Analysis

  • max time kernel
    67s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 08:17

General

  • Target

    bc9d74d9bf1e6f843b11e6ceef2002f040986e9d62d9ab427d5b13be513a001bN.dll

  • Size

    1.4MB

  • MD5

    fc010997cf054999a247e430aaf6fb60

  • SHA1

    bfe0033c5ed091afe1ebda08a1b5bee2cb3a7a1d

  • SHA256

    bc9d74d9bf1e6f843b11e6ceef2002f040986e9d62d9ab427d5b13be513a001b

  • SHA512

    7f7f9dd39a83c21a5d7a4fc8765a000a1c23319a6e21eefa557d289ba05aa389bfcbf9796eb0c229be5c002e93f691b15506243d2c9797174d6b2927d2e4db0e

  • SSDEEP

    24576:FXtZYjVYOnAOHuUxTQA6v3N+tDVH7C0L:GB6Mpo9+xVH7C0

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9d74d9bf1e6f843b11e6ceef2002f040986e9d62d9ab427d5b13be513a001bN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9d74d9bf1e6f843b11e6ceef2002f040986e9d62d9ab427d5b13be513a001bN.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:236
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2284
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 224
        3⤵
        • Program crash
        PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d0587250c49d63c705bfda9ebac71ca

    SHA1

    d52a3ac42587fe46e5cb8c9f9bfd9e8dd4fbafcc

    SHA256

    046314234a2a5fedddad409b5a6f2e493b813fa46ad5683ddc511716c1a8ecff

    SHA512

    08e9f1eb34a69e47722d6129188739df7c5cc1e64be57c404701642d59062005d5be7c06a727acffccd08b48601ae574588bb412651aed215eae92deb90dd24f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96954f931a79aa8e888cc0330d8a91d9

    SHA1

    bca15835cf1c53b293613e92ad3757e74c12404c

    SHA256

    782533a2b0737904948b545041239314b104ec5849d0db6c3623144630aa10f6

    SHA512

    b9ac43032da9edf389fb6e2ccf3c2cdfb056774033e6757c3d8b1374a07f94ca226bf2d68d38c1cf4acf5b6752562e18ab516b8bfa9213a38076f3c11d19c352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e10af60fd737f27956bafba8fc107b24

    SHA1

    1ca6f0b31cfcbbb4c397ccf6aa5fba017e183598

    SHA256

    74c598ec57b775a5ad3c2eb5227ef5ea6b007d479de8135dd91b26693752c065

    SHA512

    2334efa0d57b811ee2bf71b64bd717f240e57894a6cb89a26a8958ed163ce8c3229dcabf19ea62ff1e45ad632ff7d275b51614dc947184136352ba37869b701b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    925044685d6100b458c71d79dcd76367

    SHA1

    ed76aa72d0f285c02ca96a1bcb49b1205da4b69b

    SHA256

    8d79e19f63e4478002563137e17004867171ba5bf1825fcee3961d1ee246daf7

    SHA512

    175b11ed489bced10244cef4702a2e2fc9ba1350619d7cc6ca1b13a4d9b6c4f14b1681b69b491dc4cb11df3304f1af0a1f506fa0a97fb790d95e53f05684faef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b1e72d7817075bac6cd2c59f2213c3e

    SHA1

    6119a512cb5e9bde96ced3a9abebfd01573cba04

    SHA256

    e1a3829f1ddabc9912dbc906e9a6a5bcf31094a86e7ad3393edfefc8e5770298

    SHA512

    31d60983b5e6d8781209265808cd231db7ca258881196e2f870b035fdb7c0e0873b961efeb21402265dcf38085787c3856d210ca5485966a24e049e874d86d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e58ae41a1b0b8dcb663af94ab87d8759

    SHA1

    7b5b86e6e14a51e27b63dbaf5eff611108073539

    SHA256

    b956abe3dbde4d7554b32346989cf206486494a7c065cdf09db8ce2e79551dc2

    SHA512

    7f055d6b7438ce1b559a602c9d3829ef0cf6df44027670e052d1971c1a30ad3d6e116afa7ebd8fbbca42cd078b690551fc106359bbdde8d5f2c8594f4b4380c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    604713f5710a8d4b8f2860f217adbbb4

    SHA1

    b48d5de40db2440988f9f811483aeda85504cb43

    SHA256

    24a4d48e9cc260594b3a87e02911ea17c005020f0e7d92084e1559c0e9afb6e0

    SHA512

    362ca42b4b1f569b8d218dd9b425585a5ab3b6cb7103aae94e77eb19373f08af680b5bb51b562d11e8aaaa81e9c695982479caff1728aa05f4cea5a52c0b35e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6fd2fe149fd12210dfcb904b310bd80

    SHA1

    819e77db5f538a8e6c333f4bbdb25021c7b56278

    SHA256

    826849b9f0762820e58d6284ff70bd2463aeb3278f06daa25b95cc019d9b5faa

    SHA512

    405fb71f008e3dbdc8f931f93f543651a3ba8f705b7a09eb01b75a0afdc8f22945b145ec65f38acca0a10ec2eef7ce5ec6e86b794fb5276638323b912c3073db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b529aed140e10b6ec90a332610e2c8a

    SHA1

    74f30532223de5e81b7e9d6fb8b1db510f5691b0

    SHA256

    05dabc101c2171be0c63b49405b247df705ebc12b521ea8fe62a843cebba7a58

    SHA512

    2f066928b4e6668e8b070ac96af04f40281b5499c637682177a1494429e38067d26cd684815ac11536af452bc600800c1b13b4a9686161dc4b72a227cc0a9d3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91cacf001050e7b0b5b5917994739022

    SHA1

    9c65fb4a2de9eea240aee804129a4cf4ea8555c7

    SHA256

    7c1e79d6b898281f34789f669679c42638215e0e59afc9e56fe3ddf7973a4f60

    SHA512

    97aea9fd2a6e395bb8157f63be090e3f508c89618c691bd4e5a66ae71604ba6479913a41d7e5f1e0bb1bdac0aa0c732fd0fc411848e32cc9de80d9c93a4469a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fb7c8a32713ca7bd58fa8f7f7ef824f

    SHA1

    baa9bec5a0f5dde2d425b619271ef48460959bc9

    SHA256

    a365de2f9f1d3f209c16216cfb919f15958841834b25d01e3b493346561cfed3

    SHA512

    57fa6247874b36ec5a23f547b40e221805f48c04f1a64e92676f1e56254c6d2712135c31c7ff588a3426fb401b789050c9712f3b1d5c93cdc9b43c76081fa63a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d1f05e96a9f02c3b6719af2a628cf9a

    SHA1

    ed1be03f5b5e4c36eedb691e5a12e1ad4a70f0c6

    SHA256

    f82097a6f155d19a47601723b8074a7e1cef5ac166878e8d0db219d545c19499

    SHA512

    e4b882e7bcc93a28d78fe239c87b2e6a0f0b9ddee188984c8c1a14a481f0aeb6de3cc1b5f065bb8fffd2f40dbf2c98d0a7cc0a6e3c8dca97234c8aa9e5bfe6fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecee6a3784536e4c5ef0f09847c5ee19

    SHA1

    02d5d54d765ba7d02dac09d1684f2344e1374b24

    SHA256

    7e12159ebd3804e121f2c7ac6481e4b4ad9b42892d31034b48a80279f0f7bdf4

    SHA512

    bf7a4eccb0beb308bcca09961043abd884736983decd61ea51d48469653a2952071e890cd67f3993cc85c1ff0053745c4401e9e7e2cb18d8b68cb8654582e451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    040112ebc4c4a86002974b56b63357dc

    SHA1

    8d248391969bc29c2d0f9b408ad6cf36a25438c6

    SHA256

    1cd5999af8b91ceb02f4811a3387487cf1fcf44e20adb5de30881a278562397e

    SHA512

    e4290284d515d0915d407f6926f96898780c4889ec1be3a9c3b0bf7f376da7f4151756ff39d2512f79ef01d2db94d5ca63b4321b1c6ad967a78785f1d06ceff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce370e82f373f60710d3a9d646db122a

    SHA1

    af092d09a75cc5a9fcfc3ddeafe33974f6a813e8

    SHA256

    d612402432eeefc62ec92b700ad07ca58de3311f746058310e5b6430341c2839

    SHA512

    51eebea609e23e40310a2ee195f20c12193e3cffb7782155c5fcb8c134bdf611ab78edfb6b15551be9ac1f2259a426c0824bdc0468d3498256fcc3fc7f83e163

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13b8f6d88bc36db4bfdb70c94853e014

    SHA1

    b78b6484a923589846410365bd0e9710c470e913

    SHA256

    0118e55e68540f1894d173638310f0b2b50e1101e3183d8d1c81520d8f6f87a8

    SHA512

    b0716345168ef56497e8880e5d3a28456215383f98cffc3c76bc13936d2ffabbf357093a3567176b3fad595fe3b04f9a9b6e899b052fca4dbd1f42d896a7b2fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ebb12895288ebe3fc297dce2bd69fed

    SHA1

    f79042f9078f0d04e9346f4a741a1855e3b5282e

    SHA256

    ffdf919bcbe03b82784aef1c7b8554d0d1b7507f8ae8fd4cb4adc280f2e3546a

    SHA512

    b187fb05a1336db5e48e07a411a70d51d120baedf5b18d6fb7f90d9ca9379c028833845e977a1839a0e81b20d0d3b9263a66f4ca0909a2df3f8c72b4364e3a78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75719a9d2c568e1b8d7403e5b4f466d9

    SHA1

    91766f3840f151d5ab089f7e549d4f1730d0be4c

    SHA256

    28e65d0fb1444cde6ec35a4f173fa32ad1b71026cea30ad4314cc758350ac2ee

    SHA512

    4d4650850b9763a6fddc1cb05faa479d6471fa3311a18055d270a1ad7ec6e70d0cdd835ea40bb46c7823f4abbd9d1d2b9912d40946b50358fda52a7152ac6b02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6012e3953eb5df6e4260f06b0f811d35

    SHA1

    6afd2b68f5354fe4c35553c3133f42a39a04e698

    SHA256

    dfc687250bc25ad1f08817225d97c5e5e8ac7adbdb0333716f997bf130669aac

    SHA512

    4866f1a1f3806672b0dc9cf98fad6d47d428bff94b95e6fc0656d8f37f127fe0e39c47af2be3dffac2282f354e5893a3ec1b737bd4527e4fefafa2044afe0507

  • C:\Users\Admin\AppData\Local\Temp\CabB483.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB4F3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/236-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/236-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/236-20-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1684-3-0x0000000012000000-0x0000000012170000-memory.dmp

    Filesize

    1.4MB

  • memory/1684-8-0x0000000012000000-0x0000000012170000-memory.dmp

    Filesize

    1.4MB

  • memory/1684-9-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/1684-23-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/3016-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3016-10-0x00000000002B0000-0x00000000002BF000-memory.dmp

    Filesize

    60KB

  • memory/3016-14-0x00000000002C0000-0x00000000002EE000-memory.dmp

    Filesize

    184KB