Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/11/2024, 11:45

General

  • Target

    e62b144551305c8b1bd31d8e5e0dfcae89ac0a76dc930ceb3613bf667e39afe8.dll

  • Size

    71KB

  • MD5

    2fcde9e71be009b9b3dd50cdc87f0b5c

  • SHA1

    7964584bdacdd8e81898cbb5f28ad1c0af2332f4

  • SHA256

    e62b144551305c8b1bd31d8e5e0dfcae89ac0a76dc930ceb3613bf667e39afe8

  • SHA512

    16a2e1e1f304facc97e2840a73a13d717ff77c52d8012292c8023626fe0f3378dbd99d06cc499e367e0c0335f857b34668aa924996149e0cecf5f2e7bea60b92

  • SSDEEP

    1536:eQUh5VR9unGw60fnHkucCP8DB59ROSqZ+FH5LTMrZd7+SY6S46c:KVR9uGB0ES0l5lW+FH5/M1d7+M1z

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e62b144551305c8b1bd31d8e5e0dfcae89ac0a76dc930ceb3613bf667e39afe8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e62b144551305c8b1bd31d8e5e0dfcae89ac0a76dc930ceb3613bf667e39afe8.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:792
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d467debf9ab3ffa64f19aa6f3d62d002

    SHA1

    71bbb7f4d2881815cd0ef00824f764d552ebec2f

    SHA256

    2de32ed91a2668f077a39de8f64ff6a53e4b8822ef2e76ad9f93945fae4e812f

    SHA512

    5c524ff0e3cfd7ed568003491bab3ca85ab9f2d962ea34ba8c98cdae5424fa487afcfe5a238046354e6877f26099cdc04e65d395111706394fadd5cc07a34186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54a0bbf8761ee1f841b8b583659850d2

    SHA1

    699f7b2e80fd764ef874d0924908b9bd81f2e9f1

    SHA256

    1fd3075a2b909dab5f2ae6af1e4ff800cea918134b876c905dadd9fb64f50bb1

    SHA512

    3ef7a38ad9d20be96a161b381b4f64482898190f1b5ce7f4aa35c592c2d07347a52fe28f62bab76e08678d39a04d90ebe4667e566f5cb4595dfb9cb32a48d407

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48733547766dded64ec72382d85688b5

    SHA1

    dc23a5c0ac57183adae49505e2eca76037436020

    SHA256

    78ee495fda7e95fe2da3b2b77811231c88212423a7545e0648d0f502d0feb0a5

    SHA512

    7fc812f2040751f9ebc646b547c559018b24231eb73f3db2faee3f3b2610760dab6ba71be0c33ea5e65d3d7fa9dafce91dbd6da484e4a66c1f1ecd9e46a5436a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    802dc32a52dfb05eaa79cb7a258869a0

    SHA1

    daf19800d7b43b56d8bf09c4501c4aa644c277fe

    SHA256

    0d2758deb9f55756d2ce619492115af2470d55d68743d290e3f44040b38b9ba5

    SHA512

    77685c96198c35d64dc632af7800ee4d09f5c1ea10a30b0ef4dc52d0614e5edcd3fcb235aebd16c98bd97d54230dba5bb8a2fa79be553f2a1381b8078f92b181

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe64902d75a5371f96174a6d6682965f

    SHA1

    eb699c520dbcadffb761e7afe8a753128cdf2a2e

    SHA256

    450da561cc1bf1004eb4b0bba4e968e18051a4c261642cec7bb9a9e735a32ec0

    SHA512

    793253c9a65d21c3ae02d1b7e9215aedf0548dc38bb3106f93786ad1d820c2813ae8485185c083b0ee48d49709a469ff07c8bbb2eca9ce76dc5d55e1742c3873

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b9121e14999c271e4da4deebcd6408

    SHA1

    b5f80cdf222fa4e487d69c396831670489c38432

    SHA256

    784b1ae637075c168f3d2984a89b9e247fa4d4792f9432b6e9b49d986f6a16af

    SHA512

    a6a702846751d687c02a1c7bff1b2c952cf61a6e8714232669d99e2e7e3a8c0c95c0ed9e16fbf4f2d2045bab0ce9c38b17770e577b9adc960cedf2cf46dcc28c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    098eff29e11a1acf3cb1e24d016ee962

    SHA1

    2314f00404d60ce4a4458e5f8cbe0eb8cfa22ea8

    SHA256

    1c550f22cd0796d74b9ec9abf524efe3adb289b4ae51aea78b8c7a999770eb56

    SHA512

    b85b81772c8afeea8afe033e81bbcc6624e24833149353a8c5cae29171f9476fb1b5f01821f748a10fcaf94363997741e827c76c2c44695cb285315945b64d43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ae406bc29ee15e96322b8ba21969e4f

    SHA1

    6869677b50e1baf11198d0f39bd9b59f91660149

    SHA256

    138b334e9978f1cb8eabe3abc5d04252f3487f24a28a446079ff7019a33809bd

    SHA512

    c08dcd31747c26da957f925b9473129d00eab82a52a14a140fbc17fd83c240b4798f52364c7f9644f92478e88fd5a75131a4d09fff2a9f36a73ae007e36391b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d268b77f8da371ae6d5603e98111682f

    SHA1

    8a97da5dc5f8657c51493f1eb728bf8c81085739

    SHA256

    e696513ef7d1e303464f6c13d10d6f4359613cebf990207573434f1219db8000

    SHA512

    1e1713ed65b9cab9796440e4dc4ff71fc94d410cd611264f543a14724aaf4e50403868a597ceb9bdcad2bc4f6bfc63089b353c038499a206135b012c0f91d0c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40b4ec6ab41dad6220884335e6c2fe62

    SHA1

    a467fc408e2e5ade68a05f4801da214291500ea6

    SHA256

    821d37dc7af8e21961d44e9d4f528d931ff377402d75b0f7669fbd880da8a884

    SHA512

    46b20c8232139d804914f2ce79b62333af8bf0b59ae1c19ee5774786117e7d0b9e814b39c2e401c300cc4df4529e45eec46255e69cf8205323b97bd517926e5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84ce62139f08459a98d2ab266ece1a0b

    SHA1

    62cf7e801635464fb2250012722240a743738fe9

    SHA256

    42b07bf7be5721fcbfba8922720be6b498a186521dc22628e6a93fcbd312e230

    SHA512

    0fcc686f1dc8a454ecf4c6a941bc53ac48c920f46b79977dd125640ebbd0311abb075f0ba7c0a3ac14f69e506f4931bd9c3a988f83ed9e01e4837d052e25b25c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4f6ba5d7bde14b5e80b24235bb5a695

    SHA1

    6fbf99e8f14903f8f44d5d4b1a3a6e5390ff1c21

    SHA256

    a79a05221efdb9558a3b15aedb16b3afa588bd18c14b7a47f213bf703d3e6c5b

    SHA512

    9b6ae204821bf56dd3d5ee890654e71a3ea5a75f8031fce1c05ff0601cbf6a1e7b365839fa8cdc68b1491c1aceeb877a9f865b247fc473dfa4e9f739874e4067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ba32430f596a5863789b3e229dc8376

    SHA1

    262ef1f113cdd9dd2a674c13829802e8aac7bc6f

    SHA256

    47bf2b6fcefe162f8eb12a78b546392f720023ea9ce7f745ba79d93237c02460

    SHA512

    e57e4850231519733cb2135f78d83968d0cd5150ed018737e4914ae3d174e9d17ba3a8600d78bf328c16bf563b303c1f74fafb20c6dea548227feab22e4fb73a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4840990a7f7244d88640b65e4380a2cc

    SHA1

    2d5718bc9b1047972f8f518b4a011fa387487928

    SHA256

    78c0e2353a013793eec9eb8246a50a25bb71182559b4c856857bc0993deb1e9d

    SHA512

    6e144529705776a4579c00571c58006fad74ed51afba1f9164407e72ddd9272ff3ccd12c001329793690ab1bb21a9779ab9f5e88df07f6b28ec816391b91885d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d23022d9de1b804818fcf2db02f4410

    SHA1

    f08608dacb4d1579dfe8bc36e54306494ee78d85

    SHA256

    ffd054f5b7029c896ccad16d015251d7f51eddfe600f7023e357daa606975c59

    SHA512

    247cb33d0f0e407dac40077c0840b8479a959291ce2360d2e0cb0fb865ae5b061289e29819e28babd3afeff4a0436937a4b35661f3c0d18163c2aea065dd05a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85d481932037b0923cf07340a5f890a1

    SHA1

    fce2e52c3f62ab31783c32ea8868c2032a042975

    SHA256

    bb3969d2d37647a8238676b03bfbe6a4b16e470b51546d3c61bef29d32aa54bc

    SHA512

    12089980d3184af23f06943e7c22f2689ae1324ea6ec5eaf07d04bc0398c7941857f26fbdec49a728c9873dab9fa172517be32104fbe6b5162dc35b483392ffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e79d19368257cac4e2ae89843f3c4dd0

    SHA1

    74c34b55149d7e3ff20d4815a40ca45881b648ee

    SHA256

    ca1f828c348afc5ff58d6632a8a478e0f1082f6af85a54c27d125a6c0946c849

    SHA512

    bdbe83bb29153d0c10dce18353984ed42fa0c11d73f44b945f9bf56aa808c459dce410d61ad5a7e337ccae4480be4d097e13e62f53bc73799811c1c0a0475ba2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa91a37c8309d7208605fe134b7dbbab

    SHA1

    4dfb8f2a7201ed4df27c3af9a9422620a44cc746

    SHA256

    c0a1fcefad6e3b3e613e3c1b1a963709fea2585cef6742b8796db840b381b273

    SHA512

    939ab4757996f6ab4fab5a0776238d910fd0eea7e86ac7ae093fc62a56c81d72be72eb794d85ae3c4abb7c325cebebac7442009da39c277b753de4b9b2196573

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a00ec86a5199eb37a391e99ba3d43d26

    SHA1

    15bed8a8397b693082eee958dfd4a0d6e8f5ccd9

    SHA256

    7ea1fce5e74dce9ce1b3cb4160e1c827bb0a9af2fc3be316e7a58f388caa291e

    SHA512

    769285769c9c8bd19e4cf776288a29d8e38f7509997a30d06283fa16f6e7ba67ecbcf43e538107df9e4ed257faa5498b34ac293972fc89c7429c690f3d49a5ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0de0f51d5cefc840540029b90b2f3fc

    SHA1

    910bc50f56c637c83c35c323db4af1d4b421429b

    SHA256

    516af3195e667ef083b66930ad33963b9da0b54b2cb6b6f338915a39532322eb

    SHA512

    42d5db537caec987890fbb91717b11e6f625df083c48e8bc0d62d68ed185994f9396685f9de18b9ebdb3045dc91d3d6e16a876eca5c4513bfac6b116b6fad73d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    222056c32ca278ccdea5824345652702

    SHA1

    e24fde380dc13dbe8946accc227060ce8b1b4379

    SHA256

    8d467f3e8e200f4346c33d30108ca83f284b75802d48ea3206857d5a60af3d5d

    SHA512

    fda2a84423687e639603d71a4f93c2eacda9bb5cc83ee948dcdc3a11ff4d1fbe71871c83be3aefd408e805309da0916c63fc4beda38e5fd7699a5c97a864d13a

  • C:\Users\Admin\AppData\Local\Temp\CabF45E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF500.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/792-27-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/792-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/792-24-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/792-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/792-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2368-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2368-16-0x00000000003C0000-0x00000000003EE000-memory.dmp

    Filesize

    184KB

  • memory/2368-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2368-10-0x00000000003B0000-0x00000000003BF000-memory.dmp

    Filesize

    60KB

  • memory/2368-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2540-0-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB

  • memory/2540-6-0x00000000001D0000-0x00000000001FE000-memory.dmp

    Filesize

    184KB

  • memory/2540-2-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB

  • memory/2540-1-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB