Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe
Resource
win7-20240903-en
General
-
Target
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe
-
Size
1.2MB
-
MD5
11e7b8e829e762907a4b18ba6674b31b
-
SHA1
e4b6838aebc9f5fc10047e8d4c59106c52754e1b
-
SHA256
08112a21af245b130c3cac6617cd5a89e8d1e9631e0bc45c381da9515e9dce3c
-
SHA512
44960b4113c67767f25d038ac7c1eed3017d72fa440ffcd2f329eb7ec27f926e15ec4f15b53e5402104c4cc8c1767a436978451ef20e8efd44494dd9d2d461f2
-
SSDEEP
24576:2h2bNeMrpYdvrqUGvUk5jxHJ/6+85kKLj8TjWoY0eClVy23c9oMI8rFi2Pdr7R58:AcNTmRqUGvUk5jxHJ/6+85kKLj8TjW04
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exeDesktopLayer.exepid process 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe 2380 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exepid process 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe upx behavioral1/memory/2216-4-0x00000000001C0000-0x00000000001EE000-memory.dmp upx behavioral1/memory/2056-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2380-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2380-23-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxCDE9.tmp 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exeDesktopLayer.exeIEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436640090" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8F5D8A1-986D-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe -
Modifies registry class 30 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_TopViewVersion = "0" 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2380 DesktopLayer.exe 2380 DesktopLayer.exe 2380 DesktopLayer.exe 2380 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exepid process 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exeiexplore.exeIEXPLORE.EXEpid process 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2540 iexplore.exe 2540 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 2216 wrote to memory of 2056 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe PID 2216 wrote to memory of 2056 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe PID 2216 wrote to memory of 2056 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe PID 2216 wrote to memory of 2056 2216 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe PID 2056 wrote to memory of 2380 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe DesktopLayer.exe PID 2056 wrote to memory of 2380 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe DesktopLayer.exe PID 2056 wrote to memory of 2380 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe DesktopLayer.exe PID 2056 wrote to memory of 2380 2056 2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe DesktopLayer.exe PID 2380 wrote to memory of 2540 2380 DesktopLayer.exe iexplore.exe PID 2380 wrote to memory of 2540 2380 DesktopLayer.exe iexplore.exe PID 2380 wrote to memory of 2540 2380 DesktopLayer.exe iexplore.exe PID 2380 wrote to memory of 2540 2380 DesktopLayer.exe iexplore.exe PID 2540 wrote to memory of 2768 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2768 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2768 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2768 2540 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnit.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exeC:\Users\Admin\AppData\Local\Temp\2024-11-01_11e7b8e829e762907a4b18ba6674b31b_mafia_ramnitSrv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536965e9d221da1d24bd63eda63c4c751
SHA1cb100c765371a181a6a0a0501615b88c8511a18a
SHA256b2758f489badfd9b67ae17530022ffed8f018405f1ed6ec286c885029f450a99
SHA512050b883e1e5063950fd99d8b03904d19ce21570b844919db6d6c32716d44555ee21d5f525f8955eced881488c440e54d466fbb62a369ef63e176553688b07d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa598acc4af02d414af23d414edea4b
SHA144a43d1d05b0b67181a0cf5b1bdb5f233e3e3d74
SHA256d4b4f04d855401268a05ff2a2394c1ae898a0ab887f18e6555482cd15ff49317
SHA512c865cde4a8d029f0b8485fa881e51efae7475a8059566190add5a5e62d6e7bfc6434b5e2900504e1c93bf0ba5c3aa0b32b691ffc2d7170bdecdd6868d3258db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d343418a1b9ea706eef389a138eb3b
SHA1d99ddb169d16108615277aad29c2bd18e4894f7b
SHA256845651b51e2bf51caad80d526927ae60fbadbba42c14fd7dbeed9ee8c68aacbc
SHA512307c6d60b4fd0ed742b693098e8698f2858d31629cef0929e8e842e2a62edb51a9465247ee74adb22154bdc729a2163e6bbafdc33e8ae565bd604cf001c1739f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218db27df12a086a3161cc3de050769c
SHA161607e06a4b769acc46de83ed73927fad0fb3995
SHA2564f2a26e6ec6e99fdacaa14eae729e699c0429a2f2be06eafb1747fa8937706da
SHA5129807482cf41bafb459b824015c5f883f3d6e26ba0cb36519dd304e3a923c30f0aa1abaf806f4e0e04cb0cc9cf191764132aec430b39c24bce5ebbffa735b01ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a521f2b0d57d1d6e52411490fb1d2853
SHA128ca6098d71c73f583a349f6ee42b038bcb5d284
SHA256b1543fcb455beea399615a03a4e2788ed085f281463b0d7cd4f2018bfa0968c3
SHA51287e4dca78d740392de14be70680552baf19d7963f1017457a3841665b48c36f4c0c743f74f3049c2dc3f8e16e205a7d90a176a375afa9a0e4220bb5c9447e488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59541888725c3709bf9e124b10e9ffd50
SHA14f06b88ec04beffcea7cabb95ba33e717662f306
SHA256975adf1a5f29f465b7da89a16bde840c5387d00751f0367b62b7ca6837e5468c
SHA512f5fa9c8d864e09db339fa76bf7ac12973a2a5c5c8b165b0d6b07fd589923b1929c2bbccdf8a8af6c30afa5fc4cb2399244d1839cbfb1d56173848dd0ffd61fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595bf053865acbfb82c9bdf18e2e18bca
SHA16df6200085863a363aef22e259aa1a87dbc2f8b1
SHA2568bda395576b18403423749f75d7215560e647f06756d552a28b79407b7e05e6c
SHA512fee20ce8d614cf11dce2c0ccbac2c33ad7dc85f5e061a86abf151945a9d426147e083832d7ce68b9baae8fb2f56bcfe8e4f531bf5d0f2ec73273ad879a7826c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5c0fd22eb9be1949c4c142ba745287
SHA134fcaabd2ae8e8f5c58f3eb73c3f7223475ed094
SHA25676287b9b181769500def6c53f78654771416b45e3088a33f39e5196890306e2e
SHA51266429f98690c90933cbcc2452126f4ec6ffd68537650ea22907d074f2ab64009d80559223f4f28ec2f8ecb655e3df82ed0fc637c7ddde0dcb30dbe391dbc014c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbdbf429eef9bdbd8998a37fddcc2f2
SHA1b7142d2bf2d6a111d5c5c7a8b8b3ace7b2c51a21
SHA25663a1c7be93617e3c1323bc9b06fdfed79495b637ee1a4de4f7d94d0a55f8f809
SHA512cc2cc8bf589f875f280daef9fd32616fd0922087d494136bbc73c658575bdead029a416d50fbb88c4fdbda81692f68c6f2637f2381a289b6ca45821a740f7601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03d6e3b8e9130693fbe5967ebb8a34a
SHA1671c77d3f947c2d6923e18792c59c9b812499e7c
SHA256c1686f5ab957f28cdf4d4f6d7ce1da67d6943f4fd89fae7412668edddfabc180
SHA51253b183bdc2fd2821b5514e467a73a78beb034bd3d499d7ae0a830daa754635eaab6136b6218d09e8253edf4cce69a8c3b6c0d8ce81a0a24a07a6abf692c090ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d5569329f2422a94b8cc3f7a20e0b2
SHA19892c00ea201c911fb219d6c6edc0837501028b0
SHA256ea2a92c913ffb2b87de58fb0fc98d6a3f2fac2da1d75fdb0a55977f1c9aea557
SHA5128307bd8664a6cc848840a607715a28f51ea7377ef0d6e32ae4bd9fc5b99c6a02f904c01d58516c882ed30173205e6a34f56a94606b20a8df62232fdc3cc90457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1fc27554bcb08bbdbd80129f8c95ce
SHA172f1d1af3898f2cd58ede79b0533abc6d859a56e
SHA2560028d621bd09e5a8af3ebdb7d65584b6c40dabb1194f66623dfbfd27dee308be
SHA51209852ecb93f06b98515c2d469a1fa45c255282d1196cfe8ea714f0831ce3dfa8d2cc2b149297da0b7ea54c9c230662d8ea818ec4ef2a82de81f1c424065caeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc67afea9319f0c0d424852ed6c00c9
SHA102fc74fdfbbd36dfa531142392fd45324aeff9f1
SHA256575da900b8a868dd4af735b36016c291915c773dbe9f087256fe446648ed4208
SHA512eebcbf8dedd7f306e40b640a6c0ead4dba3bf609e4d4a06040b4c290e3d9b5c57bd2e5b0bfff3c039a177b223bd7d341db2bd8c964549e3dc22a2cc2a47a3d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1fc05afb66616abd34fcc2a35a23bc
SHA157f552e2f7ce3320710f38237fee9e1f7b7ab33d
SHA256420b65ae3d1c68673808ddd5446541e72e48c656ae0b6c4a9493fc1cd6aec8f5
SHA512c751944ae63d5f724708dd8b574bc25c5d26a7e28244b56d6922d3eec51194269403c763d851047eab221b3f5a0f068f6086959fb443cf1e8208d0c77a4dac8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9aa6a920ecc55cb158c585efdd740b1
SHA13bf6ca1409ba6dfc6a4b54f9f20f7e280f642e74
SHA256c11b6c42d2fc74f8346a2c1f68e9cc07b62aed8a9dc5376000b5f253c02393de
SHA5129c3b43236697ba093efffb1873179d66facdf254e9e0480b2f4853345ddfb22813a54ca887ad049a2af31bd20faa21b74a084a39dbd7866923d1a1fab84d70a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3fc7c365bd1f18921d578d363aed0c
SHA1a92b347aafb42d919a98f0c418d9f3c7454c9f7e
SHA25626bc6b323739f735732b0a6e86883a146928b69e71eae3ac77edcbfb4ffc76e6
SHA51222d3f1efc91bf9db2db04b4b5ab0450430f6348f86c069f3dcece9701a3ec6e238994c23d8b6970a913b3b683f751b969c2d3b622e6bc5d811d38ab98e22b515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e27f139e68a97ba9658cb35e622a9c
SHA1880a62024dd5d45bd56ca522767b78f32f5de7d4
SHA256e03146739c30a0190786b6a270c2cbc92f27470201ca573f2d2629a280d994d0
SHA51294dfb9a813d944a5e15626feb0c8d1c0c3d7956a1988c721727eef5af84f7a0d8877132cb51ab72f6c48e30336ba0ccb81a88d7e2859f9ba1447f6252b7ad770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51526314b88ae1bda0bcd1316bf829e36
SHA1d2fcb48a3e4548215a332c18849d59a266d5258d
SHA256e2ff134fe658a5d988ddea54ff5a45cc053b99bc36ccd31345057dddd52137e8
SHA51282453ffd3d29bdfa3ccec7ad30c2903e6371afac802520a4ea237fc0756c97eeb24e0c5400afda79477e341835dd9d9b37eba3f9ae22f33ab2bb4e2c4ab4b6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51739f3cc5ada7fc0350270e75988dac8
SHA134774a9b0520bb6b69f3871f907e59ad5de6d923
SHA256b30971ea230ff1df945243d3593f7d67b55f9c80ca1b870395048fdf3a8a8f03
SHA512bf2a303bbd286d6d9e0cf0ab6a698cafe0c4e5c2f891ba03941f0a9efa712e20f934fc887583ba351e639b8e0edd24bc9ff7305047afa004bb5786b26a2bd544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59539ad28533de8c1688431a899d4aa1b
SHA1922afaa45e6813efc7ad69f57dda1d61b068161b
SHA256a51759f4be5fc4b5c6cd5f22910dfaccf98e53db3d864b22dede9eb61e0148bd
SHA5123acfcb463e2c434175262fe9575e45d8c3220480d55d55d69747610b4d802ed33e89429cf7d86c437838fed94c7c738e749c5122df3a183da6b4e7bf03bf4c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa1ee6e3a40e38d56d51a255218cd57
SHA15aa2008b1fa56bb91a4372ad5f7a0f78cce63b0c
SHA256c3aa008e2a74c4ff2cb7dcf6416b6556de2a25304f3e55b71038cab07ad2b07c
SHA512a75dd4f83d062d3f03d5bcd7b157c2b66ee20ba5f0be0c15204fe7673b4fc57e14b6a4e76c3b9930f33f390cf6c28e0a84d69892187fb2b0b7965a3992b1b795
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a