Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 06:31

General

  • Target

    2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silence.exe

  • Size

    2.1MB

  • MD5

    79093bebbb99bd56e6cb97c066dcfd74

  • SHA1

    201d492fd6d3f0aeed73defdfb03a996e9fde8c5

  • SHA256

    586317df8844d39323f92c8bc5d877628362309960459028a57d513e37ed1da7

  • SHA512

    f8431bd488871fa620d443f4f3f0cfb34f0e5e79d0c3a4d4636bb92f3dd6aa1f4915758957943f8c8ac7e513ea0f0b223c4568e45bdf5c1dc68c0d740ee5f0da

  • SSDEEP

    49152:ipp5LM0nEKNapEJBk9Xe23eWyg4+5M7XHq18pqXuA600xuRAKU:iX5LM0nEKspEJme23elb+W7Xg8pqXs0X

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silence.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silence.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silenceSrv.exe
      C:\Users\Admin\AppData\Local\Temp\2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silenceSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    406a20855498999fdf654240b3194db9

    SHA1

    0cf3053f1c40796ad0fcfa254fbe1ce6e3236c60

    SHA256

    47a8d6d93dae87f269686199b33982079c6e66701d8f462f5494ac795f3041bd

    SHA512

    2fd8e3c1365f064dc134b6974ae408838fc0171b00dc5e60ee199438de5cfa0b537607748758515a473d745643895938ca23cef4f27f64013d9d7742f388ca92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ed64204eb4c6676a5bf032ae06d4022

    SHA1

    7c274aa36b26d2551425d514f15766cdd0292ca7

    SHA256

    4c50d7915ed2da3736661e7ed79290c84c748b9f7474b484944716f4f7af3806

    SHA512

    c24fc89e15e98f5d72cfa81b6b1687d0f8af122f930c980963796c82b71146eb6bad520dd8765853e5e666619a534a09ce224fb61345129e95434f76f2a018df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    542aeba7716cff243f68d674a47f2cc6

    SHA1

    9e3733fd86e134142c2fd8ecc5a9571f4dff732a

    SHA256

    788d4b434acaf721f5158f30488446343cb9cae8474963538825f8959e68cccc

    SHA512

    4984e3b6d0b2cadcdda9c570b6f872211fc557905d8c47c310f5c90255ad4d8a242ecda1fb29354759beba0e40b0bf7b10dbf32840dc9564afcad0c2124e0a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5467471ece13e665ae9bce67b5259bc

    SHA1

    4064b6f5aa5fdd3722331023483b05d950853f32

    SHA256

    f7bd0b68a11d7043891733adfb6ab29ef66b347ddb213bc8f8416dafc9fcffa5

    SHA512

    b67ab9cfafb5493279ee131b6697c15c73a7bbf8de7ba751aafae7a6f16ac3e39ee1d1e1acab61dc9fcfc2ec75c4d18665d5707bdfa8acef6d16db3e9661273a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4ec676eb6c3f8c3aeebdb7147f1f499

    SHA1

    9791e1ede8bc473ce98b9e668395c0fb421dd719

    SHA256

    28f347f632ca94c2b8b84d402c59f5ee4ade7a6c9876b7b743117b84c527ef15

    SHA512

    74bacb9a494656a12de1c0f1dc803f4571eb31e9e9049162b5e11785995b4dcb4b0b482ff42556d528b2eb8dc437a0e0ee874412fd46181baab1e77fecd7a29c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dae6d0f6ad8ddbe0fc2e39e8dd239119

    SHA1

    faf70eea08c839a6b6c6ec044cdeec905b6cbce5

    SHA256

    9f2839c0a93c7cc5378001cb5c26310e864aed4ef1b056a05e99920f4f72461f

    SHA512

    006ad09c63cfec58b6d9e518acaf728033a872dee752ec01d3239205ba95ca0060b4e551e1b6ef8b4c06e7b5dac6d81b0246b3afa7e282f2a533623aec43195f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c7a1c65a9fc2d5a2a815ab9c4a0b514

    SHA1

    8b4c8ae18387e70834c775f4581b270296090b96

    SHA256

    ad09f793dfc3d498549dbf5498450db43ee8f622515ea093616195844a689eb8

    SHA512

    2a368aefecf2b5f556611058b0811885f3f9c5861d0132d6e5b73d477871e85b8acbe1bb62709e6f36257d9fcb479d3ca6795e9a456ce14214191c43bfa7d817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b247e3998a8d8ca7f4d7f6aefbe62e7

    SHA1

    c28cfe9bd1e73b013b1d974d84348df7016956a5

    SHA256

    f25ff7910e3eaa5c9f82c277b45595a0b254454a151b4c8182927bcdfa658429

    SHA512

    aed8b5e4159f5c08f029020fac4930dbffec8d0a2998e56a35435c73540395df0d21c4d08f2d690d97e4bf6917e0a9aaf7afef895098aa2af140e81c7ab230f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    552834bfa95b496e3007c1d013187c7d

    SHA1

    df1ab0c57fd5a55a4b0ba83fc074de24d382d520

    SHA256

    6a9907f9e919b328326de1eea6da9d072da4c0b17975397ca21d4115aae9d67b

    SHA512

    f2c5d8c4e7ccfd3ccdce8a4bf0ad49d4840b1f9883eff90b36fc5da9bcdeb6b56b3623f394d25ada162753e83f511f650612b555ee8887d8a737cc3bed15922c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9428d8f1df37c9075a3203586c72f28f

    SHA1

    c533533147194f06fac4722fdc64eec1c0b2a2ee

    SHA256

    b1d5eaedf7b2ad126f526a6d05129dacea6eecc760bce5e25daa009aefbd403e

    SHA512

    ba00146deb0aaf261c6ba8f141347049e319997813a217ecae56029417f38854be9d4f9b6c4849b9299438732910c831db578161621185ed7066237834ffeb33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f28fb8780660afc88f481d99749e72d7

    SHA1

    697228aedc99ee8640f3559838661ef1c0cb6eaf

    SHA256

    5c5ff36103f8db8ce99bfcd10f6c89b38f3179d6af866fb5154be2fad31cde4f

    SHA512

    16351468881048f2b380716b50652af2bdb3e26459dee6dbf3610ad38d1cda86665e293cf78cbe3090e09077473f30d029e7c34ce936f6b44b255974493db947

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04040f2f5d6c74565a2bd1c80a7f282e

    SHA1

    43f047dbb410bdde3ea83aeb9f6d851b982b9d92

    SHA256

    4f11b82fe4c39560672537c81eee785474cbce878fcbf7c94bf25069f416dfa6

    SHA512

    fc95dad867f5fabbcb472eab92fa1d2612589e032e766a878aefddfaaaecdbe927e5099e2426d2ec8eb2bd6c51aacccaa9d7c9fc3c411f0feb2bd23b1da41b6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e623982242088b874fc5d98416a067b5

    SHA1

    dcd99680fff25fc62d7167c05ab3ebae8a529ae9

    SHA256

    f42cd79c981989a6294bcf415ab6cb080533946113a6c81bc304fef6a9a318c4

    SHA512

    5c5437036a27e1a9370e08bc35904a7cbff0a7fd21323f2875edd3b520c968c8d1a66dfe97e81e365d35a16ab34d62336576a2320e020ef5f4eb80cc58edb222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    271fc66df3bafac7c2d9e9c32576fef8

    SHA1

    b7173791c92f31e8798eee2b2f98210680435d98

    SHA256

    c9793ad1fcf500b5ebfafa7b9b4239d0c58427ab06df7018c17328e2cf7a80cc

    SHA512

    5a9978e40f51a83dc1a77a8a10747128b1d366d7e72855e2dece639048250528ff761957e31014d88b9ea547fafe9f89de765b9091a3dd61bd7d025aaa00fb47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43191824adf8d5b9e414485129dca5ee

    SHA1

    81869108b06bfaee7aff83bc23c0f0ce61df945d

    SHA256

    8270ba4f7bebacb978761bc9651869b4dedfcfa623176df141711a9eec5516f5

    SHA512

    fc4b96b3cdeca97618359b4a09ed1779cf522c78e880f909f992a1c5624ef189f27f7c1d3e3a3b2afa21941be33cafcdeb9672560c047efec9b920cea6dee5c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdaee43b1a9c224e098e7a6244120ad0

    SHA1

    dcd3594b4d67cae9e45cff852450d9575733317d

    SHA256

    9c0ee0a549b668bf92768d3b2d31223c41253e8a64a48804a5234a2a85f0c9ca

    SHA512

    50fe2d85323e9a1c6a33abd05637cd297105ed7d24832a48766653869d3925508843466cef1d07c097ea621d3f09aed082e4bea9eb05feae0d6a7997ed87078e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1391dacfba541d788eb3cb31c5715cf

    SHA1

    d557558d723fe8ad0987ca701ff3350b62fcd5ba

    SHA256

    672ea3a466a0bcd984a356ac5b694a181b0ff591e48d643793d04de3b8f21dc0

    SHA512

    a6f663fe8371afd12cd5b878143b93cbc7bdd2306acfa63d987031c8dd704931c2feb456e3ee0a7813deccf97ad5a01e9c8b8bb63f7c653a3ce4bbc1875f231d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b7cfe81321aab65ce0c1642e74ee2ce

    SHA1

    91f5efcd1b34401715ac9945f8a58c44ee947765

    SHA256

    32fc0bb46256c0e75c7dfd45c4c595c8c957904344974a4dfaee1861d5caa4b7

    SHA512

    01a670b19c28975dc7c9762c0791f1cbdc638f2496ec0a25d148087262b0e8994799dab5bde73776ee67442170f4cfcb13e306224158997fe5d284736670218b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69a16ccf7aa90cedcfa9c6d3cb0941bd

    SHA1

    fd6f39cf81893cb9e763de4f838a55b9806451e3

    SHA256

    93c0e21663307258db54d53ec8cd24121228b429fcbc1bcee01fd1126c0cb4ff

    SHA512

    20f02610fdfc0fd76579b35a44c704a45dc91e368a105b77727d747378a14fc476a47364739d6fb52f093c6305d670ae1597bc8e65f69d7b27591c41c42db77f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d862bdd153892d22cb6f12b870de00d1

    SHA1

    8fa930cc05d3a5068636d8d5651ee77704988d65

    SHA256

    cc1d05705783e9695dbe6e1d3c30c7f5bfcad571177e3287044517702a503d7d

    SHA512

    7fe7bc20eba667ace12f1a53d6061bafae151cba56c1ad1fceb28d07e1f12e60e66a8b59b0e468abd8f05b75f49890824b24fa6a9cae11df4556a3cd3f3e0ae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d9dcd9fb1443fc59bfe93e7d076c6ad

    SHA1

    1c10010578d985bdc0e3fe008e8f351db2afdeca

    SHA256

    f0a72d66b9498226ed61b02e5394ec6c86e290285db3f43fb809d2f208e78008

    SHA512

    0643a2cac18401f2fe8bf7877bdc3459c2da18f18b5ece5a5f79641fd7a9d07268080bf08d859ce260595af2b3e203c80d39a5dbd7f4005c922179652e63a791

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    719c9783ee1c69e1b8b1d5377dc3d2d2

    SHA1

    4cefe406bd7542b17dc1900ffdcbbb5b6269f84b

    SHA256

    5481f22880f0f28bdc9ab3f5c783e93d412a4efd2808318de5d4e80c955484c6

    SHA512

    9d44d113c12eab7be51853f69eb4fb3a647bac1ffd04813a5292b59a5f329141cd831923415d90b5754d1b52f68a0075d0ee577a8ebfdbf843492f5558cf413e

  • C:\Users\Admin\AppData\Local\Temp\2024-11-23_79093bebbb99bd56e6cb97c066dcfd74_icedid_ramnit_silenceSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\CabD49E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD511.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2360-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2360-18-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2380-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2380-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2380-9-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2548-0-0x0000000000400000-0x0000000000631000-memory.dmp

    Filesize

    2.2MB

  • memory/2548-6-0x0000000000290000-0x00000000002BE000-memory.dmp

    Filesize

    184KB

  • memory/2548-23-0x0000000000400000-0x0000000000631000-memory.dmp

    Filesize

    2.2MB

  • memory/2548-21-0x0000000000400000-0x0000000000631000-memory.dmp

    Filesize

    2.2MB

  • memory/2548-22-0x0000000000290000-0x00000000002BE000-memory.dmp

    Filesize

    184KB