Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 04:32

General

  • Target

    d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll

  • Size

    284KB

  • MD5

    be7a6dc894be83d9b5d6c87d5457af6e

  • SHA1

    874488c410c4b3c1d21bcd4a1e61f1f68596349f

  • SHA256

    d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e

  • SHA512

    ab3534e496331b96c857891114af9bd364a2b4f750140aa7fb72deb581aecdabfa3d77c057d1d982850333759490c8980937534c8c2cd162c5a0aca4cde4c32a

  • SSDEEP

    6144:dMqWfdNAFK/p8O456wg+RFxj3OWmgvWruTyOQMYp:GqWfdNAIpV45a+FxLmb5MYp

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 10 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d46b1c21c4acb2e49fb8d024501ccef602361ac5915e00b3143a1899419ba17e.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Windows\SysWOW64\rundll32mgrmgr.exe
          C:\Windows\SysWOW64\rundll32mgrmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:116
          • C:\Program Files (x86)\Microsoft\WaterMark.exe
            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:4204
            • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe
              "C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:3612
              • C:\Program Files (x86)\Microsoft\WaterMark.exe
                "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:4048
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\system32\svchost.exe
                  8⤵
                    PID:3856
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 204
                      9⤵
                      • Program crash
                      PID:2360
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    8⤵
                    • Modifies Internet Explorer settings
                    PID:3200
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    8⤵
                    • Modifies Internet Explorer settings
                    PID:4288
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\system32\svchost.exe
                6⤵
                  PID:4936
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 204
                    7⤵
                    • Program crash
                    PID:4024
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  6⤵
                  • Modifies Internet Explorer settings
                  PID:2548
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  6⤵
                  • Modifies Internet Explorer settings
                  PID:4756
            • C:\Program Files (x86)\Microsoft\WaterMark.exe
              "C:\Program Files (x86)\Microsoft\WaterMark.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:3056
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\system32\svchost.exe
                5⤵
                  PID:4000
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 204
                    6⤵
                    • Program crash
                    PID:3460
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2480
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:17410 /prefetch:2
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2372
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  PID:3872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4936 -ip 4936
          1⤵
            PID:3588
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4000 -ip 4000
            1⤵
              PID:3452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3856 -ip 3856
              1⤵
                PID:3532

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                55e40aa7a274d26f0bb8e2117239d1bd

                SHA1

                3174d1748da1dea0226e5b485400c5a139b6dd9f

                SHA256

                1d11d5b7b9240006ea7860d39703d111fefaae92f3c67259f0c743417e634a8e

                SHA512

                4b6de1f6ed69e04740b16428e984e1476c0e3ebb37ab8893454a1c271c2fce65fb5c4a355f1db0eb00560a6f951ee8102fb9629abfff5fd1ab363ef53cd2253d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                1b45f821207f9f6b1ecbb380388bcafb

                SHA1

                a55cd8ffd92ceaabee171283c649a8b3c058bf75

                SHA256

                5f486a589d2ae7b1ccd66842b796c4ec89013c5cfb19eb0178f7120741d441f5

                SHA512

                9b3b6048946327d9008009424aad88eaaf94a330ff1f29867b61fcf9a164579cf169e4f7311e83829ae634170a1024877c2f716c28d5c4d32b13a66991eff9ec

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verFDF7.tmp

                Filesize

                15KB

                MD5

                1a545d0052b581fbb2ab4c52133846bc

                SHA1

                62f3266a9b9925cd6d98658b92adec673cbe3dd3

                SHA256

                557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                SHA512

                bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0GUUC90F\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Windows\SysWOW64\rundll32mgr.exe

                Filesize

                249KB

                MD5

                725aad1265430294dabb34fbbdd37b60

                SHA1

                e6f02781f9dfe58ba653554d45ef027646638d41

                SHA256

                c305dd145312babc4bd84cb9b1f998f81ed90b527b52666d68add509eca1b5e7

                SHA512

                7437a4b7b9ea19267d71933ef1fb18565ecc00516dbed0b49a3b3300be824db3509aace52baa96e5d31143d8aff9ec8abb6499c620e5f5fa403f4f2c741ca1e9

              • C:\Windows\SysWOW64\rundll32mgrmgr.exe

                Filesize

                123KB

                MD5

                04161f533ee93611681445f8a165ed68

                SHA1

                d3f4b2bfc8b384d2602989082056751ae21b8105

                SHA256

                97e8d8fefbd8aef88875b7373e6a5ec0ff0fa02fc1b63af254d8116e6d959f81

                SHA512

                4e3ad0bd23e728966e7f0d86fda0883bb8196d9eca93c6c9633c3b786c451864fabd9f300fb7355277fb8de334c1fe5cb54b01c2ad88c3e51ad7fa221a57119f

              • memory/116-12-0x0000000000400000-0x000000000042B000-memory.dmp

                Filesize

                172KB

              • memory/116-36-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/896-5-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

                Filesize

                4KB

              • memory/896-8-0x0000000077D22000-0x0000000077D23000-memory.dmp

                Filesize

                4KB

              • memory/896-0-0x0000000010000000-0x000000001004A000-memory.dmp

                Filesize

                296KB

              • memory/896-6-0x0000000001100000-0x0000000001101000-memory.dmp

                Filesize

                4KB

              • memory/3056-54-0x0000000000430000-0x0000000000431000-memory.dmp

                Filesize

                4KB

              • memory/3056-85-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3056-89-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3056-87-0x0000000077D22000-0x0000000077D23000-memory.dmp

                Filesize

                4KB

              • memory/3056-82-0x0000000000070000-0x0000000000071000-memory.dmp

                Filesize

                4KB

              • memory/3056-51-0x0000000000400000-0x000000000044B000-memory.dmp

                Filesize

                300KB

              • memory/3056-58-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3056-59-0x0000000077D22000-0x0000000077D23000-memory.dmp

                Filesize

                4KB

              • memory/3368-20-0x00000000008C0000-0x00000000008C1000-memory.dmp

                Filesize

                4KB

              • memory/3368-15-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-17-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-16-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-7-0x0000000000400000-0x000000000044B000-memory.dmp

                Filesize

                300KB

              • memory/3368-30-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-14-0x0000000000400000-0x000000000044B000-memory.dmp

                Filesize

                300KB

              • memory/3368-13-0x0000000000404000-0x0000000000406000-memory.dmp

                Filesize

                8KB

              • memory/3368-18-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-25-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3368-26-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3612-71-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/4000-65-0x0000000000670000-0x0000000000671000-memory.dmp

                Filesize

                4KB

              • memory/4000-64-0x0000000000690000-0x0000000000691000-memory.dmp

                Filesize

                4KB

              • memory/4048-78-0x0000000000400000-0x000000000044B000-memory.dmp

                Filesize

                300KB

              • memory/4048-80-0x0000000000060000-0x0000000000061000-memory.dmp

                Filesize

                4KB

              • memory/4204-86-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/4204-50-0x0000000000400000-0x000000000044B000-memory.dmp

                Filesize

                300KB