Analysis

  • max time kernel
    84s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 19:04

General

  • Target

    c9572f19312fe60446ac39d1ce415b34c9b7d2da0b0ea4cfb99847897e8d9882.dll

  • Size

    556KB

  • MD5

    5893b228ec97a3fa62eb40693470107b

  • SHA1

    1cdf103b467702647507d096cbc3b3eaf38a91e0

  • SHA256

    c9572f19312fe60446ac39d1ce415b34c9b7d2da0b0ea4cfb99847897e8d9882

  • SHA512

    b62ca829f65cbc520e9d8f7d5735568eb7f093092df100783d2135213bd8ef52c17bac1a9d9b8fb918400594787a457f0e18e0e9cf2146fc556c2d6f34c4a8fe

  • SSDEEP

    12288:f1q2gvcVlmzStzHjgx9M7YwJ9sU1rvZnpb:f0ZcLmz6HjF1sgpb

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c9572f19312fe60446ac39d1ce415b34c9b7d2da0b0ea4cfb99847897e8d9882.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c9572f19312fe60446ac39d1ce415b34c9b7d2da0b0ea4cfb99847897e8d9882.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b60aa6870955c9087ac357a57a881337

    SHA1

    deaf7ec5a257b40bd234c700d024d94996a48930

    SHA256

    c608d41032d208fefa2105f7b0b22d4c19f909cbc523a3d5e8694983567efab3

    SHA512

    5426851580e1e9843679257abf24ed3e9d3eee8e59645769b159071111a0373fe30486c74a2e02e63890519ffc8490557afd56b4a0f6530b8c0ee5fa5b7e797c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98ae779b2fd70ef580778fe99f8b2a7f

    SHA1

    97692b9040631ed8e8e6d0f4f7403ad5d056041b

    SHA256

    adf6849d20b7965431243e265924316a497de8ca70d5fd89e53527f10a9d69dc

    SHA512

    5319f980ec92fadae2dff3b162a042674eab865829e71ac95d8e9e47e9f9a67693e0df37656724368331c8ec9b0a3f55a54efd598a80580a878fa14320e0cb14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5696eb3e5fa480c4a2c9701bce9602f

    SHA1

    a6e4cf0aeccae24ba5428f82fe91b052084b30e4

    SHA256

    6f0614ec9890224da7d705e3feab25aee10bacef8574af7fa0068b158ebc28a6

    SHA512

    6ef3a2a97f9a5470b10bbe0e3b8f44b763d459d254bdd4bd7b29adbe20905401d80311c8d9b9ee94376e1e4ce9368020cabf423e589b5816f44748f9932b208a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7524e4fb99e5b6e770d01cb0879eaeec

    SHA1

    2eb3d77d55e169df21ec5cc68794205811eb8055

    SHA256

    51d1bc0b1fc6c61f49c1cf49068e974c1c21f16fb66aa46aad0c5048f1bba7d7

    SHA512

    45dc041ab8dcb1ca1907d655e424db9802841d35cbd82a2dbb5c85c0161951a97cb34af20a925e7e971d45d6c931ac9755f67e4fe827b6410bc0c96dbbb30424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    254e081ea3070bba3b62451737bf81b6

    SHA1

    d7bd6cf70658f246cd1f980cbe1b0a2a2dc2c107

    SHA256

    b5119dd1374053e641aaa0a77ea0f784ed8b21ef14ce8d03b009dc84cc5b1d61

    SHA512

    ff381279f2a2e8c95e092ac9a21c00c56a688f30fc914377e70c1c9b8dd514b92b391d850e8766ae66e25d930f4568899af185b3ba4e124854c91f6d2a2c8b09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1fa982088f899f3137dc7ee04888efb

    SHA1

    e5d62a52887397708e6dc36d7afd5f0ef3719e30

    SHA256

    3dfd1a21360f8adfcc96bdd808b77a300da1926f02ff31e2b1416a8b3fe91fed

    SHA512

    2ac8f9de492ba9f41a66ac21da399473affa10058b9b1bb59966e883e809949d292f4810795641d4d91b4feee089c7349a96198792b9f91eb439f065e9d04f0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7ab72e28c75f22fd287e86cbdf39a37

    SHA1

    b56d251dfe05081f111fc97b5ae7efc666bf96c6

    SHA256

    6d98b52e614578bad664d7b8f591aed11a10af510686b698d1e1e7cda6ed4aba

    SHA512

    16a259d696bb4f18fbfcc3c839fc5a6bcb8e229d3350705bc0c87fd55d832832ce5d2695a3b62b75247c3c882e213d49ad7b2cf814f420d5102022a2679c7845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14c0a310b70f6d794f46276d442859f1

    SHA1

    6d8c266e6cc2d9d46b297953469c69fa2aa7d946

    SHA256

    6c404611328f05c4fb2ce3ddb36bd298e9798db7ee4bab4dc814c537df28efb5

    SHA512

    01ae284e7548abd167405f5fb605945eb0a5677740876b6d61dcb019aca5c19adf3073d28c68ee1c5ad38fea9a7d21c5597f3c8e01a31fb6be4d92c23622ae46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20369b75d964dbb892d77303c9907f57

    SHA1

    d861f4d85e371b7d9b2f05064f1f730f319eaeac

    SHA256

    cab900c6b2742731818f900555d0e5ca4bec5ea36e75a8e175aa0e996b8f23e8

    SHA512

    3970071cc8f2629e3ecae8b92273390f413e40b625962efc1ede154669ff541a2979948f27a354525a4fc2590ec91bcd6da2184cb32ac2023bb874f2686bd0a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b2019ad5ba6ec42e0d35526b126ac5c

    SHA1

    97e7f8baa21a9e1f4dfa0259a193d2d34d6fc974

    SHA256

    87c9ccea80512e440d6010f8618816954a275ee68c7039c9f2ff29d2bf474f2c

    SHA512

    9c6da617e3eee38d1987bc94aac486a235de15057421d12466327dd0d9f8b61a96225a91911d64a7e1d0e1351de01f38d9ebcdca9a75bb32dccff58fa2beccdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9b152cf7859599996d3b3fa277c2ab7

    SHA1

    fdb9cb6368d89fb028158789e21fcd85781892c4

    SHA256

    8a286f2fc1c29c67e41db59733da37d4bba86ba7d66bb219e35b979a0dafc862

    SHA512

    6fe481a78646f6a21a07cb5f7e46b2629712adef40a1014eb74b74cfbafcafd7676e36547548d42097c37d8f302dc837608552e90c466b4c04b54d2fe0463caa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56e83d51bbe0ed2de692b6f346907b74

    SHA1

    8f7a2f4aadc0dc4c7acfe0b8be951ccb20d4e38f

    SHA256

    b884c2da8bdcd582238d9e22d86fa8f80f30559b6bf04ed90e763c67c7a8e641

    SHA512

    c65f61c6b7e5f2e21cf0402c5516a9590d7d7592acf233158a99e5dea7f0dd0a7846f4b67e0ce06d0228f27253151345b2e3ab4d9ad7825c2613265619c9a85b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cc50a15512d235910cca80ed013135b

    SHA1

    28f6201af5dfd7a7f9af14b9a6d1a0e325490d72

    SHA256

    001739844c5ffdb326e504d5b963f7eefe857a1acccf6160d9504fd36495ff7a

    SHA512

    6049a7f9f3aefc967764316fc71fbee814599336619bf28cf44ed4ae722462e4d260ed9b328b49cd218ef9732f04c146a00bb8cf4061520b713d2b6c78a95858

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b23e9ea702104d3979724eb89f04882

    SHA1

    a21769c35d76d19e5f6087166a68a0718161a152

    SHA256

    7dedd0a6238053add28e7c7e1a4e2b74f80ab693554186c6acc36bdf516392b1

    SHA512

    03eeb4a01fa5a4c95e3d4093c74a64928ad79d6396e3b7e9849489163c3ae2652bafa14e3bf08c5d4dd57c72472b2d928b8984127dbe753f441ea455a3e480ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4769e3c2638b08bfc3ce25ea6806eb8

    SHA1

    69d6439b0d06bbf0c0af3f22f83fb098d4f390c0

    SHA256

    98cf6a055f6d5ad2d5a82fdbede29c0a3a491e4e63b657af485c3c10946a2c9f

    SHA512

    5cccb6ac01290046e458e9647a84411464e687864ad1cb31427feb4990032c92b7497b70887fd827d9848b395831052353f6d12c9542b416b33d439c4d78dade

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7213169394407dc41bf55127212e0227

    SHA1

    067ea7bc8d038476a91629ca61f6241c557c625f

    SHA256

    133133e8d1b48130f14168df13fe7e95fdbd98750e21702fe16912e4dbc79878

    SHA512

    47968a2b0918c550c710ec23190a6cf86c4f7eeccbe9c585767868db59420771b7462a734972e080f1dd43306cd28246e912b5c5f22c00bb01df3131167be3e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0cdb44dde80d786719113d6da080733

    SHA1

    5d45cf29fe8631d39aec0ba1189c0fb01a79edb2

    SHA256

    78fe12eee12cbc9685eb3969e615fad5f7ebe37670f3a4c83637ae35f422350d

    SHA512

    9bfa9a42a07ec0c312781189d81212b08f5638d1db9726681b532243b5bc22943ab0167255ba00aebd3ade359f39796fd445e5fd3fc4cdbc241440cd52d6c52b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dec63b1efed465a04d3f3274db8fb24

    SHA1

    be41fea037cb5745e1fcc5d3f3f0c0f1168a05d8

    SHA256

    0c6fab3efe8455eeddac70e3a5f0be448ad7a00a5afdbbec132a8af2332695d5

    SHA512

    504aeefc0f9edef32d72063cb74ba2a1304565c82eb528ad7e7c58759d207802533c86cc5dcaaf8cf36468acee323f89963704efc71d9a2fd1028d18b4afd3ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce3073bbe8e0cc94eea9112b4191c9ef

    SHA1

    6cea3f5e11cfb1009e9d34b774314e7670566c9f

    SHA256

    cd281cb064c71b4a508b26bcbe09435b24d557373f46ec5478611af0a62a370f

    SHA512

    e4fd4676178aa9fabfb5531f361577d4f642d18cfdf480e14ce4236de25ea4524f690f74f0f5bfa829ba14ce31f63d4594c960f6ea2b0d764dbc15ca9f415bdf

  • C:\Users\Admin\AppData\Local\Temp\CabF7CA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF84A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\zvlD6FE.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    261KB

    MD5

    3ae03147ee0e6eadde6539d9a7788cd9

    SHA1

    0923e5edf62451a8c9078fe9557551a806eac272

    SHA256

    3a889c12b0feb9c87408c7ad438b50f16d255fd2d842556e4a4c94f89414cb8d

    SHA512

    9bde63534cbf9e7b26b470cb056f34114875813d7cebb2d1034c9a8e368b10ece65be3fbb858d334fdf208c451abf41f169e0ceca4b810575fffb08df50ba19a

  • memory/2488-24-0x0000000000B60000-0x0000000000BD3000-memory.dmp

    Filesize

    460KB

  • memory/2488-10-0x0000000010000000-0x000000001008C000-memory.dmp

    Filesize

    560KB

  • memory/2488-11-0x0000000000170000-0x0000000000191000-memory.dmp

    Filesize

    132KB

  • memory/2488-12-0x0000000000170000-0x0000000000191000-memory.dmp

    Filesize

    132KB

  • memory/2620-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-32-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-21-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2620-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-25-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-26-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-28-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-20-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2620-33-0x0000000000650000-0x00000000006C3000-memory.dmp

    Filesize

    460KB

  • memory/2620-29-0x000000007746F000-0x0000000077470000-memory.dmp

    Filesize

    4KB

  • memory/2620-27-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2620-13-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2620-16-0x0000000000650000-0x00000000006C3000-memory.dmp

    Filesize

    460KB

  • memory/2620-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB