

    77addc4ca5631aacad0ae875a8672e4c98df6f4b

    SHA256

    a8423c9f2fc6737fd2df42d955895e6030e20af38f99f091f6456088081217b3

    SHA512

    c7db8d07bbcd5cafe1d93d182b22120b86898d7eb45acfb7bda895e22df5d935cd178b76bd4e726c601409fa426fb0fd0dadef30802b69e99db31669c1e0b53f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5984c729b96e7e3af8c59df70c7fd7a7

    SHA1

    fa0295a63c2dc196ad3075bf2fab785d80f6857a

    SHA256

    f47b79e4d6a140d7ec6d3b1ed55dbec01c72a3892bd7ebde0e5bdd30db9b4e1d

    SHA512

    1478e39ed0fddb2156817ed8745f46780235eaba8cbef46fd68931fc1caa49eed3d6b75f72272f01c210f209b524b633136b335c84f8da79508d2b14aa3156f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2e26072fb6786d47f8eb5cceb92c862

    SHA1

    9a6821c46ac372187d9b1997f3c6156206780b3c

    SHA256

    8284bf9985b66855df9da4b11cf5022265dcdfaad61c38c034531305611ed4cd

    SHA512

    6815ab84b547c17a3e98874fcf5f518dd3cda8998ad93deac6460736dd66ddbc08104aa5dba28cd3cd5c61edba4b0c919d06912f6618759c7f90055bdc15015e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adc9fcd56913ad72da675812256ed329

    SHA1

    638c1908f886d001d010c89133d1e5fffe5077ab

    SHA256

    0ca8b5b603b133ee18564e97af35e58dbd76a3cca0153a36c95b22774a0ee09f

    SHA512

    e6b677973383d72996f3bd02e46ac41057128dc3db4bc78295a874b1595dcb9f4fdff90d53f21949417e8807514ec0164e79051c281848dc968d167bcf119e41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a2024d44ee38f04835feb83a5080b3c

    SHA1

    ee2213a6471f7fadb7c68123f82725bd7d3597cf

    SHA256

    a51de4f3484aa5724d74429ebc5deda6b9da1429f1d43fd39ef0a84b76d1a0c8

    SHA512

    c2fac33d8d46fb37789a5b4256336c0e1027ecd9cffa7bbcdac33a3fd04e3285ecf4339594e6c9e297cef73e03f190407a8ead140cd5622c3aa1818765f59cdf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F745EE01-6C30-11EF-8673-F2BBDB1F0DCB}.dat

    Filesize

    5KB

    MD5

    6548c8d35701ada3149992f000678219

    SHA1

    4d8bb8b916beab2681c52ed5f54925b64504f62f

    SHA256

    8cfa0527469a28e9f7d4709aec20f20d85a2fd5165ce0ab4bf39bccc7d6124c0

    SHA512

    d3a39687c8d552eb2615c1e12b253c23e7ad783e724069458b1cd133d6eea0ba857b53950b92d726b765ef796611076aaf177fd3e0bdff84fea0794dd567aac7

  • C:\Users\Admin\AppData\Local\Temp\CabDC1D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDCCE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    105KB

    MD5

    dfb5daabb95dcfad1a5faf9ab1437076

    SHA1

    4a199569a9b52911bee7fb19ab80570cc5ff9ed1

    SHA256

    54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

    SHA512

    5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

  • memory/2236-12-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2236-9-0x0000000010000000-0x0000000010127000-memory.dmp

    Filesize

    1.2MB

  • memory/2236-11-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2236-8-0x0000000010000000-0x0000000010127000-memory.dmp

    Filesize

    1.2MB

  • memory/2236-3-0x0000000010000000-0x0000000010127000-memory.dmp

    Filesize

    1.2MB

  • memory/2236-20-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2264-13-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2264-17-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2264-16-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2264-19-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2264-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2264-15-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB