Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/11/2024, 15:09

General

  • Target

    ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2N.exe

  • Size

    309KB

  • MD5

    787b6741a69112082bdcafc2f7141800

  • SHA1

    a7ab4e000758629f6454720c70d1734514c12c73

  • SHA256

    ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2

  • SHA512

    b82fc87e2c10a5a2dd75d8cadd3c9f86a896be3f72aba983260fc3fe00d2bec96d00c89f809b33681a9f12f9f58ae032bdf7a902f7b440a93f175a993114492a

  • SSDEEP

    6144:abz1BFNQGjTdUzNf92ThnS4azNpJ0RFZg6Y:a9LVd0n3tJ/0RFZgh

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2N.exe
    "C:\Users\Admin\AppData\Local\Temp\ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Users\Admin\AppData\Local\Temp\ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2NSrv.exe
      C:\Users\Admin\AppData\Local\Temp\ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2NSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db166ed579134aba1baa885f15d0a4a6

    SHA1

    48eec7c7edad0fc6f1a65d0cbc8fa912030dd0a7

    SHA256

    1b10aca12aa8aa17cbc59cd06c991e77d715275c883447814bbd18c77bcb0fab

    SHA512

    9d2d881a8a0cd936b1f239a639453a8bcf39cd1417faf4a75468a8c8a039564014e22a209c5d03c72eb7dd3ec95626bce8b9a65326f7729561488f60092aa98f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    713c472ae6ef5df8998f3f8951da55e6

    SHA1

    a9bb3eb46c62cfab2636322e58b7cd8a946c8700

    SHA256

    72eb1881533d19fdaa56618256ff94c8f2e47bb34ad8794ac1eef6e892902e05

    SHA512

    5537db7ec55b5612029171cbf45309acbb73d01d2e144a77f1cc423047be4e0a5ba6b06ee494e2cb67482bbcb0e0245d137184eb5b2996600f6a69b5b0631ab1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21820d60d37f72aa7e873031c2ca9c13

    SHA1

    484715e19a53257ca11607d6d04987e23dea3a54

    SHA256

    3322b860b8ed763afe6ad4643a56809b15a113f7f81c1e6932ba3393a2f34465

    SHA512

    dd1c6d0182cf7bee46cd1b74a3ad6a8e5aeaffd82aaa57fb1d096d37f8cad3f69527f28a0f293545d6edc57918630a5eadf64ed9a24e22180a840316c3711d0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a3db309f2ab7405565285d47a87fb1d

    SHA1

    9b5628de404726ca22edf048d100b8799fc1631b

    SHA256

    9a0d47939f8edda29a4c0b3e4aa76c87ab44d91389ba5d5af5e855abe019d223

    SHA512

    aa553c5994d353cb2113e2739f63b2eb00cd3b234d6b2af93abaebfb1b1e16fc3a98661b4ca4bdf2c970813efb7b09a492e643cc7330fd250a1906ce51a167a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8ade007b390aa567339f63a07ef494e

    SHA1

    3fdf611255e280df4f16abbfd2a3e80484a57b7c

    SHA256

    cb6ada8fdeeec224a810abb62c10d479f6d1f9e0e43cb423b2d79f89753de6ed

    SHA512

    a1977c568ecfd00c5230cce38ac441fd03b576ac0679642141453fba0e70adae46fcbb86aa214d739fa9e5b7f280f031e5888b95ab2e01955f3a1fe329618558

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d7a722b45385fa6e8082f17ab002e80

    SHA1

    128dc9f37169b7449853f9c789867b3b8fd5f498

    SHA256

    44b1382dd7a60028faa611e0753f82d40ae04e1e76efd24ac8fe80a04afac9ed

    SHA512

    b043d25e494018423db66cd4ba69c4ca761170d4f59e50218125b2afbf7cd2b427d740e432c653d219329bf8e50e1c06f67bbe45f9d6df88e2728631449a0a4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a02bd749aab4e6c540d994c3b5359d4e

    SHA1

    1c0b71b667bad97a5644f31ee00774a8f51e008b

    SHA256

    e462ce8d7e7d9a54edc3951ef5f7bced64e09e0b88b2eb7160c9284682bd9ed7

    SHA512

    1f0649d006c71785ac34d59ce2f7ce21395dcb1795f16aa810bbc7817c7ef060cfd7e3ee28f32877f32de3b30b0e793909dbb6c96074278877fa67225a1b492f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    603f8b245b604a9e7c4da703ddc63857

    SHA1

    7e5f1f43a864cc1330646201d25ce479bd9f7750

    SHA256

    3168cfbd79ff3a0a81b09fd5e68e8eb8bc2c330b95b2ba5fdf722607b8d81a11

    SHA512

    61c3fa81a521f391f13127723b29010ab4b3de0e088ed173e6784eb79067d81432f60d431f1e88f73dc4110ee602848bbc6e5ef197b6d6500bcd9cca4efea2b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c0b5863dc087e3d6125620fd8023ba5

    SHA1

    251bd404af185cdd06ef2deccc8be148eaace013

    SHA256

    6fc80e3ea8a304924fbc5833af07370556ee8fc928b6ead39332cfa3cb72c5ad

    SHA512

    fff7d4c8c60e243131f8ffdaa0338331ae50576653aec33ac77e342fe3662d6eeb8aef19dce273071c08a55ea5c2be50784fca640aa0869dc9a0d4990ce9c42b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2eefc816db45491cf33ff4b45f638ec3

    SHA1

    2c03e380b5d7425bc266bf54eeae52632fcf7800

    SHA256

    83752ee9ca33830aad80832faaa4096ff6f4ce12eac8e736911cee27e6f3eedb

    SHA512

    13eb0da81fb6f3b9b11c57a522992ed27a0bfad3613ca58f8cfdabbe6f11e6cefcdbce719f98efedf184ed5111d0d68cb244b90f9bbc6c3ff811033f0191de8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d216220ef63e5a3b371576bb13c20d24

    SHA1

    aee86b6b9323f3a1bf934deba162ee7162aba576

    SHA256

    80b1bc205e31b42a57f9fec6053a120e3ebb5d4a2464012f7d8fb5ffa69bf488

    SHA512

    3af3794d65ea6379c6bec64017ec58dfa0c54c0ee5f68e2a38b4d3c7c8e105d22f05c7ab7e7c75b786a953f5e8cab1880d1c3744238a56814e3562fc7e547b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dfb10eedfa7c845b72abd80beb589c6

    SHA1

    90c901ac70b78a4940892be4628570152646dc7c

    SHA256

    4813701595d096895c80fbbe3dff0c700fc7b40123d755857be0b45daf3de222

    SHA512

    b0cd01c430df099d670cc8325a3fbc3823c395111ee9fec3f91f14b8f7a1fd37877db5c1b7010bb5d5a7686199eaa7d0f5eb5388a12e26e1b7a4ad99ec7e8efd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b9d1b51c9cacb2c6daab3bf3a9de9d8

    SHA1

    e49078a9f38e3bd96a3bf6a36113030a7024d74d

    SHA256

    a4b7b40f810553177196032adbd26cdea3a5943ade776f39601120973e8e5e26

    SHA512

    7078a2f63d12dcdf41805dbd175bcfc6a0a3c0e912625374295302c25ac2eec8be37ae4cbd50dc5c314d28b8ff806a38b34bc956b19a5e0d9e52fbc6731a842b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ceb6b4e9d5da5e61a9b0d2d6682cbe0c

    SHA1

    e8b1ca1d5e949e9fd4ca42ae526fcdf0332cc74e

    SHA256

    d9f829f1f7578e26c9f9704c30732f165996da43653675fd24dda1043afa8b05

    SHA512

    287d509287ce00973c8dc53cdd600d92154f828e9b1b6e755c6ffc3cf22be308c761af0ce59599e8c1b0fef72a429101686a812487450e02aacaec76cdc3c8c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a8c9914b29b0d506ab04a87414086fb

    SHA1

    e47094fa3b2d4f24d2e2efb5575744e173e2d531

    SHA256

    03807c86edbf97dbd709b57f23bae286b7e106ef25689657068228ece18ad2f8

    SHA512

    79ddf9e9740ad886baaa7011ac57f2f1888cff2387e5718872e63229390b7aa1ec8c5b1b587bc9e2db0b4fd3a5a7537b55eba9029b4fab8c2a202dbcd9947677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d036e2f94740483c8592d8f01ffc67e

    SHA1

    1af03bc31be30fbac5cf5eb7c05ad6f4fa00427c

    SHA256

    f87b55e1883510f1325c6b6451ffa6f9213d56d7cb4d4dd6f9b24b1a617c11af

    SHA512

    f73c984fc503ef368f1e6277837c9d015fe0398670bf30c35a8c618dfbf2fc0423ad2d929ffe919edfcf121c3d381a29d2a8e66445aaeeba933a9c8fb10dd85e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a845fcef694ab66b49958ba275df415e

    SHA1

    e1f23a027e480e6284db1f3665cd7eca910bf78b

    SHA256

    42e5e0832c3627598d899db3b8d4e9012e661e6e7d41f58243158b7f1e0fe4e8

    SHA512

    4d0d3bade03b9512894c4b76fb8b51863f5c99d09bc21fc19cd7f9c68657e260e5d9828bd9d54939cca73f41b390905dcbdd8dff3a241c79bb135a8b59a7d2e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f54a5b174aa9063c7aad5b60bc0da7f

    SHA1

    d62b10f9ba78b3e84835b03c64f7f46fd5621962

    SHA256

    f54d899de77069018e2a13e9eaf70f5fae19cb0f04993dacd5a5a4c5b0314a7d

    SHA512

    a1fdac1ec2c2dc7fa0e0561c9e8afe5763420f32348025eb4206d30a5d0d96044f2676b77d28beec023440401b2475843685588ecc46371d7434c786419d3729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dc1208d46233746732087d6f209543e

    SHA1

    7b5be5ada912663160b9dd25b2a3eef77e971afa

    SHA256

    6b50b9934434469828275b58d6d7e26c4aa16011ce592f19fb8adb8e26114216

    SHA512

    7188b502e9fd4355e051041ae7e3f14cc7f35ea8b58971e5e8682fccfe2a07ab5a2d5eda63299cb74b387a9b8b8dd163dfae46b3ed518d85fb8adc8a444d3a15

  • C:\Users\Admin\AppData\Local\Temp\CabEEC5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEF45.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\ab7bba8e1704650fedb3d65ced59e47dc804ab04000a3aef4f439c83d14c0cc2NSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/304-450-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/304-4-0x0000000000220000-0x000000000024E000-memory.dmp

    Filesize

    184KB

  • memory/304-0-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/304-451-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/304-11-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/304-21-0x0000000000220000-0x000000000024E000-memory.dmp

    Filesize

    184KB

  • memory/1440-18-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1440-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2684-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2684-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB