Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2024, 23:13

General

  • Target

    6c756cda8715992748c27f05b0b22653b94ad46231395cd290c97977bb0475a1.dll

  • Size

    124KB

  • MD5

    9fe8e5376fdec908ed52e0141c9bc430

  • SHA1

    0824f40d42f6282f0865194a888298d9b2c63f68

  • SHA256

    6c756cda8715992748c27f05b0b22653b94ad46231395cd290c97977bb0475a1

  • SHA512

    6f2317c017685a5c5cd8d5d5403eb809fc37dd20bb60c190b66ef6fa15496c29e0eb7a5024de227f110ab6e9047444d41f898efabe7b382dd183daedd576a9a3

  • SSDEEP

    3072:ijulMZM5M7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4Z:i9BcvZNDkYR2SqwK/AyVBQ9RIZ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6c756cda8715992748c27f05b0b22653b94ad46231395cd290c97977bb0475a1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6c756cda8715992748c27f05b0b22653b94ad46231395cd290c97977bb0475a1.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0b65235ee224336880242cad8c8bedc7

          SHA1

          9fab2852a41a8816ad26ed14a66da0663a1fbb9d

          SHA256

          006e988565a6c28051a8f05e43bbf9083f1f8bd57fe4c83d71cf660e84b6f4f8

          SHA512

          848849ea83dcd1cddc1f4682a4c6c06e508736418d63ad5a6cc204b5730c6baa2256564dfaba3af2df99d6e4805cff1bcca6da6ad12578c9024e03cb21db2461

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e4205ef48bad7a5b2233fb39c5a66689

          SHA1

          0f52788055501ee2295e4a611a954b65110375a9

          SHA256

          8991d9f8d00d3ac691ac3a5e95d8b3ad1fa2f807eb485aad95b24051a03ab3a3

          SHA512

          8d4afeda1cba1751aa8fe4906c3301dd2f6e0e34c99d506fe4ad44aa83faba3457d8aaf552c6e24148dd3207a084898cd0d24ca6c2a5e9a983f8705a0377dd52

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f17b1ddf1d97e2bcf539c85717a6d670

          SHA1

          ae6e1c460e572302051176a6a49a2149b4af8a55

          SHA256

          344e46624d3c1669eab66b38cf4b5e6fe37e7f4c8561352c76a23d70920fef24

          SHA512

          6c6f422cd078d25a81647c0433a7801652b842b43d16b9cf414d8acbdc38574ef3931c58d35c617b548057dd2bc0707a61638ea66af2e72172f5ac4bc63fe0ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          54003b1c1034aefbf4ba7c31812ebf9e

          SHA1

          db36734f2f80bb43f981e19a6cf444f1e11c6afb

          SHA256

          26f51eb2d1f59620e1ac71633aa08022e6b155392a5eef8bc74d1af8d7c11b63

          SHA512

          e6ddda7d4ebfeb0a196cce5f62a03bf9bde714d02a3edaf8ee2ebaf184c40c40c634a06b599e89c713a90ebded546166760b5c62a9cb7fbf770b3c549151d99c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4b880563a7dbe082e77b40314042a7bb

          SHA1

          d1fb2e39b2c03f0f78631ee2349efb6ba1f38921

          SHA256

          601dbc218b71f8b1b3402841a6bcaca100c2e91619ed77b61b0fa089e43c3438

          SHA512

          526c32754321488439c29a4c87082af0d74f69eb3ece27d87827962f93fe048a9030ac1038fbb3247b4969120ee144b2c7c59b7e8322622101c8ef564a7f1e48

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          511d011e0e136fb32531805312b9ec8b

          SHA1

          6fcd7f7ad13087cb6e6524a44a2ba093d46625a9

          SHA256

          4ea01b1e1b499efd685e89e92038b3d6bfa90a44b313c16fb3b8b729d3ff463c

          SHA512

          0cc1178ec2d894121acba26d3228dea9c65770ed8ccfd77652d253e13a2c3b97e23dbc61449434ebe01164aebd569dd7f2f9739511cc62c24944332e24fd2cd5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a5df410880f0db107a95a48b56a34c9a

          SHA1

          0288e4d1b7d0d1f42ee45d8366abe5f7b2a9b1b4

          SHA256

          b89fb99e85b690e8f43b71afe83b9d56ad6b1d236a1437900091315b4d562785

          SHA512

          db9b348a56ad671131c5c2f46d41f76cbead35195202527a4f094b2171d77b028f6bd002765ba36d8c24455ebea80165a6b0048b7f2412c548199b0ea412d04c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          335bd524665ff8190b6340273d0ec26c

          SHA1

          1f1fcf4758986ca4ff6ea5da20f04ed6f578c7d6

          SHA256

          37fa6a9a2b7fa5a7fa9254badf282c78a3a56011e9547f2cd48a89505575ac8b

          SHA512

          965e25a13129183fb7b7ee178f6f443e17544db2c6ba94d16743324697737e4a3e42965d0fb94cfae40e1cda405352c6115bded68612bab2ed7d8cdd8a287606

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          486eb70e3cf5e587fb3fb7723e18e647

          SHA1

          0a15a000f289702c5a89ccec228c725f6ead49c1

          SHA256

          2c1eff0cfac925f3b6e50f3d14ce401ca7474eda29901241ee3eef80ab2f474f

          SHA512

          e6ad1d41cfc2d6d3c21f250bd0342afed5f46b6b1d86d276a5260adb428f4c48ac68400eb75d82275ff4d246da4087af87adfd390685cf3e1cca668c5d509fac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          63e174eb0e16530441c2f00176ed4d45

          SHA1

          d7206a576c7acf16e33cc515a9fa0d9a961f0a83

          SHA256

          73816914b28a539c85223262ce3070eedc5c6435f24dbf7afcd682c55e53aa47

          SHA512

          87fc6e5742a757f4f720c69304a303c4778a59205d89330d7c05b29a35cf0557ee75804f71d35e9efc9ac5da025b381e9de58eff4e6841b07ed2f58cc4fc4572

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f3b413055f0c1b3c53ef80d653c2c0eb

          SHA1

          770d7a213f13d522f91e51bee38e79ba71b2bdc1

          SHA256

          42747a859a508f778df54ae1113c8f0fb94dd912e8b52a3e78c7c5825b1c20c9

          SHA512

          e9b78af8e392f9d2c65fbbcf03c964a87792ef471d129fa328d958509027a92704e42fc5e9a40b0df5bd096e85b4af465df7b75c07114543895a2732397b4e9a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c8543a882fb26ae736b0d27c40766c87

          SHA1

          4cbccf86dcf1506a36c4b13b94a884b16a72a506

          SHA256

          2854e333b4fb63532540e56ad7c79c4934fe21146470e6f43abff83066b74124

          SHA512

          6badd33c0ac3af7ea51bc13c7610a79f5262a38d053473d039257d9d9b4095ae8a0e88ad14adefbf72a617ed5548512c114a73ed96c0e48d26eb39438c6f44f4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c0bb5febef0a80adeeabdc30092aed67

          SHA1

          833be0e641ae4e4790bfd70c974f2eb5119f8b0e

          SHA256

          ed509fbda883cba7e9c3d104bdeaf3550e7d5993e8e9001888e4e076ad92f49e

          SHA512

          95afa4abe4c4ff97a7716dbcd95022952965a27c18f55bbf0e7ab91d09457857e8a058eddd8f03db8a01ce0acfd38760e5c2c84e3a46e963b914a663b556dbc4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0d1ec6666cc1fdfb0b71d7fe25b918e9

          SHA1

          24be245ad344bc4d7c44859ce47347f22d39349b

          SHA256

          f42fc419ebe9dd34d0f4a3bb62df055493fc5edda391157a3ac41d0f34c7ed2d

          SHA512

          677e90dd1f5fc8247c75164152a610efd1334556aceb0f23ad245a3783fc80071b77f824d92d87c7d5f4ccf08adc37c62e5e7caeff4f3fe560da49e6591c27af

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6c588c9ce73f0109d0d5835ce1071d80

          SHA1

          e273f5d487b55b51ba5b58d43121603d62216017

          SHA256

          a1adca6dbc60ce49bc1aa485bcec81d9f39cf03d7bf193dd3956d3105148911d

          SHA512

          891c00916e4c4cd1265a309ec4aa33dfa37fbbb5a967c7f312bf5b8ddbd929685a0a00c4811c49cbe935eca26684cc1c4d1d09cd375ce653f405539a5eacb8ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          506cbcdf5639e5cbfb4a7656e3ea6792

          SHA1

          6c2fd8b833d6362b235a25e7181ea01f0e716003

          SHA256

          922682551bf5aaf01bf48d2bbdcdde6c318e84ff2ed4a0b2284cfda65af04932

          SHA512

          455512b6e54727c925b40e98bfb3aa514c07158065a17788b2605d6931db57bc234ea510eb059fc8926fc02f6525228cd59d63675ec8d839aa2467fee2e76cf0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          594e8f42f800931caff6d1b846395190

          SHA1

          82e9c7085e48f992dfc773e52b5eceec728ab33a

          SHA256

          0fe83412802a456552d5ee8e7f2a01220756b70da173be3e11fda2e7ba3b437c

          SHA512

          fcacd11fdafe625a035ba097ad92977dbdbd84133b01509a3efd1c680f6c53c283a4d68c6d2b99846c6d5a991e8392497cc53ad10f337bf76327a546f58ff5cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          543fbe760fbc9c4c1781e0a49c771e97

          SHA1

          a7af2a11649019c0d804147262652d05d1d2bcfb

          SHA256

          72540ddfb163172999f6f079f130dccdfee55f70883cb4d9af4bbebf5f48969e

          SHA512

          688e72fed7e58f5e0372c2e531e9ece79391b5dccae26d5ad1b98293a32d4a6240d7197b04a378fb99b92c8cbc5ea54cc27cc12d58cd7ecacc272899a24959ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          33bbb17323c6981279a988c3956cf550

          SHA1

          e35fe77a4f491664b9a897c556fbc4d196fb41d1

          SHA256

          cb978a34a61baab9c7e8d715887a90fa8d93b414971092eb99bd8ddc048fd1e8

          SHA512

          2804eda20892a462b2013184d12d8ddd19ccc6b43e797cf6a03180320eec4bbf6e28dc6c05f64c3484b3d48abbb7df29f1852cc530fa8143f6d7088c866386f1

        • C:\Users\Admin\AppData\Local\Temp\CabA2E7.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarA357.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          88KB

          MD5

          fe76e62c9c90a4bea8f2c464dc867719

          SHA1

          f0935e8b6c22dea5c6e9d4127f5c10363deba541

          SHA256

          5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

          SHA512

          7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

        • memory/1920-6-0x0000000000170000-0x0000000000190000-memory.dmp

          Filesize

          128KB

        • memory/1920-454-0x0000000000170000-0x0000000000190000-memory.dmp

          Filesize

          128KB

        • memory/1920-0-0x0000000010000000-0x000000001001F000-memory.dmp

          Filesize

          124KB

        • memory/1920-3-0x0000000010000000-0x000000001001F000-memory.dmp

          Filesize

          124KB

        • memory/1920-1-0x0000000010000000-0x000000001001F000-memory.dmp

          Filesize

          124KB

        • memory/2904-20-0x00000000003E0000-0x00000000003E1000-memory.dmp

          Filesize

          4KB

        • memory/2904-21-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-23-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-19-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-25-0x0000000000401000-0x0000000000410000-memory.dmp

          Filesize

          60KB

        • memory/2904-18-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-17-0x0000000000340000-0x0000000000341000-memory.dmp

          Filesize

          4KB

        • memory/2904-24-0x0000000000410000-0x0000000000419000-memory.dmp

          Filesize

          36KB

        • memory/2904-12-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-13-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-14-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-15-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2904-16-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB