Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
1710e8e5b9dd61a639428497a44ef3737b022f3ce30fa550a1e9be93ecc31d46.dll
Resource
win7-20240903-en
General
-
Target
1710e8e5b9dd61a639428497a44ef3737b022f3ce30fa550a1e9be93ecc31d46.dll
-
Size
122KB
-
MD5
22c5eeea7aa28d0fbec4ff2b2bd4f6f3
-
SHA1
0e256b75d640fc747010de05bd6c505eac6008b2
-
SHA256
1710e8e5b9dd61a639428497a44ef3737b022f3ce30fa550a1e9be93ecc31d46
-
SHA512
15ae33fa08b06627991208917831dac2aafb9899247fdebd7d64d429c4a895ac36f75fd80ac5fbe5548650477f82fe07cf49e7e3d73172000663bd0b7a69906b
-
SSDEEP
1536:bb5P3k3nxUautQfqko4gQR5sFAVopwg/3zbUIySCzreXnacdAnXVJVmyJts1m7QH:B3ox6tCR3sFAVodvySpKcdAnFag0H
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2300 rundll32Srv.exe 2336 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 rundll32.exe 2300 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0007000000012116-9.dat upx behavioral1/memory/2336-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2300-12-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxB98F.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2236 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440722764" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FA04A41-BD8F-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2336 DesktopLayer.exe 2336 DesktopLayer.exe 2336 DesktopLayer.exe 2336 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2444 wrote to memory of 2236 2444 rundll32.exe 30 PID 2236 wrote to memory of 2300 2236 rundll32.exe 31 PID 2236 wrote to memory of 2300 2236 rundll32.exe 31 PID 2236 wrote to memory of 2300 2236 rundll32.exe 31 PID 2236 wrote to memory of 2300 2236 rundll32.exe 31 PID 2300 wrote to memory of 2336 2300 rundll32Srv.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32Srv.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32Srv.exe 32 PID 2300 wrote to memory of 2336 2300 rundll32Srv.exe 32 PID 2336 wrote to memory of 1740 2336 DesktopLayer.exe 33 PID 2336 wrote to memory of 1740 2336 DesktopLayer.exe 33 PID 2336 wrote to memory of 1740 2336 DesktopLayer.exe 33 PID 2336 wrote to memory of 1740 2336 DesktopLayer.exe 33 PID 2236 wrote to memory of 2712 2236 rundll32.exe 34 PID 2236 wrote to memory of 2712 2236 rundll32.exe 34 PID 2236 wrote to memory of 2712 2236 rundll32.exe 34 PID 2236 wrote to memory of 2712 2236 rundll32.exe 34 PID 1740 wrote to memory of 2580 1740 iexplore.exe 35 PID 1740 wrote to memory of 2580 1740 iexplore.exe 35 PID 1740 wrote to memory of 2580 1740 iexplore.exe 35 PID 1740 wrote to memory of 2580 1740 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1710e8e5b9dd61a639428497a44ef3737b022f3ce30fa550a1e9be93ecc31d46.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1710e8e5b9dd61a639428497a44ef3737b022f3ce30fa550a1e9be93ecc31d46.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2203⤵
- Program crash
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53850b2168f6de1626fd57be095fece95
SHA1ef4ca66816dfaa8103c61d4ae2ad8cb082ac8107
SHA2564fb4ed36858e91d2d293af4b9c9c4b8793921c2b001b0603159205422d9411d6
SHA51233c8cfe98d2f518d673a8eaf9efe719b0dcdbd3ca3f6c088d0f520ed7a300a2a7f3ee8435262c734826696b69719033bc0a9bb2377435ff28d76629a1477ac9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bbfefebae7ff0eb9fdbac9e67b39e1
SHA147880494ca00e01feb865effb800312c0b4b1036
SHA2560f5a838418934a8ffdb483264c531432fb34066a4293262d8a7fcc6a9c37dbc7
SHA5128f143dd5f3da261e9165a3abcd991159678e3e73cb2bb6ad1ff57c70e2abbc123780cd233892654870a220afc7e5e068bf5a96f335ad096a4aa560bcda8d7647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7d2bebbea018116a7dfea986c34748
SHA1cc31691d0fa8af6ae42d8bda6fcda23e843c475e
SHA25649242a3984e0bdf1593cca8eb1769904fa134934d262c41e24c75a1c419a9eba
SHA512b9520a2aeea0e5c939aae39de2cf89cd547fc036b904343d936a72cc75301692e1142d6a16ba2873cbbd9e7f3c58c644508fdfca1c73dc73334c8a934d0d430f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd721c0b78351b41ca04a204a998fbc2
SHA157738349ea51e58f412fa0dae3d7741526bcb791
SHA256b6175bbe316a13f82cecb9e69297e7d3876a27deb06d896c14209400ae49794c
SHA512c75aaf15c67ba673ecab2a4864814a61d35cdea6b3c3791a883fa913d700183a59618f8ae270eb3eb3a92beb18eff936eb03943bfaf1eb653361591abb0e813e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53785c8f8746af8f52b222dcfcfb1f219
SHA1dd3cce272ce2d3b90a25b0621077a403b471a681
SHA2569be2e17446907eeb3f3d40660467ca97cab3cb81a53577fb287761b1c6f1eb67
SHA5120f2bb3c6c6ba5adc67cd47d596e54a9db7a1416a1a94d0a9624f75eec97af56359369e62a0b139d7440d247db0168558b532d124329b65034d0bf840bb639c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433c57b60f14fc1ca98ec5e5affd0361
SHA11e918a038bd7606129ce966e45b759301d94ea10
SHA25634df1de1d79008dbdf64ae584fc6eeca6749bd15f47d0a8de5dc513a81e6b9cc
SHA51261458eee9f62ae34caec7f0f763346046fb3bef1ab27a7c927f1c7301b948917e26b2e9889b48170d9e15d736225a83461261c7fe2b37349d5a920edfe898709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e718580bdfe6bf6b3d398ec10a6672a9
SHA1d597f0f1eab2292d74942c9b5de16c797d6e716b
SHA2565f9165275dd3ded93ad41fade579d594c95c9ef0f14d2a6afd71d33419271496
SHA512afdf861544aab4c0951fa204780522332eaa17279e2477d5bc10538f53e14e74405b5ef920b4267546f93fd8933f31f7bda7c7a049e6cea9919ab374901544e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530967eb1ca2642586a5584a93769f34a
SHA1c9bd473e28e481f9932735722fe1b6e97b1d5967
SHA256673a37cef4eecc019b0c52779a325dfa3ea7cb27925645079d265cee47bc154a
SHA5126aef092c53b2909ef6ff0ae2bc99019029d6bdb1c5bd503affa1a8780acfcdec0de3af17a0dd60641aae3e1f669dbc1ca9c02ad9fadcb01a006f965bb44ab0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fc8fbb49c35ff98380aacaea4c6884
SHA108f0e2cb55359495210a571fa93edb6ef102d5c1
SHA25647753d1357bd11cf086c7bf509abb8977172061dd570676bc47f3b915b1b073a
SHA5129707fad4d6709a1f29801658d889cadf3ee0404ecdfa682ea469bc2f0d27a3c67c8b8dd2472304ba07faa66e6390558ddce998e7109d91a5257d01dfa8972409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b63a1cd545de3c24781385c6258431d
SHA1eab8a67ba82119f432b099c3472889e3108fd6f1
SHA256ead0ca071b2caceacd2b88f505ec30cd1ddf0d2798bcf3b0948154c07108d33a
SHA51286475fc9f1c2677a49b796cfd5b09d2ef8d40fea480282d8b5d27756146deba0da0c268f25ad23ad51099392828bad3fd2a500b44c3866dd767bdbe5e4bfedbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192fb40f127f4f3e42bcc603eafa968a
SHA1a7470ecfdcd5ac7bdb1faee63779483aa7020bb9
SHA256207c8a066e3606b9733097409c5e25b4f93717caf515ba8036c8b255cfc1d444
SHA512d9d82fb98a84fdc2c1b59d30472ab8849ad08e0438b2cc51b44be353cf43494a055b462d2b84b3920dbbe8e612cd6da5cf8c6502b5e48d9e62f2e80e6f3fb6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f379731e26737659a95d068375c547
SHA1fad414abcab0ad051485d26ecc46afe1d0391e28
SHA25637bdcacd0937313eac5b0b13743cf7bb3aae6a52b14580934dac1dd872687516
SHA5127d6a72f778adcf67e0f82a32f6ba0ef96d2ae3a44f3ff2fe77471889d5b1c0c4e98e9e31f51147183784287c270a9c32eb81fe6ca63ed7f0aef7c90249c1b438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a369a26c6f8d78f05fc5d474550ca1ff
SHA15e467014b6711eaccf423bc0d6f5aa2e917f8ceb
SHA256682829c1d30f59451d9995fd1aebb10adba36412f66b747b804c995a61383f9b
SHA5126cc0d6b228f84586768d498d2da1efc9a6390cc6efb8f7db0b8f85bf3e52e96f7adc58bdc9927255197c4edfd7342f28285d85c052271fe60fe4cc01febf94e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a