Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-11-2024 20:20

General

  • Target

    3f5a4840fa5a1bb51fccb07ab23e0e769944d0eccee0fb9e2cb3aae412c25e00.dll

  • Size

    1.9MB

  • MD5

    a9586aa6c909ff96965cf71ec1a1efbe

  • SHA1

    f9940b8790e321c42c0130e2f5f48d485db62044

  • SHA256

    3f5a4840fa5a1bb51fccb07ab23e0e769944d0eccee0fb9e2cb3aae412c25e00

  • SHA512

    4fc1bd7f5d95e949473413eece8fa53f262a02f3be5feba46a849d61d8979e9441312b34bac6bc2143ba57c85b14bd571a282bd0b417f6893ee8f065948e81cb

  • SSDEEP

    12288:MVmaIdLV8Oy9FmOvAvkjODHO9fQfN3RSdm2pdngN/VGfOVmNBgKcMnY:MVVuy9FmOvtyDUfeN30mN/cqyN/Y

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5a4840fa5a1bb51fccb07ab23e0e769944d0eccee0fb9e2cb3aae412c25e00.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5a4840fa5a1bb51fccb07ab23e0e769944d0eccee0fb9e2cb3aae412c25e00.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 228
        3⤵
        • Program crash
        PID:484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    034a9a1417096bc0d58cf146b2e33e00

    SHA1

    e5eae18dfc5d576e3a0aee85d60fd1dace9f557d

    SHA256

    fc0a90e95b4470794ad71fb5ba4593fbe0378864e6628f199a29813b59fae153

    SHA512

    8b7bb75dc701531149d17a3758808769eed5c5706c83a7dd4ad72ace5a15e72e6808fa4596aea40f5b453167cbb77dc10895d21167902d583d5f6dc97081c8e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f5747ed0cd5dc743011852618de234e

    SHA1

    867c385eb084c7c9abedf07aad85eb89392c403a

    SHA256

    8ebe68d7e084e41336d8e89c24366d9946445c7308ddfae74bd7d7ce7298d06c

    SHA512

    dba0e4315e8a66c42c74130171e0cd8ccb4a6d34646f745fca7ab24dee5a401725d293b1552dd16039b165bd750e718db63f2eeffe842ea9745179ad06c9f938

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0820c79ba427dd9504bf24eaee307d79

    SHA1

    0eec4930e54d26d8560fa1166edbecd7f8f2727e

    SHA256

    83ef28548862d43c72d216858efb7b72483a22bba903941ed1981bc5b62aa230

    SHA512

    9e3d51a1e2ebae58b35974d27ff6da6eed9085de7f0004abae9d69c2680515c908ae81bdeb2d3554c70f6a6bf9377a116bb3849165e29df010895d8876ead32f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d2c2a33073ed1ea2373319ac01c7b56

    SHA1

    7526a2847563053e822c2c77ad4830850223db4a

    SHA256

    7abaa8a7143f2bc4149f0f4c85dcb5483d0dcbcef3d4b20c72c2d513b32a21b4

    SHA512

    86cb8a670a92ff68cf540f51d994ee7552dbccd69c4d5246d06168946c4bcb9bef72df5e7799514f5654747976ccf468c9adad628141f23642627ce739016048

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3406e8b4f927ad0b801dd241e406efa1

    SHA1

    85b3a3195a97ccc02dbc901d88303b58b91a43d7

    SHA256

    c63b13a8d00185f2edf4a74c2f05c8bc43d8ca53f5baa067631d2eebb34f4390

    SHA512

    1fbd270f11a51e6ad34a132570521b2d764fc92ead19a81ee43af7002e6e80013b7bdea76a4192d7d25879abc9b4e417bd51d32736e0b3ae39a4afcf0639b67f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b936ac03f0f4adac92f95917b91a6ce

    SHA1

    8846f258e200114e5dcd1db7414a17a1e07b5c02

    SHA256

    e3ae043b0c51bb1c8d674c92c59a67cc765fa1efa7cccd228635b49c7b87b470

    SHA512

    db3170fdba1569f90a5b86b60695bd516045f0f9959212f20a8f5510589551064f2d35514cf8444909ad18cd49099cce952cf89edfa82384c866422661f143d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da1e5f1f42dfa1706fec5ea4c080c122

    SHA1

    8bce7d17c60a6c71101c6543b11152d313fc02b7

    SHA256

    e2c989eb7db003976116a12eb4e8e4afe888ca4ddbc1635613b5a1f69d81e678

    SHA512

    1e83a2c239656ddb767e985c963ff9dc9a12b736f26fa66149dac9544b26b97d9c84aa75fdfb2f49663ac7864edb3aefc17f63d5711275dc84ed7d9efd434080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9963a7c8dd931103357bbd49ff7329a9

    SHA1

    7a0733ba215ed89d2b00546424b8e900fc7c9bc1

    SHA256

    9c594bf80335006db147ab15420ff9ac4a8d42c4d12042a04bba0a29ea812070

    SHA512

    f5ed552111c9d594a4807482cea12946e8eb9246f68e6356d1a1e8de586eaf8f54ffedfa7169292f11b139899d39e38f577ee50886154e8d9fe4f7cee84eeb6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b2c2869cafd4fe0e28a116032777ce6

    SHA1

    dc6ef74117b95980856b98b73b0def74a7d3edda

    SHA256

    85b6a9f7a4be33a7e2fb4bd14e01f80c5653ddb538ef170b7bee9d523d72d924

    SHA512

    56ecfb4b917d99459df8a5519d285d1875a570eab13374f713380a2174b905336f758336055141b978939bef87a373970b7d39e56eab239a31c3b3d2af91b999

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c77d8d8c50d1bd4bb07dcce5cf4c0ce2

    SHA1

    2c622b29dc981ff25496ad6c6c8cccfc90ab33ab

    SHA256

    0b5d88230537518618813bf56803e7944694078077dc08eba29da928d7aebd3a

    SHA512

    49060694345959501c10e2be613008ee0294600af88e3e2515ddb032752ac0918d194bc5728e8db638c6d869e865d27ec9c4a55fb5be3bde44bb2bf719841cd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8935105345307a78a808c9a1f416d55d

    SHA1

    130e16bc715e68549164e5e85e17f5ef332f621b

    SHA256

    9d376f31fef5b940bd97ed1fb9c5d2426a45fd57ef77696a3ac8df6b1a0ec793

    SHA512

    26e15134897db8a3a77ae8c027df0207df3f80ca930ce030bead727b3848e29ba0287d7716bcaafee0e6fef628dc2ad615ed1d7db32f2a79ac0d8affc341a78f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3b9194c21065c9a9d1c569cf3a30847

    SHA1

    2992810a408eb55e861f6092c8e217b91c04ebb1

    SHA256

    a9b20b01a65f39d88e19015696ca08dd85df65d2cbd25eb1064e1c9c0b0878fc

    SHA512

    8995caa08ff7dcdc9395ea38814fad7dcb69cadc86b820cdd44d1d68eb175251ba4d2cfc923bbc2753305b04e8ed2252a2b624dcd98df202f1ec2d0a7c71efd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb2656aabad28616076297961691950f

    SHA1

    56a35bcddbfc6ca0b80e37b5d8acacbccf40b4a3

    SHA256

    9614b5b54f5f52b68945dd3f04bbe3c2ba1e8a904f8e2106eb783d0735618a0c

    SHA512

    64aa1ddd72a7f6d26e8ec8d576dc675cd5e25c473d0e997249097e373c7f36bea29a0bbfc83c61d5f91ef41f16f52765cf0696584687c4a1e7d9c660e0930d9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66e17d5d4410f2854b12087dee278434

    SHA1

    fa5be6c4f94b39a558544963f8601c8317298555

    SHA256

    25dd1a29f68f55d796d08a895bbf06d59b0be3cdb424ee34362887f819869f5b

    SHA512

    088215f849dbafe06452409be0c6fda1aa5a3f2e0c7d7d2cb33d027d0aad9fef4d30b2a7ff963066f76b18c1767efc91a3e9cb99d64a27a75edbdef1563a6197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    899d4bd5a10defe521de02ca3a3c0cda

    SHA1

    c508e9c6865e47b83a2345bc5767cb1a341ee324

    SHA256

    2697b6e4aa9c9d839501dc27d61017b420476661aeb448fa82bc57d9bc21aa75

    SHA512

    1affd6ea0f5bef10b67853ffdd6abe5c193c5b7a8c96141efd2094f5e9d892961b89adf3851ad3587493144b3dcb2f0633f516a5b7f39de7f9c0cb6cc30cb67c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7229148ac0d860926a8454d72c05709c

    SHA1

    99f8b48650dfcfb8f359cf988d93816ae8c1c734

    SHA256

    e6dbd432632492d16880eaf9e376f32c9f26677880b917cab76b870b28a6aaa9

    SHA512

    ba480c88049a96f93efe239f9ece1f8e6487f64324456083d99d244be1122495e05f7062cd2672bc1104478ef44c54fd5a252f807fb87db038efff1faa4e3dfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    775caabdad9a3fd5ff9cf43140b73397

    SHA1

    d4e55e6d31e8425297ef4e30fad380714456ac0f

    SHA256

    39d48c2ef14f79fc5756c13c0df825409ace316ff6a803e79350b202646db338

    SHA512

    244fda2fee9bae2e7f603f726e98da5945d3858fc67cd90c2844d248773c5b5e79d9ae0519c45cd2a1e19712502a1717182525dfbebcfec52f571697bfbb0096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    380ec0e5e15d7bddfec6f0b0ee67228d

    SHA1

    1e3593680f6e49937acd04d132b3a73c6967a8ad

    SHA256

    687dbbea9de6d75c96e7ec7ffbb74a0554ef5d52610c5f5653a563df6c52892b

    SHA512

    1d6934b5ac3d8775f90194cb2e96317e7f58a0afca88f1d7c9d00b8ae89dc21daeca370d4a028ad177aa31e1fc07ec62d6de49195a8c9925ec1de3e694aa5373

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f002da25c0574b3fc15ae4f164622eb

    SHA1

    7e05b6f790eb0b202b62f1d2b88ebf491c80d6ac

    SHA256

    1b88dc70b50a254606898ba1cae112218e01b23fafe89b000268eaf9e7893ad8

    SHA512

    0f0aa846562a049ce9b17809ed936937c2c07b4dd54311dfb60f01873040f0a946f6cd1a58f067d2496d53e70390e5a298f62ed178d2e11d223479dbe0aa0d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e311c35d1bd165390606f3c8369a8e0b

    SHA1

    d25cef80b392eb0242aacc00d03e452af5c3bdea

    SHA256

    d57069b1585a8d1ce67f6de84ac60fc2fd4552356e24dcd67a5b8e383e4b63b7

    SHA512

    c7d6184ebb774fa59a77df50c99d690aa549ef3640e3ed50e726c989c1f63c5508caedb757d54711f7b3efd51be19dd9d3e4b420ecb683995b95086cf9a0452b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c342dd113fe3634b0a8512e6a7b3b9ea

    SHA1

    090a292b92dca3cf16f76d4e569900c5ebfaac99

    SHA256

    4c1cb812e2677dedc6e44bb3cf397cb63de5441fbd3fda11e7959853fe615337

    SHA512

    d469df94ee57d16e75c91465f20254b820535cf49bafc90474171ccaad747bd6d9d7abc8a7483ea230f5802ba2cb2405ccbc5cc9a50cfd001cc43c65d7f076b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68fc818e4829bf7f6dd849b8d0851aee

    SHA1

    50c4a220f6657b82804ad636d30e03fc419aa854

    SHA256

    b5d99fb77998518d5dbf5a3ebdfd3230aca1e0c712acec3d5a66c8d70ef6f2c3

    SHA512

    43df79fda0e4266a7ad944e578d886e2494714130d9f27c4b327f45034359993be39cabe2cb3bbcd65a1139759389e3c9d0d22968a7f918b59446e596e68a1de

  • C:\Users\Admin\AppData\Local\Temp\CabF625.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF6F2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1536-17-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1536-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1536-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1536-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2272-2-0x0000000012000000-0x00000000121DF000-memory.dmp

    Filesize

    1.9MB

  • memory/2272-7-0x0000000012000000-0x00000000121DF000-memory.dmp

    Filesize

    1.9MB

  • memory/2528-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB