Analysis

  • max time kernel
    93s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 02:21

General

  • Target

    5894443a667888c965a793a435fa274e356f75ee7bb426a2c5d383ec2cb3dd8f.dll

  • Size

    749KB

  • MD5

    948c1804a0575469cc49ba7c9a9b7cc9

  • SHA1

    489973165043e4240e1523b7f49b7cf8bd3c24b5

  • SHA256

    5894443a667888c965a793a435fa274e356f75ee7bb426a2c5d383ec2cb3dd8f

  • SHA512

    ab322bc9116f34e4cdbb89804557f2a561d2d11890092f5a9638c853690b3338b948cee3f8157130e15a255d4616979db018a3880496bc8b84dbb3c7d2fd9c37

  • SSDEEP

    6144:2NIQzLZN4k3WvmRPLx+xXqOkyWh9ZN/c4bsXdHtVHs7Z9UqKJ0M:2NIyZN4+Wv4PLq6Okrh9ZN/hs9DsdDC

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5894443a667888c965a793a435fa274e356f75ee7bb426a2c5d383ec2cb3dd8f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5894443a667888c965a793a435fa274e356f75ee7bb426a2c5d383ec2cb3dd8f.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:3732
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 204
                6⤵
                • Program crash
                PID:2704
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4808
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4808 CREDAT:17410 /prefetch:2
                6⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4964
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1876
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:17410 /prefetch:2
                6⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 612
          3⤵
          • Program crash
          PID:3592
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3044 -ip 3044
      1⤵
        PID:3000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3732 -ip 3732
        1⤵
          PID:3560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          5e99ec80bb4e60401972729dff7db4f2

          SHA1

          a68a2f47614d8afd1b7afd1e0620d32cd393e2c0

          SHA256

          6ac6e0c6b415580d28c082f0e59f45289379890a167c088a557d3e2578b424e0

          SHA512

          7670c7e91ae9555458275effc570e107c9ae43b02e65f9200b773f9139dfe228faf55f5c4ac5d9d713d0231e16c129baf1c289534b42ac7b4d042f370240c654

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          fd44a692fc6742df91aca3ed48160d19

          SHA1

          41b6964ce6f255a33638f6a950142075d5e38647

          SHA256

          ab011810b50eb65ada0b6bea16adbee556534c68db6c3844e6fd35d486ffe352

          SHA512

          4998cca9bdc0b46170b6ba28ccbad7aa0e5ae11e564ab4b540931686ed594e03f27591a0c0d9a42dc1704fb3980dbf300821b1283b6092fe58e40ef2af751cfc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          0cffe889b4a004d5a1c67b2440471967

          SHA1

          fedef14adfa04885e9864ce7f9e2decab0fdd670

          SHA256

          8d568f349f2ef6bdab3503a97a8072864a1f98c35619f8f83456811dde350baa

          SHA512

          7172975b0a5e04a86ec7b5fb50dc8a26d1d38cae150a04505346a21481ee2da5d555220c006d87a84401d7d4f4f65fa52341a2296a83f03e1b11577a4aca75c3

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F445DD82-BDAF-11EF-9361-E6FB6C85BB83}.dat

          Filesize

          5KB

          MD5

          b1f10cb5258e3f2e98b0e4dac0b46165

          SHA1

          e1a728d62eaa98ff5576db17abd226d926475ac1

          SHA256

          b7850870925de539ac8780d3af363348495b44450c7c67fc3b0e0b7a0bc34b8d

          SHA512

          4853b7fd258b47862c7d393a5efd00171b2f7281f23bfc1eeb6b9bc3484c54f636da3c7190b8bae6602f6e8b6d318d66322d95c9b55bbd0373e0dd7253267c00

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F4483FDD-BDAF-11EF-9361-E6FB6C85BB83}.dat

          Filesize

          3KB

          MD5

          07e44e0f5c2044f1cb43fc10595e4cb9

          SHA1

          39d1ffade946a93b58118ce075346a9ae9d7d6f9

          SHA256

          20e5253772804203ed777b7c631b252975c3abd3422ec22b5df288cb3de1fd8d

          SHA512

          57175fc4610893721553cd7308e710d92f0760ed971277dc4527759ea03226ee586aa5319aad00fad64544388a571c451452cbe277c080b230e42fb8c9759cf8

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3C87.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          164KB

          MD5

          2a37762e1964cb393abf1b26b048e762

          SHA1

          6167b12b2d0e4db8bad3dd8ac6c7674f8eea2f1d

          SHA256

          385539e7b0dbbe1de66ca4888b07baab2bbce51b3e6c6edc1b2602628fa7d8e5

          SHA512

          57e2904f6231c879d99df7fdbc321c03c76bef310e0510b818d1fa3663d44d6e56742d1b746e96d42e9559c83d437bbc4eb7fe672567fd7e18ec513bfb8c53aa

        • memory/3044-1-0x0000000010000000-0x00000000100C1000-memory.dmp

          Filesize

          772KB

        • memory/3044-36-0x0000000010000000-0x00000000100C1000-memory.dmp

          Filesize

          772KB

        • memory/3732-35-0x0000000000C50000-0x0000000000C51000-memory.dmp

          Filesize

          4KB

        • memory/3732-34-0x0000000000C70000-0x0000000000C71000-memory.dmp

          Filesize

          4KB

        • memory/5000-44-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5000-43-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5000-33-0x0000000077A02000-0x0000000077A03000-memory.dmp

          Filesize

          4KB

        • memory/5000-30-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5000-39-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/5000-21-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/5000-40-0x0000000077A02000-0x0000000077A03000-memory.dmp

          Filesize

          4KB

        • memory/5000-38-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/5000-26-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/5000-31-0x0000000000060000-0x0000000000061000-memory.dmp

          Filesize

          4KB

        • memory/5000-37-0x0000000000070000-0x0000000000071000-memory.dmp

          Filesize

          4KB

        • memory/5108-12-0x00000000008B0000-0x00000000008B1000-memory.dmp

          Filesize

          4KB

        • memory/5108-14-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-13-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-5-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/5108-10-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-15-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-7-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-8-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5108-6-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB