Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 00:04

General

  • Target

    fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll

  • Size

    170KB

  • MD5

    8d1a318e14221eddf86af0c50f6cb8e4

  • SHA1

    162763d9debb02777701acceef260ee7fda347ff

  • SHA256

    fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd

  • SHA512

    18adafb8e7c14b101c7097e67d4c99da25d76a065893be945a81af03092cf025ef4940b21bc95eff7dea4d39dc014de783c30e8604378a56a0727a67ab3c0ce3

  • SSDEEP

    3072:bcwO/iTOdgWtJ6LkHn/rkiENpYrvQaSISixCC/xwp2rrUDf:bDTOdgWtYCjkR/YrvQaSrcwptDf

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58c3c0cb2c1e96ac214bae1ec68a7d8d

    SHA1

    42cc26bfde169296234cb99dac1d98f26fa2f338

    SHA256

    c637c9a468c68bfb3f5fce8de552096bbb11a428f9c17981006bf2130316ac72

    SHA512

    00fc4d332e73871f813204db22e6f7e557f853d5b3b1c6dd3f93217de60c43458bd409d782d50b9faf6da5905ad0eee967ef0cb79e71e103a9945c65f76f4cea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d0f81f1021abe4656ba65485cae989c

    SHA1

    0bdafdaa311d5009321bcf9aeadaf68cc654bf48

    SHA256

    d5e3ab430aae8cb18f0899e71e3571f165031ce0e612cfa71403c87633713dc3

    SHA512

    d926478d46a0fa8bfc6594cf020b829db3c0b8cca4b477c7399badd4ab0a2e267d0cdd9a34e73af1fba51de3d2cb8dbfc5175ed532a1e69e120519da5cd95e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6605c226d0e861caa8833e25d2f17d97

    SHA1

    1589458d61653f5bd17069febc087fe5f6cf57c8

    SHA256

    24b66eb77d1c66a2dc6bebb2bedacb24d53e32d732343b6485d4363f44aa0c15

    SHA512

    cadbd8d9e6d2015e3888ad993310cf7032c82173a15eb4b2abf771ac12005d2c2598876eca8333ff3fa4d432358834d50f30e388fc3ff3b487d4f592363b0b7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63d1978ba93dd0d64a7a3f109a5811a4

    SHA1

    7b1f7a8d531bbf4194ea8bd792864e7cdc67fc7d

    SHA256

    595605b582e187c5c5dccdd77580f4e07c763d7f8e75a8928b29c369a261bb0b

    SHA512

    6c1bb130df56b1ca05a6d2d71fc70d4b18669bd08831ef84222649b9e991a88c447063f04f587f5ffcfe237358b5f885ad67b03593093a375aba21e2e08223c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bab6f0a3a7c887cf4928b128fa526ae5

    SHA1

    aa7e0b35965b4a43313ae95ab7114e99bac7b83a

    SHA256

    d9e73e6ae052182b339f14958fcc75d3c9d544a2e6f49de0e2233d565314145d

    SHA512

    159ae958109829062d22f56531187b0668617c05ef77cca1849b0dbd00f857cff6b7f2cc550b1f8c0eba1659fba7c966301c38b68893aa0d644abca84a9b34e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b51282782b2bd602e0bebe0b98afa0f

    SHA1

    931b0acf40aa3644cae122fdacf32a482ae76c6f

    SHA256

    aa956d6bc275bf9fda198f0a4b9e3b6c41b9fedbb2e268820a1a2c601fad1540

    SHA512

    29028006d8f99a002f65dae03891ccd4a83f7e99bbd4caa0d9cd734bd49771da342c037e0341d177bf10c31c94dc47a3f9229aafc8c8d621392f13cb1e34eef6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ece19184dfcd34a74228336f55fc30fb

    SHA1

    c0460bcfa71c983d3e027038d90a5f41a720ad87

    SHA256

    aa98384ca266a5b323271df4324df269891e3e96dbb6335d440bc8c42cb254b5

    SHA512

    e3b0c849c60b4b72424f0ad34982b1754cf3f1118e54d3bdce0cba799f6c98d46dbc0732521f0b740fef45ef6dcee5fdabb20a462c2de480c95bf589f2e6ffc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7dbdac9bb0c8a2018179f047465081b

    SHA1

    4a4c37672af58be8cc140d184bc9e8eaca3cad3b

    SHA256

    d46818864306b0aea444b52b548b62b74b86fdfc85d1de9e336db84abc2cec52

    SHA512

    b31752c36c2abed6d237572b32761c7420cf30dd2945affb76b28fd76b4ea51fd1868e55ef59e0c36493cf86d1572cf3e3ac3375bb61eee05548bab7e9572a2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    071f640a07cb198b7a91cc871d8d4478

    SHA1

    2d04d90b0f031bc020bb78a8d4cbcf361b8e0210

    SHA256

    fd75b65837f1aa55456aac6b8f3390eb64e63d1c607ea024f09ecbfe9a2cf553

    SHA512

    5c945207352f4715ed238367feaa8ad690df49c2df749f503ae91c2117a96466049e07ce303253c57070e787c857ce622b1405303a651b1d568ade069cdf1323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54dee55f7b70981bb7f9c243ffee62cd

    SHA1

    e19499cf92daa97c80ad4ce34fa9f561ff47713b

    SHA256

    2dd23c1c4071c5de702f2ba51eb1c56a1ecb3f9ffeda77f895fb5a5687f471f5

    SHA512

    6534fd2719e8957db83c00935bba911bcd07df84e4d2ea18090029a602acac0429a1bb9305aca232e360a2bba9c4642537eb12a72565b26eb6aa1a5548038d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfb6be3b61b1b5a21cc4f7f1d7c07cb6

    SHA1

    b083a55e362bee2b2a6d17401302e2f38dbacdab

    SHA256

    08dcf23aa5663b5d16d4b6a50a5572dce6fd7f01a468f5e8eed1503039fa0e9a

    SHA512

    d97b99bd5b1ac77ff65b15f91de947927dd82e7d9b4cbb9f414a1214cfc127e21630228ba77420e6b63a5ed441c159c88e8d1abac3f5c44a015a9be1c28f5dc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22510421358b91bbf9f6124be39e5a2f

    SHA1

    c26005b851f08306308426204e597ea7df255679

    SHA256

    520304736afbd86f88ec2bee11b39af2386a80d13df346fd4fadcfb8192ffd88

    SHA512

    b405badb5a05acbcd161cf41f8190d7f4603f2ee20125d7150fbcd5a5ac89afae356c3809bf234e99114cf2388cd6aab323ace853c53225f7b58c6e81df05942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a82f5250d6bd70e360ed3619dce1c97

    SHA1

    dad9a59cefd058a818ec65a6756d28b36d02a3cf

    SHA256

    24c6b81e636cb02c06700a5a53de18994a650140e835976283ec0d5ae1a6419f

    SHA512

    0c31bd1275c99dccf56d8e8ec3678939d6e9b424c2343f95c9f382fcf3882a41e42e42a5293b61a7a10884110f7ca3c16cf98c4dd73b30cd93283055f52ed327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b517a7babf6e9ad362c431df13781159

    SHA1

    319e8612e54a804d624bd61110d5c42c3bb3df50

    SHA256

    e6e5a4b7987393535dcf5b78e2c41187f9fe8a4ea4b12ecea28c4aa83f64dee5

    SHA512

    75ba0a8c924a91b111e6813e375631b3583e5bb1cd704556ab54ed403105621e039525015e51e2757090e3bb5c57f89787ce22e0a5884faa16487272c6e19bc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    870b0605f8d23936b8bf305a87970d7f

    SHA1

    fea714761e72b40a6516aeb8319ad038ab3a9fc9

    SHA256

    70b9e3f05ac0fd393c6681695d6962719d3a1ae3ec9d4bf016d3647947cbb90d

    SHA512

    2395079eee8cda451d6ed4a6e389621eaf7158d3dacda108faec493d2afa478bfa7994e9cdcdfe253b5eb4ec48da74fd04579f5e950700220e2c70c4f3fa1cd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa2c25f59ea6dc086a3db2c13cfe879

    SHA1

    a08ce39e8bcfd07d1ec4a907cd2098bc010f6410

    SHA256

    b39dd6ce9ac728e8aa38818a46d7180c06b6efe514f105e6153f1551210b594c

    SHA512

    466a412af833d8a7fc0793a70067e2b6199b7b41b86ee2b2acac8d1c31cf8bfda47831d586fa141c7fd256c9cb9594d0608496a502d48fcb0048c570f933dacc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ced254f847052280d6384da3bc304d1

    SHA1

    550f68d7a9c16a0f64f501358c0f667a48795583

    SHA256

    9f6bee314dfa1125fec9b17e8dc4e0551eff63f2ceb0beba5ff2ffdeabf1af12

    SHA512

    59260f0a9619c001f0d984b360d27519f81d0ed8b0c7da9c2dbc2acfffc1a5f1f2c3661f56c2894ee5078cc500f520e640bce49ad77b6df033bb74e310e42f64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    257f43d8af780863e33b2cacf34723db

    SHA1

    b08cd22add0595f576b805cf5c3acfc51646ad39

    SHA256

    854e2e0ef37382ce1fcff9222c96eb935ed5181c3e132bec04d3807d7ccf0103

    SHA512

    d45cad7bd380c804f9cc7652166e34815b4755b828021100d4aad703669e673e53700d0b985c330e6bce440b899da9cfd7f4c157606db9940d913eefbe7b2c47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce57a7a0d757070e2059ff3510f0f23a

    SHA1

    d3f4e4ab94a073535c631bc0e887bf2e8ee890a2

    SHA256

    ac5712dd8457296ec5bb3e91161ff4e10036061939f3c50b6dcfc1f283f8ec83

    SHA512

    42b5d2e4341b0ef1618ca92497fce646e80bf3a62079bb93b9d1b3745c1822ac330a1b5b3c581c3fe637614185ac6bae4de4969ec5f87bef234eff137c1f5d00

  • C:\Users\Admin\AppData\Local\Temp\Cab741A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar748A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    134KB

    MD5

    774b9c11bcc0dbf50425e3935100b905

    SHA1

    519338139ca0deaa4b42e056468087e18fd1f253

    SHA256

    be6cab2cfd23bd5cd633264eb9a7d55f0feacda3aff05db031af04a531585590

    SHA512

    6d9a570b441f96013bc5ae2bdc6422beb0f48c3953da00e2443e94de531f8abda9ad8403380543f95e0ac16d84985e1a5829556ff7bf26fca85afbc86fc07872

  • memory/2664-18-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2664-19-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/2664-22-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2664-15-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2664-20-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2760-13-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2760-17-0x0000000077ADF000-0x0000000077AE0000-memory.dmp

    Filesize

    4KB

  • memory/2760-16-0x0000000077AE0000-0x0000000077AE1000-memory.dmp

    Filesize

    4KB

  • memory/2760-451-0x0000000077AE0000-0x0000000077AE1000-memory.dmp

    Filesize

    4KB

  • memory/2760-14-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2760-1-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/2760-11-0x00000000004B0000-0x0000000000527000-memory.dmp

    Filesize

    476KB

  • memory/2760-12-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2760-3-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/2760-0-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB