Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 21:40

General

  • Target

    ebe670d435f8ee1c8a403f5c19d2626aac45c5c31f90e667e04c84b56939c16e.dll

  • Size

    171KB

  • MD5

    a3ee0c445adba4b7b5a916b5546924d9

  • SHA1

    623d2fbb3c1e865748a3fa4e4829a8db042542d2

  • SHA256

    ebe670d435f8ee1c8a403f5c19d2626aac45c5c31f90e667e04c84b56939c16e

  • SHA512

    d9143c8a0e2371d98002b448d47f7b25efe5fbbd1311fe6ff07341b5b81f4bfe06bf8810e318515be0903f6d6675c60754e7c4ef0e1cee0e3df9963924fdf000

  • SSDEEP

    3072:bcwO/iTOdgWtJ6LCHn/rkiENpYrvQaSISixCC/xwp2rrUDA:bDTOdgWtYAjkR/YrvQaSrcwptDA

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ebe670d435f8ee1c8a403f5c19d2626aac45c5c31f90e667e04c84b56939c16e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ebe670d435f8ee1c8a403f5c19d2626aac45c5c31f90e667e04c84b56939c16e.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7ac982192411746bfb506fab21861ab

    SHA1

    4163055c27a08e04fad9cd447221a2e248594217

    SHA256

    45c192053fedcf5f28c193f01f8ad63fceb3c45d5a88c5d4d82c050812852f43

    SHA512

    b626209b4663c3fa33ec553a98285150c22f677cd745ba6c8a4b98d31cab881f32725b77fd96a2f5e1b2fddb118929447f72254f8e1a4206474fd19bf089a554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a139c238e7a7bb8e47380495735c6277

    SHA1

    27647cda4f74a28e5a662d44384e499dc271c0af

    SHA256

    c6c60b8d0d3a0b32647e3f0689268fdde90b42536e0dddc2ecd82543ee8ed611

    SHA512

    c0b45324397ae1fafc1176b961c573c38230151e75f24fed6d32e99f8fb67ffe4028990689441d77fc3d1f43b445f455c1425ab84970e52df1106ed4cc8ec129

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9ebd6e68c5bac41ec372407c27a46ae

    SHA1

    7118cf15f34db772d967471f534bfddd9d00ef50

    SHA256

    6b2e54148d5431e4c39b1dbf556b1589813e9b13a7b4871f6096c98d5e4987e8

    SHA512

    ff4d69e6ddc9626a82a40fbbcfffc1d2fcce768822abf2912b8240dfd68016b6cc585ddb9ad69cca253268764514bda24d04ea8c0233aa0226d2c56566c4023d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fad339ed81a3819bcfa1ef0ae81d045

    SHA1

    a5d70b1b2bcd64d7ddf3b9caaaca4a7374eae749

    SHA256

    dc28ce0b7fbdd27c00e48e82cb77aad0138de99798d7678c76c7c4b925f8e292

    SHA512

    cb911ab45d690f13dc374454dbe9447d4aaa86ff3d5450668e271f7c4f21a0de58500186373a2cbfbb46ec58846b951407ca95af3c159ec44ca1472be0e95e99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0a080e9fcdc3ca9a1c581d9973aad76

    SHA1

    36fb594b6ad4bf6da3580fd6b3e20b6d0b4c725d

    SHA256

    9ca2b3be40b2c97b598f410faffbc9eeb98c59eeba448cf61b66b64e3a0d45e9

    SHA512

    db4d27ae71a9368dfe4e4c2b1d48d4bcf7c1bf3220c85c45f80846911cb05a336046b7c2cb255a1021b11252533fed370355b86153e1f1bbfbe1edeb25561065

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd9bca37c730b82c231ef77fd9b563a4

    SHA1

    a8cd83e2e24f538aa73291fa7f070f06bba519d1

    SHA256

    37172a6b0bb82dc91238c9b1443fbc4d6b975458282909e174709adc9877672d

    SHA512

    1dae2989fd72fa948b987b36947a2ec20a651c6ee87ab186c2dfe61d71e255c41f8c6c8ffbceb58fe65b901de0fdc87e4348a53422ee909464799597d30ef678

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8906f2d80d8431898cd25e197afeb697

    SHA1

    e201f85901b9bad95252aeb777847c2a2e26d38c

    SHA256

    7c4a88972229ee1acafa8eb5618363792218736dd3ebcaf7ce3104232ca8f91e

    SHA512

    2417e61fbfc2de76dc6046a2a466bedca25d11a61b18f05ad5b6a021e12a1cc3e29d7fa3c198c6da4eeb554ed342960ec442fda98ff4defcd0d21e4a4a23325d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b302ef8e9b5805bcf63dae4c07ae25c9

    SHA1

    69e2aaf10b546ea8e6b2ad2938020a83761def5e

    SHA256

    d32cfa7be7ce2643319d9b792eb55c32991f77db66d2a193c098e743de4e6809

    SHA512

    85dfe6bd36ab2c81e7e8fe1a999a06215f3d656bd7dee8c346232789435fbc4c8c51c02e349bf48040d28fcf68b21ef056b488139b39de606c9ef4c4e598c84a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4019a06832e4c7f014fc3a1809149515

    SHA1

    3db5c57cc45528958c7bce062c4ec5445fcfb8f5

    SHA256

    6d106d823e7b7f9d3a3cf8b4b8da74c61eda1c17c0ec984924fa2788d9c2bc29

    SHA512

    7b4aabc8bc9e081b6b1b466249863af49d4171996721c00b954899bb50b3930031d8da966b198932a90f3bb549df34064bdd1cca097b68ce60dd2a35d917af10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6321cfa7c5b62bb9e3043eaf7023fea2

    SHA1

    89b9dbec5efd5e9a4eec716933d4347850089385

    SHA256

    9ab36eee92aa6ceddf8278b89db3a6a98be7f57237a0b557646a5c28a7bfba9c

    SHA512

    393c24c2c7ef3f1d3d503270cf518b90f818053019d731f7394a0aa7dc63ba4245d9b4ca5439de50842e44c00d89f73a099614b57509e9ba73e92000f7d1b9d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    894871666cdb999305111e882d90a650

    SHA1

    f678e454090dce716a8b4a73c81a667352ca68ad

    SHA256

    a559a7f5d6b29ebb24dbdb28f7c585d4a2dceb9d4bad39f1c1b8950be31f6afc

    SHA512

    152495d647d0d87fb4def13e3ca043aa7f722d79538d5de4b652329c3c7fd671fa2cae2205728d8c331cd9320a61e6fb5fbcb38b3d0f6cad5168c621aeb6a9f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b050a9cc4081eefdffccf1a9b36d884

    SHA1

    e303d79ee0b8ea7f1bf96897897b7fd082b73350

    SHA256

    e1a572ae26d4f4fa4806f9cfe20e1ba174cc920b3e655499d8431546d30030e8

    SHA512

    cbf16cd1f37fa09bf84a156d4963cd0851db307e4fb81f5ca930459f9c6f34187921f3fef7e82d0bcf2d2aa703e3f753a5ec3ef49f44599db0fe28d495896f3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d619cc05ba92f295cea975c85fd4d94d

    SHA1

    86e2e7e0acd6d3f9cef9fa1af8ddf5289de87db4

    SHA256

    97e51854678ac7b6b1cf95508853f8c8aa3535fd16ad47f4165822e0aebb7913

    SHA512

    a578e045f024a7b44faa010b40208af38e8a52d903b39741ef6070fb981bcf95bbd37a81d4a3a25d78a8a0fa96b2e5c7c3263e655d3014ae41d90b085783309e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b3ff3f5ae8ff98d6f7bd681a0718268

    SHA1

    d67cecbd5f8d1b267a20dcbbf2258d65591cf528

    SHA256

    adfa3a0fe7cbf17f9d684227db4cf5f2f865c485abd30b395d4ff0a748ca4703

    SHA512

    ed4ab51ff36d49a0a629729bdb329a1c90f96aad748c9d29ce25c78fe29b92e58f1f2d096b7a8e21631d0621694c8e7a488ce0a28a5fb355e5165d8f25ca7a55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b837b98a4809a94516a8e45815981a1

    SHA1

    7cf53a77196d212ffd1cefe81e47b17f2f3079ef

    SHA256

    8ca94aeef1ee4d8ab315d8f14ff37365c0fc92569b79a0a3e3e2a3ce088c864b

    SHA512

    350df9ba631d132bd3d8ba94edb696a8f728d389b42895f03441b12e350f7dffdf92d40dbaade0f3577b6d850fa7335df355aee9775552ce4eb548ca1f1383d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af4791c6d398333af4c8d5184a5bb128

    SHA1

    e2ec8704fd623422914e0902d046891282a7147c

    SHA256

    c47a6b1ca35b9350fa179286a6dc24feee21a07796fd8cdc6606a53bab365c74

    SHA512

    492331a2776c45a8f7588b40d5df08ed1e39654359b06e9e5a75a2d8dca1342b2c8f2aeac2d5b5d39e0fae300b12e35448aaedbd46bc034f35a18cda15cfba3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df65cd1bd4bb73510bac191470484858

    SHA1

    da8225e6e35ea44f11649f48e8e4b6ed8437b765

    SHA256

    36b3d48eb4ed4db7494df23bb37fa79e56d004289dad16ca4b24e0bbacbc04b6

    SHA512

    7c6d1f1d2e508e33e2604db2e74e39a876050a8f292e56f44488b0e9de7b35d560cdd98e7ea0e17c45d67143e994ab54bc822e0f0e1c180335a73162469b2359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73ac83867048f1e5e30a7ff9b40336dc

    SHA1

    22cba6cdbca004af369e599145ba0d136d0de073

    SHA256

    c42e7af342b6d05e65276089e5a29e7a79db7c658af74c18834cfe39dfd65281

    SHA512

    38950d89d5cab073ecce0f8822c4f9feb32ad4bfae1faeccde3cb13b78e15847dc8308f695a209d03613ba29d0668592e2c886a0a74d14872ccd95711c68cfe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc0cbe7cdffb6c1d7f5b8c493843781d

    SHA1

    325345b607e11a4eae6432292d2b4554fcb1e83f

    SHA256

    a7ad042151a680c17a3c8b1c786bcdb2b0256e50c115a7578fe9529fab47ecad

    SHA512

    d7db9a13ad11fbdbcfa9e11e66783cb108231b727425da601884c5aa36acbf33f860d840cc49615b0ad58bd5ac30b1855358ca041ee5326a242323b891c6eb63

  • C:\Users\Admin\AppData\Local\Temp\Cab59F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar60F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    134KB

    MD5

    774b9c11bcc0dbf50425e3935100b905

    SHA1

    519338139ca0deaa4b42e056468087e18fd1f253

    SHA256

    be6cab2cfd23bd5cd633264eb9a7d55f0feacda3aff05db031af04a531585590

    SHA512

    6d9a570b441f96013bc5ae2bdc6422beb0f48c3953da00e2443e94de531f8abda9ad8403380543f95e0ac16d84985e1a5829556ff7bf26fca85afbc86fc07872

  • memory/2184-18-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2184-19-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2184-11-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2184-21-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2184-10-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2184-17-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/3040-450-0x00000000779B0000-0x00000000779B1000-memory.dmp

    Filesize

    4KB

  • memory/3040-14-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/3040-16-0x00000000779AF000-0x00000000779B0000-memory.dmp

    Filesize

    4KB

  • memory/3040-15-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/3040-9-0x0000000000210000-0x0000000000287000-memory.dmp

    Filesize

    476KB

  • memory/3040-7-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/3040-12-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/3040-13-0x00000000779B0000-0x00000000779B1000-memory.dmp

    Filesize

    4KB