Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 04:32

General

  • Target

    d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll

  • Size

    284KB

  • MD5

    be7a6dc894be83d9b5d6c87d5457af6e

  • SHA1

    874488c410c4b3c1d21bcd4a1e61f1f68596349f

  • SHA256

    d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e

  • SHA512

    ab3534e496331b96c857891114af9bd364a2b4f750140aa7fb72deb581aecdabfa3d77c057d1d982850333759490c8980937534c8c2cd162c5a0aca4cde4c32a

  • SSDEEP

    6144:dMqWfdNAFK/p8O456wg+RFxj3OWmgvWruTyOQMYp:GqWfdNAIpV45a+FxLmb5MYp

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 4 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\rundll32mgrmgr.exe
          C:\Windows\SysWOW64\rundll32mgrmgr.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Program Files (x86)\Microsoft\WaterMark.exe
            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe
              "C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Program Files (x86)\Microsoft\WaterMark.exe
                "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of UnmapMainImage
                PID:1384
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
              • Modifies WinLogon for persistence
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              PID:1492
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1040
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2628
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    511KB

    MD5

    668b2b514db91461744c865ba50052bf

    SHA1

    37168b6eb2f887e00d834ca12da9058feed6d773

    SHA256

    c1d2ac28275c295dadc80f09376af124b9de953467717bd45af903b0ec80c096

    SHA512

    7716e80f001bd196835f9cae56e768b342299ee6a5d08db59959a1b84feea1a57d4484013b9564f67322d7db4394b834e71fbfba8536d4770429b5f9b0de458e

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    507KB

    MD5

    cc603b5dd649c5ac7398f9b3c9c2089b

    SHA1

    d3448523a8f575efc90104bb212104f3d4453bf3

    SHA256

    fb9af04c32f8045c287e810811038e58849b9cb12533d13080ae7fc6621b59e3

    SHA512

    bf73fa27d37311b38d7878c48a6f3ef7814bbe8108e28cf545ae5eaf812e45bd8a84285685dc4d3a12453a7cf6c4d6374bf7298756b0bdedfeaf142e0092888c

  • C:\Windows\SysWOW64\rundll32mgrmgr.exe

    Filesize

    123KB

    MD5

    04161f533ee93611681445f8a165ed68

    SHA1

    d3f4b2bfc8b384d2602989082056751ae21b8105

    SHA256

    97e8d8fefbd8aef88875b7373e6a5ec0ff0fa02fc1b63af254d8116e6d959f81

    SHA512

    4e3ad0bd23e728966e7f0d86fda0883bb8196d9eca93c6c9633c3b786c451864fabd9f300fb7355277fb8de334c1fe5cb54b01c2ad88c3e51ad7fa221a57119f

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    249KB

    MD5

    725aad1265430294dabb34fbbdd37b60

    SHA1

    e6f02781f9dfe58ba653554d45ef027646638d41

    SHA256

    c305dd145312babc4bd84cb9b1f998f81ed90b527b52666d68add509eca1b5e7

    SHA512

    7437a4b7b9ea19267d71933ef1fb18565ecc00516dbed0b49a3b3300be824db3509aace52baa96e5d31143d8aff9ec8abb6499c620e5f5fa403f4f2c741ca1e9

  • memory/1384-134-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1384-130-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1492-84-0x0000000020010000-0x0000000020022000-memory.dmp

    Filesize

    72KB

  • memory/1492-116-0x0000000020010000-0x0000000020022000-memory.dmp

    Filesize

    72KB

  • memory/1492-112-0x0000000020010000-0x0000000020022000-memory.dmp

    Filesize

    72KB

  • memory/1492-86-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1992-13-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1992-9-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/1992-1-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/1992-10-0x00000000001A0000-0x00000000001EB000-memory.dmp

    Filesize

    300KB

  • memory/1992-14-0x00000000772D0000-0x00000000772D1000-memory.dmp

    Filesize

    4KB

  • memory/1992-15-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2544-28-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2544-27-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2544-26-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2544-25-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2544-24-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2544-53-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2544-29-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2656-37-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2656-35-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2656-18-0x0000000000150000-0x000000000017B000-memory.dmp

    Filesize

    172KB

  • memory/2656-52-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2656-11-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2700-181-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2700-82-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2700-56-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2752-111-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2896-60-0x0000000000120000-0x000000000014B000-memory.dmp

    Filesize

    172KB

  • memory/2896-73-0x0000000000120000-0x000000000014B000-memory.dmp

    Filesize

    172KB

  • memory/2896-77-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2896-57-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2896-182-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB