Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 15:14

General

  • Target

    92841529a6340247a39af669a773edf04da13b2c8447654f266c4bf62e230b86N.dll

  • Size

    713KB

  • MD5

    c30c6c337c226acfddcde612a7094100

  • SHA1

    327d1ccbd4d45a4dabc7b1274e7d30ec9a7ffe9e

  • SHA256

    92841529a6340247a39af669a773edf04da13b2c8447654f266c4bf62e230b86

  • SHA512

    69e0038a8f59a18b67988e59ce9acedb7b929a6c7c978f9b233aeaf26e3ab4125321afa858d76dd63abc1a3a6c1597a3dc645dd343c8aa402dffc4c00c87600d

  • SSDEEP

    12288:uzb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwPZNIrLGDY:uzb1MlCKUQyUmjtczu6Prs9pgWoopoof

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\92841529a6340247a39af669a773edf04da13b2c8447654f266c4bf62e230b86N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\92841529a6340247a39af669a773edf04da13b2c8447654f266c4bf62e230b86N.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efac656512d1a133a8ad9fee62b2d1db

    SHA1

    c0c16b1403f328fc34df429cdabf51c9cac29a17

    SHA256

    ff5b6086cdda3366400b9f124fb2422a0fd7909217874bc27ad7e1f9abbf3bfa

    SHA512

    776c0a7721819fe3ab786831cb73f20bca06ced4f024b5e170eef0190516cceab4a0f34460ac271a70bb068e24b6ecca1203539054a9a6faa294fd3b43bb0db1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ecd354da34ab86d02c4992851155c2e

    SHA1

    46a7128a552ae9e53dc952b9baf76d8666b02841

    SHA256

    f070f26825b81a15a265fbb9cb21a4b3769200fe55a848e4d15ad66169acd6a6

    SHA512

    c918c95b334e63378b958e91ee110f1d0fb4c500650c584533e2a16079e650790e9de50eb3527f7663997b1fef5c3e01978536c519b28109180dcbff823efb2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f651e505a909860380733ae8d0a3a80b

    SHA1

    c905d855b015ff72d243dbd5a1ec596e7e10a863

    SHA256

    e27ad59f26def14a0cfa321275c8ed2faef6188502b99e81c660142facff30a3

    SHA512

    ae4be8372cc387bb8b11db758d9fb1852aec77fbe668d06149965ed46277746393cb3e6949fc763f37b1c25800e18dad8ca6156ed629c73ae4da57e3f471af0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ed5f5016f7a36c0ec39a69e829ee2e1

    SHA1

    5b1cfb58c8779cf7de79d1ca51e3c22a493be75c

    SHA256

    37e24018c68d8c90eaeb6fe2adca58be47ae13128b76b43d236ead4583429a83

    SHA512

    d83e3e75782aa7b5688c1818a7f11750e3b9505e9e99fce07d7500525ace94e5a3d74e50679c1342e8d87162496d919d9a8a2fc7dfc63a47f4e5c8e18a5cf5a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3355d3caa6d95e359f0bf2c762e4a00c

    SHA1

    0184769705d79cc3f4a2be3a7b10baf37beeebeb

    SHA256

    84ed3982d3ee904bc9a721c0af633a68c346c5f18e4650ccebe464e0c06de467

    SHA512

    3a135b9a2659403f21e1b89a897648c77ac1b688dfd4798479f352ed17acd49cd3ce26d6739013671187f6021b5518ecdd329ac7330f3e81c614ea15cafc7494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a58b9711d8b3886ccc5c23dc59e34c84

    SHA1

    37883957f3bd9b05f52c823002ae2da63fd7a106

    SHA256

    5020789d86c38da44cb35f3b938f8f4aaaab0dc5eb173973e1b0c26924c114f6

    SHA512

    2db58973033c634df51be982246bb5bc6e7f020c7ea283fd9a8c2a70db9b41da1bebb5b8cc2eab8d9237865018ad7acd711285cfa0f7f90f0b7e057af28be05d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a39c84b706b4691658687a5cb5fdc442

    SHA1

    5b253c08fb224f92f0ff392ef9fe8a04bce5bc96

    SHA256

    adb8bcaee0f5999ab2b72f42984be7d25be4f7a5b5f19da9a49134eadc56c639

    SHA512

    068e7f0601f20ba75b752fc9f2154c044bc86255703426eb05a9470e4b625b35349d06671992044c617fdb6447b1dfc5e786a0f880714c38796985ee8b25b05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca2c7c446e0bbd8a4692a1e59db7f5ad

    SHA1

    4ffa01358df5fbec92c1ede38be522acec86bf93

    SHA256

    8defbf96b7cd3345d0f45f46e13dc28bfa547322c64e7618e261c14e8ef7091e

    SHA512

    8a424bdb8431ba957722bc4d9fed8414f6a387c14a1d3d9a9481d71c02c20886e7c2e151ded973897c85a747bdb75570fe50abc54b89dfb73fbf9ae338f8f0b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85fc5bd98b2752b8e6508c2f88f96c58

    SHA1

    09ae652b5d99815ebba85c95a52fdb597f07936c

    SHA256

    8af4fae3c8036fbe0197cdd3a5ad8cc75814329ee2159fdf6a3f65d6d5206d13

    SHA512

    01271e84de55c9c9f3c2997120f04df4c6648d6155bee122fd93950e22ab370984fd48a898e1675a49b7d8344f1ae82cf7e60d190286e30f7b6af1d2295396d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    334ec63b6e4fd5b1d8d5c428944999ab

    SHA1

    7a53c764e7decc856778cb04423a7f2721084da2

    SHA256

    f8c56662aa12e2e160ce0670ac0e450eaf2f7fb7530143a36cf899c651506392

    SHA512

    5edeb7cda8c6af418e614b213cbe2b8e344cec77b23cdae22dfad28db389d2734031b161afaf66f4613711f1006b72d4614d2d96e771744e19afe94992788610

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b7408f84320f65ca2b2c4342481c3ea

    SHA1

    0b83b1948130951eb650da3cc5280bb8ded5255b

    SHA256

    685104fe23b1b29b8237db631c45cdc7786f472aa91f1a3cacf31120a6016895

    SHA512

    af8636493e7f4a1f2e07714a27d52003dbbd67f4ad2e58705e93256e2b3ea371819f972f5eb7d8c848e109f2f471cf5927cc6a374d6646613b466d27b5f7433d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b3035cb82553701fd324de7d754118f

    SHA1

    3d6cc60bf52b66c43247fc8b1307fc4fd990e055

    SHA256

    d3f3fa2604ef685ed8d97bf7cc4acffe2684771601f841e3f44925b6aa14366c

    SHA512

    063b2784364dfced42073dcc5693d90c8aaa7d43c2a97339891ae30d71afbb7abc862c999fbcec9275544ffd11e63da70b59f0e854a13f90d5adff4f94515785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5de45a007f6d9045b1217cec5ae76a08

    SHA1

    ef1f7b33983c98cb3881aee9f8e4be240feef689

    SHA256

    9987e79c47492494cbf79dac5a1671b86f41c7b05e7da595a688efc1759ed31a

    SHA512

    1aaa43249ee89aea094910ef032e13f66266f30ca7afeade8cebd52b4fa13c58686ee25f45a832656b30d676dac2d902bd83a1b1f1d31ff043961e4c38112cee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4f007eb1bc1859ee11fc5a3a9d395c2

    SHA1

    a686d5880a9ddffde393dbb2a920e166d2e446c8

    SHA256

    f5760940d779fa445a23936ed75d8e0d79343d43f0a8ae79bc2df22e65619468

    SHA512

    aad863f234e231f04d09c2c73f0c1e5495df514a8a2a56137b36f0eeb809840b639a4cb67df22a4b69180b5cd0c1f4d22ddf3edf38234763f13fe4aa94392b63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc6d2a990ad090cbd3128ffbbe5d8abd

    SHA1

    bd47825e8640bd124a3164b8e569441da6ebfbf3

    SHA256

    9418a7321cb4e47058a2780cb8b06f3e2bfa5b2c999f80a23a69d08034ad6592

    SHA512

    e4c1c2e1a1e751d98e9baad139c4821376ed6f8505a84a9efcf738134cd2f838fc45d71df5ec8e90d4956ffa8b64513eb099a020ba209f95d162bf98b3b0d33e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbd9edb5f955133f7a70e9d7428d7afc

    SHA1

    4647446f7cb9823f8f3d0e1153ae99e770db5391

    SHA256

    daf8178c15a753d525dd60ee3e9460c8a24d096f6c48efaf7a9cc55b4f6ec866

    SHA512

    9024528196ee0c6726c03923c0461a2cb338a60aa4f9aa14758652a47ca83e67a5f246a7206110cedb843d7fb7a0d0dd1a909faa336ebc48005dc152366a89ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ecdf60de1657f7bde370e7b0852140c

    SHA1

    bb05746ed9d7ac73898ab0a55999c79240e1cfa0

    SHA256

    136e244f6fe6150a2e06f4ff61e0d6ef810ab1f410573eb974a4efdc376c8890

    SHA512

    3d9644ae1543cb93183520409c397e183665f0010bc93aef40a047a9eeed586f4c5ecd90b4022c7ce94950a8f42172852de86af4a3b68e80cbf311febdd7cd6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88d33302df7ac1883594b49b06555508

    SHA1

    a34556bf2a820dc6e766bc9bd4f89dddd41a8ca4

    SHA256

    6883e4c78e5f83f59e334cc36f6bcaf828c1e09344619d07e4d1658b4ca1a5d2

    SHA512

    a794014b7f375edc4cea7d5b03b3188249808854e8c8b5d9215f03e89f086c3b4beeeb256ac0b4b3a0ea2a0ab57151d809ace6d158b452c6f96922acb136deb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e7ee36cd27360f4a706926273dc9cad

    SHA1

    e5b369897bbfd119a7dc5ff33c78db7bf2d1a7fe

    SHA256

    50a36a60ad12ce8ee190530d6c4f83c8cfe8a3a4a98961bd50bc424e97adf1a9

    SHA512

    43f359d8c580b28d01b0bb08686d6aac4fd62346ac81bcbf9a422c12a9e02459896bf8e141da87a4623aecef8674e10ea6526d11cd816b84b99abf00f74f1a8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    337dfc5625755c65cce4e36118c5cee5

    SHA1

    46833f9e48a83f342fd7ce084cc4b801a4f1c125

    SHA256

    47028f4c02cbc077e4aca28746cde2da95983a7b211f328e12ad072fb48b285d

    SHA512

    93c8dcc79ab0b3729846e0394466abcd98c3d6287081b1de04270b316a3f466bb581afdfe432853113ea38ae7b8790b2952c5615a1d157ba22aba037f343ec7d

  • C:\Users\Admin\AppData\Local\Temp\Cab7496.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7584.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    56KB

    MD5

    83f5a64a268f21c7c6d6dd54ce8a88c2

    SHA1

    61376a625d7d389c5c1646aa534f1ef3135da2f4

    SHA256

    c0b96c44a00557b60df0fa0ac9b129ac07d5b93c669f4a3c98276d113ff6962c

    SHA512

    4cddbd07e10c93d23efd1560084f0482520f90f252d6e90380222f0d13ac3bf3587fbddb3033a6b06d550838731db072001197cb3283e4686f5b8bd5b6d894f1

  • memory/2492-22-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2492-23-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2492-25-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2824-27-0x0000000000160000-0x000000000018C000-memory.dmp

    Filesize

    176KB

  • memory/2824-24-0x0000000005000000-0x00000000050B8000-memory.dmp

    Filesize

    736KB

  • memory/2824-1-0x0000000005000000-0x00000000050B8000-memory.dmp

    Filesize

    736KB

  • memory/2824-0-0x0000000005000000-0x00000000050B8000-memory.dmp

    Filesize

    736KB

  • memory/2824-8-0x0000000000160000-0x000000000018C000-memory.dmp

    Filesize

    176KB

  • memory/2824-2-0x0000000005000000-0x00000000050B8000-memory.dmp

    Filesize

    736KB

  • memory/2888-20-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2888-11-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2888-10-0x0000000000250000-0x0000000000261000-memory.dmp

    Filesize

    68KB

  • memory/2888-9-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2888-16-0x0000000000270000-0x000000000029C000-memory.dmp

    Filesize

    176KB