Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/11/2024, 20:30

General

  • Target

    120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4.exe

  • Size

    3.5MB

  • MD5

    698e225b1e677a2059c86bbb3bf89f3a

  • SHA1

    805cbf52381a48967b064a12075946d110d48ca3

  • SHA256

    120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4

  • SHA512

    efc22602280b0642fe22c3dcc8015d1a859b80a79f4adff23631e959a2a827fc37c3129b7abe3ae59d8527e174036dd00a98708b3dce8a912c077c4282773d55

  • SSDEEP

    98304:U9PazYBVkS4wagSkc7NCVDOdKtRQQQbvFLOAkGkzdnEVomFHKnP8t:MDoYOdKtRQQQbvFLOyomFHKnP8t

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4.exe
    "C:\Users\Admin\AppData\Local\Temp\120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4Srv.exe
      C:\Users\Admin\AppData\Local\Temp\120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cef2e979e22f8ee101f1addf9ade4d4f

    SHA1

    ca4799029249cac1f29803f7036fff81e28648e6

    SHA256

    6edb584a81b3fd023cd693d9b9f24ea2b995039c818a81f0b8358f1623847794

    SHA512

    272ec77be6414d574953115fc44e45dd86d541828457e3071b93c489075fb6424bc3f036cda2278cf5fcfcf8533abf1fc19549d1874c2f1c48bc12a4ec6a2bd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d729bfe561b509035e04fa886bca793b

    SHA1

    2fb73502f5ee5a7679b7271cbad5370d15b0938d

    SHA256

    f15034a9050dcbce2d2a80321067bea74e15c2abfaaefc9cc8a2f65157cb69be

    SHA512

    c7cc254472dbef740a2d3ed1da711933ff4e850b767e04cadf433970c7ae393699cba596f86b8b9c8ba4689872108b9e4abdbba2d09d453e063318c4b4541e31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f78c0c92126fc408453f016e18f9e611

    SHA1

    de76e92bc4d6deff569e0e94c45a917d9be48010

    SHA256

    f3fd4c40065d44f59bfb3390fcb941c2c20fad26e1cc43f32dda111d799240f0

    SHA512

    6c8cfc108790ea9a7be7faaabfee4ec00c0b232ee7bb6da9f7162ba7f1a62cbf3389aa7d6f841e23b492993ae0e7f85ea6a03aa5e189fffb52bbc2e0dbb5e5ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    478fa0eef158b928453130af8c32be10

    SHA1

    5eb62435b8214a8235fd527d733f9bcb6e6489e5

    SHA256

    18e963bac3642e0de77a449692611186311f53f40bba0491fbaaccbcfb94a137

    SHA512

    ed35b1f54296f98bc8bb405295e8577d86a8ffa76773b92b6e11785a27435b0d4fc0bb751c0d300c13fd00d9a33c436f185be67c0b104d639acb17fb175191b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dc502e17cb6436252c0eb34c79dbaa4

    SHA1

    3a1ec43f16b6b26ce6609c0be223a772f1ffbfe0

    SHA256

    8102b99f068801d4dc185b8736fbc8c73a003963dff02b86bfff5ea1704068e3

    SHA512

    0df02400f223f624ccda2a6f7efb4498ad099ff6c47edfd2c7b0423c976aaaf312459bb7a206ba06645960a6c0944f15e0f7c449e47a5d105b5cebad5d8e91c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef7a3bc53bce4a5f7a61bc9b639ae361

    SHA1

    29185a17358af41e5e02bcaa06a3e14c8fd86429

    SHA256

    efe91e3cafc714675f185b4e9de278a9ff577ceaf2160987587c24c1eb88bb37

    SHA512

    6743f25ed49e298ae76c3913046e2df858eb5ec559b075c47688ec334b3da2c2eedc0db52b683401135968ba1e11066b9321a868edec563cf9d7e0aada80b7c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c207b58db92728cef27808f6ceab68f4

    SHA1

    e9a267971f172ca33d4bece466fb527ae54ca095

    SHA256

    24593e1fd317781290a5b16c584884bb64570df91928f5db1b16381937986234

    SHA512

    3c15f3fc80791a712355aec888ba943616314374eac997ab301995adc3277a6cd4cd90d570a9f263c33fbb2c4b5166b56c7ceddb85ac546d558fdc99aba9ce47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83ee44418abe05f773307a46e80699d1

    SHA1

    6978ab975f2457950dfaa43dff9306fa9ffb85f6

    SHA256

    e59655ffa36eab3ae2e79b7e1441638749bcb3d020a58dd2708b96f67da25911

    SHA512

    e3b9b89ae949cc19e119bc01c8ebda26f35a6dc71bb4a402eb89408bae66bc4fcc1a5510af804fc7e9fd6541de2c8e4d348cc13c641101bd2d6b4be0a7f58f5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82648969002a60cbe7773980d144d9fb

    SHA1

    d0a9e57201ba27227a7be1864c84a33939e8097b

    SHA256

    1c3c4b787bb07c8ca12ff092eba9baa9d962ae3c6c1b221800a3015d5a799359

    SHA512

    45e385de7797f58f46f6653df315087337aa0842a170c4a251fcc37718bcad3bd05ed66b3d25712cb452df935cc00181f346246b1e5c8602354384075a82c227

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21146cb6d129662cf7500622faa5db57

    SHA1

    4403a6f76ec9dcf494ce6684d950ef925e022f36

    SHA256

    8b33b8934bc1079bb6d87ecbfe34c88700b6129cc612af6c2d7f8db62eadbc70

    SHA512

    c1c050e560ee2aac0af64ed5bac74998c505cb8fb33607c2dd6d9ed41f1e0cb97a3ca3b213f6bc52c60501b3613c73d3cdd502b8852a557edc406a3228a4e985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f16f085c6dac527ed4465d7b06ba90df

    SHA1

    d8d8237eb80f4fdf49eb459e8247c28880a29aee

    SHA256

    40f96ff49e7e29f7b93a7a0c109f970252aa167c991554019e257bad47e0e477

    SHA512

    78ce6b0d68a207b859da112e1c7737eead54da75dd8a1fd57c596f7d2f1ae6708c405ca68f5e5484c74a4335675a742117b63fdafb32478b48254844eb125d09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    029ba99057fb82715d1bfd46d44cfceb

    SHA1

    faf3029650941952f42286243ebce1f520a12eac

    SHA256

    485e4cc15048436b71630ed48a9f5519417105d00a8e38d0cb500f02380b7598

    SHA512

    aa8adf27978fd9690392db373d36060204d7bdb3b41f745795d7003be3d0d4870fe3b933091b4771d8a3c8c29e9849896d85f44265274a09782408f794aec6b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7854dd6b731741be03e9815cca37e91f

    SHA1

    0bddf2c76c7b51805e0cf9486373bd1029a526a1

    SHA256

    f1a8ce4fd26680e91a9a558fab7a551761e41dbb396e3c6f790495fc5e822fab

    SHA512

    eee8b62e8d5ebd3d1ce0970e15c7a686162deed73527bf93fb99c89e67c4f337fe760b3a6e95f24fe00dc4279281fa42495ef79eb1ecd80c9da8b10a9a7aeb1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    032a767abc560cb9ecd1436718f43136

    SHA1

    5c48f80524abfecc84401602d42b50ab53c302c2

    SHA256

    bb3248638ede7eb8be5e16711e7d9a6479b9d5a515c16b0ea9c5f8a7fb9a811e

    SHA512

    3500c357b13e2185b078a26636ce120948b851f640d241bb0897fac948988ce9b7701470c54c6b6d0beb2b44765854243132c0c0a43d4140aa4a47f313747c82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    028daf5c2c94102727bae31fb84adeea

    SHA1

    c3851bbb25a266a5e83f05719849e06ed98a4909

    SHA256

    04a7f1b1200fb51496348e69baa9baa214d46b1c9feaf7c1320b7dc8428ede5a

    SHA512

    03b011374b29d7811fcf7c41d97badbb2141d0d2c55854a5a3017d29460ab6da8dd81a7a0514607e80c9009422407d153b85aefa9734e4940af847b3627578ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88097f6d7ae35652cab38bc9ebd88b1e

    SHA1

    6e0237bdf97d6d2c2f5dddb25de36be2cb4f0054

    SHA256

    05b4d9b5b6b78116fd98c901788aca726cc2c88cfc0849d1b89f5e493b41fcf5

    SHA512

    d9fd4e89d562ad1aaa2ca50511c0125d4cd1811799d35bd2e07385e7ff24ba90b1aeda600e5924479e7ddc31f50df5457a296d60a34ae96b5c7d58d253aafc71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac2c718fa1685c660222de2fb2eba947

    SHA1

    90a53454aa5e4abdebc42515b1878b15dbb2b709

    SHA256

    271f6a7b90a3b93e0e2b0da17e31037b213322631e8c15eeed883962c28008ff

    SHA512

    fb44aa7e11fd20e4a7f8daf3496b90c4a4fa592cee57d4c17fc1a99f70eac921841671163f4065293b00809cbc3d3cd5f1993b18f5d48ec7d27fb91db2ab243b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a24306f5752fc9d28555e6399806e1fd

    SHA1

    4a9b1ed4f97f13f85bc5bb07d90adddafe9bb7e4

    SHA256

    63c7915464c3e7382fd30604b9c41e52db78cb3486d79b62ebdc7948265b8281

    SHA512

    c6a00d52780617b29726d8eb2c5d731f81e851edd63e12a3b1eec2ad6cdcffd5ffff3d93eaebf2136ea2f5ee0223ac9d2d16da4185e66e012a90c56aa6e237b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32ca0a705aa763013fff1725ed6223e6

    SHA1

    20dec57aa18a21fe523800d5e058e080e9e98ee0

    SHA256

    7772e0c46d3d7eb14f7d480398c6bd4cdb7e1d0dfecfdc5881ec6146b34fec91

    SHA512

    8772e7547dde9017dfd6d0dd619ab608776650089460842b1e1c0bac7948066f84d80cb4957585e72795c15409527f67db3c811a8ad30735809a82c811ded4b7

  • C:\Users\Admin\AppData\Local\Temp\120c148dfc1655cbd5e1889d9735960a0ab455ea71f272a3b010324ae7cfa0d4Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\CabFB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar17D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1160-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1160-9-0x00000000002B0000-0x00000000002BF000-memory.dmp

    Filesize

    60KB

  • memory/1160-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2440-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2440-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2440-19-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2440-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2616-5-0x0000000000210000-0x000000000023E000-memory.dmp

    Filesize

    184KB

  • memory/2616-0-0x0000000001010000-0x0000000001393000-memory.dmp

    Filesize

    3.5MB

  • memory/2616-24-0x0000000000210000-0x000000000023E000-memory.dmp

    Filesize

    184KB

  • memory/2616-23-0x0000000001010000-0x0000000001393000-memory.dmp

    Filesize

    3.5MB