Analysis

  • max time kernel
    67s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 22:13

General

  • Target

    67156c4514350debe08f1a46bd8af846d0051d3c47b9822d346988ffefcb3461.dll

  • Size

    124KB

  • MD5

    375ec40961b27b4efe5736685135868f

  • SHA1

    0c73bad57d858f46009dd9442a6d4f0fff6344e5

  • SHA256

    67156c4514350debe08f1a46bd8af846d0051d3c47b9822d346988ffefcb3461

  • SHA512

    11f557868a8a94c8d8243a680e7f1e9b25b5acbde48128132300fc65891e09854cd90413ffab070ee2ce71025d16b7799cb813414d486655c696d7258d50eeed

  • SSDEEP

    3072:8j6tdCcM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4e:8HcvZNDkYR2SqwK/AyVBQ9RIe

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\67156c4514350debe08f1a46bd8af846d0051d3c47b9822d346988ffefcb3461.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\67156c4514350debe08f1a46bd8af846d0051d3c47b9822d346988ffefcb3461.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4189ffb15f2c27044e68441852d2b8f4

    SHA1

    317fa5779f40ba8500ce77bd69c8ebf7263d4d1a

    SHA256

    6a4491bc4efe4071c229aff2806b3026ddee4916fb36d9caa5d1329d70d419a9

    SHA512

    996eae83a19acdc6cba6b57654f1a85d7f4211bd0dab50b085a4391bd41ccf447631aa598ccaedb50f951296a9d8736aac6f68d46aa7ec9d21c09172d5378bc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed9ff6ba69b93c6416a6cd4e312a6585

    SHA1

    db979d8b656c6766f59ed6eb144874cfb711c1b1

    SHA256

    56d6e014416afa829275e5c602a2fb27f1d0c522b6d7bd267aa3231e3a6d0070

    SHA512

    9c902fae34cf5f5be2b25ee4cefa46f1e04cd9702e9bf88e7c4e2450c365b315a8aa6b6674b8afaa02aab6218e70aff91d64d4f822b9fcb7bf84ab3258798cd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    795534c90699c6aaaffae6308b38f558

    SHA1

    1eeb69afe37375660b188c5d5098024f93e6ac87

    SHA256

    115866ef08c3cbc6fe92aba81b27a2a737382d37169a91d682180c48c6d37362

    SHA512

    5aa78194eea334df14b1d1ca69ed658b2fdce5cbaa94f4c761f8bf2278f4ec02b43284563b5cd9904986a96a6c8d341f93b3e2df7e0e27b2f95d65f3aa465194

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd411d8b6bf4134302373b76fdc3b005

    SHA1

    94844409bdd8d7cde0bde414df1d241597027f37

    SHA256

    22ee9315ec181c72635be914048e5c0c840d09ad77dbb9feb51a57e48dc43ade

    SHA512

    d913f0552d545c710351893dd3b010e410705bd279cc58e2542667b947e75500b9ad5cd2ea4997050d64f24c9e47b39fb0f55432131515ef1bce9f85a25cd846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea862ab9ae57965e98952f0b1dfa4492

    SHA1

    769e40604cbd2699eae6e82e71467c7101dde286

    SHA256

    d10781d370003296468830691b161e92082ae9f2b2bfb38261070acfc2d7dfc0

    SHA512

    d67105c857f8f1b179e40827e88d5a5a14297e65f00c7a06ebff476e78f916082fafb7f2b5c2b963d89c6bf9138e7380ed8521c950c1a18b8d19037c902c552b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9059635e46b39a09c085b4d382e01351

    SHA1

    935f5cb90eb25878c98c334a2d1d998b0333c90b

    SHA256

    659059e16e9764463c7bb0b1d5a80c06b9c9ade9029ade76f468d32714bec1b5

    SHA512

    c1898a5c39acf1d29e92671c208ce277d20a906964520a4cfcf65a9ced3e86cb092cffcf0079a52d96c9fb6fe6fa247b9a1e74f20139f42ad794a6e4a487d274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96bef89287d551cca21e5ff38d4f34f7

    SHA1

    67528385497b068c237f4621b7ae941432985b46

    SHA256

    c4c2e71ef4114c849f2ce0c269e7092acf07ee31d41ed6a446a508e03fd02411

    SHA512

    7f668ccd7b88236522c257b29b339f0f767bdd51971362f6aa449ec58e0ff72b8e392f4b1d735771327e7444233c006cc18a1dab8f77e5ddead868cb06165eed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73127e4f2c38db39725202ff332d49f3

    SHA1

    9fd6f8d63d78ef708dae24ca965923b2c3fad8bd

    SHA256

    efd57e1385dc6e1d0ee07a98de4c92bd5ba4e8d069ede4bac307775f377d839a

    SHA512

    7e22f9232c381374091169296c5ebc3e99a38b92de75a1aa7b2a42ffed01b3bf8032e516f11bcc2342afedcfbb6a3248530239d402f70c71d33deea9c75d59ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5ef6d0ec9548148b09470082f331199

    SHA1

    739f3e2b4b0bfe720de665275075f7c7b8218db2

    SHA256

    fcfead34d9a8af9668af8ae9f8c1bf4844ab7d99f09a7cd614b4193736ca40c4

    SHA512

    1019ccd10c8d55f4059af20d67dd4ade1e71061b2b78cfda44c0748f9287c5d63f10271115a2fac5f74f2313cdf85e82ab657bfdefdd4c48134bb6df2de287a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cf04d21d4bd89b3c7f43de90ee8604d

    SHA1

    8328f43c36ae3e4ea58332015b39534a2dd9d813

    SHA256

    8e228ec6431eb2db472739e7a36124690536e2499150b876cbb6b6c1ef70ae8d

    SHA512

    04c9843b5add95364bf5414d888efc945f365b0e9ffa8b07ae3ba21b6edaa51a67f320d363af0c9c0f006e16385b89939328108e27a0ee38809d9eb8735ec3ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    613aff614b53f832ac51b9b7f216fc5d

    SHA1

    275038ad4fee1ec3675bfab1e9eacad62386abf4

    SHA256

    5ce60fe62ab1dbe4b3056a0d87367dc2e5d64d43f70f1178bef2646de615ae15

    SHA512

    8dba3c8e89041ee829e0ada5648c79e8ae4ebbf37f36f55b4db2c46f17bc58094cdfc364d2c30b371290aa8f04cb0adf35813905e9502f213aff3c9eafbb224d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46bfc8ccf88622148ddbc36341daefe0

    SHA1

    84ea08d546a3f4348af8c032ff98409b94aa6266

    SHA256

    0d3a1a065e01efdb96235f305be9e910dec9b5ca29ea4f4029e73897b817efce

    SHA512

    7a79b12fc2342e3e777363a9549afa35364a1040b73aad56ef0627ec5ed05ef843fa52fd72827dd14ca8f7276d92021dac1f32fe85979948cd0f70a0ec42e7d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d388d26b106ed7042f728751973a1500

    SHA1

    f1004ed88ec407685dca0d93fe78ca1264a11d0c

    SHA256

    e3814132e7d814b4a5afbce37619648edc4c6334eefbcd18883107e6aff8cff3

    SHA512

    2598d16af371facd3719af662cf4e018d25881dd0a19e9a674acf9c6501f3d168f114559fde2633814aa2c1ee0b17f971146b57a4ea73460f08d6a25f830f8a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da3c0b62a5bfec5b37a283961426e0bf

    SHA1

    ce4b0a6f427a0529ccf122d8576fcd3d063cfdde

    SHA256

    31bbc94db3a2c803ec4469a52cfa7e5249baba87c81832a3a753bb82b1fd1421

    SHA512

    02239266976e47f82581733792241a246437e5e09834805cf08f397bb6f8e692cce005e0d7a471d2deefcd35a20bbe8116b3352edc2c04f5d41d8db73c4b8e7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06a6da14dce826f7a588ff0056ff5311

    SHA1

    f48ab42a4574f05920d7ebfc876da8f8e7fbe145

    SHA256

    282112daca0e8c3c4f709d3c422f9923d5f2e747c7bc54fca9c59fc689e79617

    SHA512

    ef5f304aae0a9828aaf6d528ce1fb7233925ef6809d642c4f7cbba9fef7ffc271a24891fefc89f4858a8164521896916ded28d70d5b5dae329f3bc62506f367a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90f3f9a933b888f360aab1b5a578856e

    SHA1

    6d337e86688e19872f0e4ab6bbf076b936b16dc3

    SHA256

    e88c8e8f74d934d767efb7e100e8840bd561f63718d5ecbd8f2dba80a645ede9

    SHA512

    162bf63943657e1cc1ef165d9ce0f644d78eab6525b757cfc8d6b529414f8798fcce74257d5dc022e3d22797d4252181f42205484b56b4946b610bd07413e933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3eb76aa363ad4c5b20f730329d88936d

    SHA1

    0056b05c91b8b62ea6e9958e78b197aad5527308

    SHA256

    435ea610f3c0b4cfbe4a1eb88d030a4b4226695840745883ef7eceee4bc7a47b

    SHA512

    3238992bd99cd8e1c823d7b38b637d025fe659e3f0ed922b771eecc32b2f4c490b7caa6eaf0ef63d6969c563e3858139ba41c4d5200a1d01166b15659836e602

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    047c3eecefafd38bd5755a7939eef2ee

    SHA1

    ea295539e6f1808fbbec7bea2b829808e836221e

    SHA256

    0f9046cd2faea44c52bbf1f5d089892e37497168d47cd68029840b2a980c1461

    SHA512

    760a0bf0af93993f9e71987845ae62478280da0da5315ae9cd9f8720ad147326be288c18e128b0d958433268103aaf01ebcd8652a244f04dccbc8a2e87bd2fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    440c6346bf7f76c6add79a14103bb06a

    SHA1

    9fb6843b8ace56f77cbd0f1586647eedb7b639ed

    SHA256

    3ef08060569cb22bf69c3c077426ab31c1cb9cc727f22ef690d5b333f3b35a19

    SHA512

    81f60bfed6978116c208cf366070ac0eacb78f5ead026caf38d2ad227a74a0bbbeaa652251f4705ef740684f615b05233ee0b22ba2816867578e2d6dd3b71c95

  • C:\Users\Admin\AppData\Local\Temp\Cab6E6F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6F4D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2272-452-0x0000000000100000-0x0000000000102000-memory.dmp

    Filesize

    8KB

  • memory/2272-9-0x0000000000100000-0x0000000000120000-memory.dmp

    Filesize

    128KB

  • memory/2272-1-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2296-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-15-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2296-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-23-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-20-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2296-21-0x00000000770DF000-0x00000000770E0000-memory.dmp

    Filesize

    4KB

  • memory/2296-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2296-10-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2296-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB