Analysis

  • max time kernel
    66s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 22:53

General

  • Target

    6ee8dccd77fb41c61acb263a62f77a199a1caa9e2b2ad384ca6c3d9921e00486N.dll

  • Size

    148KB

  • MD5

    e94e8012a93a6f657370cdcbc20a1b50

  • SHA1

    aa77aef65edf928649e5dfa05b84567909d4cc7c

  • SHA256

    6ee8dccd77fb41c61acb263a62f77a199a1caa9e2b2ad384ca6c3d9921e00486

  • SHA512

    539b5a6038935eb487c8618e6489ba130bc36d18aa0f3cde317e5f0c0c79fed9bc8b5a9808439b27cd62d8efd9908ef2f888d5dc0a58eecde367463be7e6d6d6

  • SSDEEP

    3072:CBbqirto6ttM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4r:+scvZNDkYR2SqwK/AyVBQ9RIr

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ee8dccd77fb41c61acb263a62f77a199a1caa9e2b2ad384ca6c3d9921e00486N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ee8dccd77fb41c61acb263a62f77a199a1caa9e2b2ad384ca6c3d9921e00486N.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38dfd7cd9729825fe986a5a013ce31b2

    SHA1

    727272b68984ab5252c097d9d4165b88179fc9b0

    SHA256

    c905091b75aaa722a42a8950f2a275e868024c655c9cb2d2cb34204807c86521

    SHA512

    a1cfd94b147eacb90bb0c4d0bfed98ef674e57b27d59c26ae08f3de9d650a1acd8b10f36c4d2e264bfd8099664eed039ddb8b428573cd636fecb901a4cb4fa0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c1aae549155db0b48a0acb5f6da397c

    SHA1

    43a8841466aa13cce086e02b570b37f858b73dc8

    SHA256

    ea3b86d2b8ef091ee18d283b9658981c42b0661e02c5fd55e412056a3f2150aa

    SHA512

    56328ba425b87a1a79c5fe05d42301b76d4b493b9d206fecd24aa81026e84334a954dbf65f1573bbfcfa2e547e8cf3c991455ad042894ce1bbdc94f8a5f44772

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    178c4f4b693cf25a0be51488c933b497

    SHA1

    1f30184e4ace3e17cc0b09b30c358b444232c8b2

    SHA256

    a5682597109febc1dc555049ef8eaef7ea77ca18ef544ec5b183c676c0f95d33

    SHA512

    ba9734571b8be48aee84d2f4d70a9a9e2b3a24cf6291f5ab13058aa2810b1c313e6a82206b0e08ef64d4558441188a8234afffd6d65433a576369c65343b950e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8efcccd7716310cd2293117cf47a6273

    SHA1

    f33c4fe27bca69c45c0504a8dff2f87522305bfb

    SHA256

    3d302dda3c33a9f3dc5f2a7f34e7aba73cb3b92a31feebbe54acfda06354c9ad

    SHA512

    3037783cfe5d9faa791832bc0fac4bbab14a1164971b1aa053977f645f4550f271ff5ab3b14ab12552dca5f1c711a526696483ae4c2bc5d90bc0640b4aa68fef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33c79d290180d9ba86601b6bad883281

    SHA1

    e0b05b6191524542588f1d47883f5891f816bd10

    SHA256

    0a4cf16fef2f4151188e51f9a5b4d160dc4d4fd64a0137c93986486c83e4dc88

    SHA512

    4a3412a68437fa0c10d9b99646c3a3b3eb7be9b344938ee55c5d020f4de35c4a1371c10b8e9a6bfe2db607feb2cde081b50a9b41e029d7fe7a5f4e7ba52319b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49972c95415e18d01ab3329bc3f29571

    SHA1

    cc738b5142fca1ae2a9f4d84a24fe10978a0a0a1

    SHA256

    5eed8bb1d738fd52f375d094e7bbd8427b3a13c32db8128411f664b061ef9394

    SHA512

    e136ddbf0c63bb1894642bb72bc22bc7239f01c5880bf2d32d26d1b0c14b03c25de364aa83d78d0e8f2716b46e74937e753e0b5fc0ddec6c425c36b2e05090cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3cc024de9c0cb21013b65d987594827

    SHA1

    e4d07fd93bed919f91b42ffa59ec57ca25f7e110

    SHA256

    89023f05f6efbb9bc34f9595193af30ae639261fe0bc8775bee6194c207b4f45

    SHA512

    d4d20e093268fc1fca87a242eb4cc2efb765e983aa9dda760f05aa815e9d41f934fee9f1f5952ef44a91de7766bd733eaac0d09f66c9c4687478a169f8c56183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52eb07e165a63cb8090385738f8f7dab

    SHA1

    03d67e1ab8e81fd23e64ecf4efdee6bb34ff229a

    SHA256

    30546d6e83fba9196b2e550671d6968eab54cf532405e13767e2b1e272c4447c

    SHA512

    71084b5864c73dbe395ab09ba5cdee791ef05c8ab1ed6a89099bc5b30bcf53b99b78a8da4df5bcd5aeb19add2a1eff16eef51a518c9555ab22c16ec79e30667a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    866aaf1e15ea77c6ffe55f55a27d23e2

    SHA1

    bf346a09886b45a1edcb1d0a759e72005f1bef80

    SHA256

    f6be27c467ba90277fe092434b3aef86a2c3f1d1e32877f09950c1fa734ba9a4

    SHA512

    c82a333bd7b6f992b2796ba2d4272534cb1cf0513d69cb0c67906b1f37ec205ce6bd0bd29bb4cfbdaf3b83712c936680ef790a4e69d4ce5409ef5d26dffaf731

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a15f79ce3c6785c5b42dc37ff75b4ab0

    SHA1

    a121b7f7afbcf559ec7efbcf131417d678c8a5a6

    SHA256

    3dca7e86fc00fff41069f903718ead19aae0111ead2458428f3ac1ef748f93f9

    SHA512

    10d0708d92f919fc3ff5deb5c21aa03aa6f4b71368ff0ebd4786f4dde4d93cf4d1d1de1e650a0eb82088329154a9bf373c6f3afa759e9c3bc11c3cbb5b14db65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ad80fac1108fe454139d06df2c9abee

    SHA1

    611d88908ec6caef6942edd393263cfa4f77977c

    SHA256

    44cd8522ea8141b825b439d1d97109a0eb234f4b8bfaba2da7f67dd7db9ecdc6

    SHA512

    cb5e2e48340f03632a3b8a8315ec89c8130cf52cc4a004fa3c62604d433d17bbc3b4b8e7d2d1392c8a20d123ee949fec087ebadd83e55387e8882a2758b9f0d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1af634e8a1b6504579d9b779b10d828c

    SHA1

    3a53bec70a12eb6a0a44b3d2193526e4e367a08f

    SHA256

    9c9cd9974ccbd98c710fb643677f0d9ebdc5eeb9492a78eeeeb7af75ffc9c288

    SHA512

    f8a443e46fda260282f24732163884d0a08f54596fe0cadfd79ed7b11b8f4dc52408491076bf17963c779d25c9a5d0d6fc571099c4d84d81a14a643f0875fb38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44851d1a5164c71ef33142b50ee85f6a

    SHA1

    8bed738e20fed19ab3874b9cc6659f7692e96b7f

    SHA256

    56d0d96ed0e1d1d833bcf716ee7d40e7376e67370167dd4954225a15e04ed9f2

    SHA512

    3ba0ab4f3b038f655da5ebc2d56e567916cfa576506de73f65e90bab1ad38407d2e1667f49439aa1228e8c827103ccce57ed56a516d79df9c5d0e4fe8877905b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed6fca44feabf280943b07f5573bdefe

    SHA1

    976bf2c399220b80bfb3c2fd876c5652cf06c2cf

    SHA256

    5e86d908b27626d40222478b4d4647fe2da2309e75501bf8b9d79b0c78c7f31e

    SHA512

    2c02a312f6e4872cd4fe36b8ffbceefa7283870e62334e6c662ea7fc9e3b84cca0402ddcbc540b29cc694d238e1d736e3fdb7bd43d09e52f5434289f1c114d9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9afe7f01c341d81db0bfa2f17f54350e

    SHA1

    a5338e599edc0dd944702a516cf8a849addce54b

    SHA256

    2bb9729344151d99b18af82eaca213873745c3e9a7d10e2d7fab072c52ea5147

    SHA512

    441176fdf420305faa8abe0aa9ea836223a7b2e9a83161b8d25d2616ba47a35eb344f48c03579c07f0d93acb05f1e6b1e730537f2b13798462e2ad74637c330c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dd484912407a5c60a693c61a9e8cfad

    SHA1

    ea2dc7000670e32d4ee1c9c7e942dec5331e2b79

    SHA256

    036ff013e9f694af591611b223969ddefb9d6a46efbfd232e235596b6c46372f

    SHA512

    ee4190ea2eb139d650ac49ac518a5f62210951d62b74b06ac089904e55e17cf7ee7a390e7f1e9bd64c1c667cfb1209135e0edeb288f4538c73f52f4ba8edcaff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c18fbbcb475dd6a42b20ff87650982a

    SHA1

    ccaf2e54441869013a1c8f0b249528e1969f24bd

    SHA256

    67c922ce483eec3be9df98935d387827e4a52a44cb46c8d0ed2043e574d5b190

    SHA512

    7af68b3b67e17d8993c912acdc445c727fc00c82145a6f4dd4390c864c5fd8c6f0f062dafeb8de985ae6b4ee81cde4001d790b4626a48ad24247683d6905595a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c2d1f56e65c2134da52c0517a01bb4e

    SHA1

    b0cb16c3147fa3acebb2cd765880234d0849774f

    SHA256

    f3fa271a84e866c26e806c3c8bcf012bb15cc9bd71bd4414bd442eea62c7963b

    SHA512

    da499c8a23af542ea5eed317eb6cc8ecb759594c6a6f254d72455831e127ece5d2c60b6f0f92460a6c6236081ce1d60ba5f59064cd80751aa308d409cab3cd87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    059152f3fe6ffd78104c313b33a4bc07

    SHA1

    166d8be1c6556a3f2f4499d3f06fb02aa0b19c0e

    SHA256

    7f417e30bfc365ac628690f55659f56602fc9b456cb37394c9d374cea7870e69

    SHA512

    21d374fe11e9a39e819a5c5fb2d909cb0beafbab7d63d488d6d037698cd78abdf70bb0ed603b056a044c2ce3136b1dd4313a22ffd36f589dfc62bc246b88dba3

  • C:\Users\Admin\AppData\Local\Temp\CabE4C7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE537.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2984-2-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2984-9-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2984-1-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/3008-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-22-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/3008-24-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-23-0x00000000773FF000-0x0000000077400000-memory.dmp

    Filesize

    4KB

  • memory/3008-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3008-13-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/3008-11-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB