Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 03:52

General

  • Target

    86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61.exe

  • Size

    1.0MB

  • MD5

    19e994fc4c9991ad0bf52707bd6b4f78

  • SHA1

    6c157c7008a9fe5da59a82bad9145ef06a060066

  • SHA256

    86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61

  • SHA512

    0d90de9ac90764cc36328ab3c14dbcb3e287329f3c710dd11f095dcab33d494c7561d2fa154a74749a327e8cbe8624bf972001fca405f768b0bd3c84129a534c

  • SSDEEP

    24576:yGt+igEhxI9qg8RVMdEU5vNYGp7oS7C+/kY6:MWsqjzMdNNY786

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61.exe
    "C:\Users\Admin\AppData\Local\Temp\86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61Srv.exe
      C:\Users\Admin\AppData\Local\Temp\86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7f447adc540c08c95a8545eed93f934

    SHA1

    2d0d834cbd0d3cc7b2e3d210c1f8969e2846eb38

    SHA256

    7d2514dde2dd99c36b5bfe51b0f291d18f95ff64a40ee56f41bc5549e7cb7706

    SHA512

    35360ea7d6c4af82feb2a3316c31f1a04455cfc044ba60dd5b5e76b8bd1b91a22015110e4ecd57410640443e37d6770552b80d516d89d35a7f8b22910935a2ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f5fd276e46ad2f241854393c75c569e

    SHA1

    25af3d2aa716d5a3e275e992c7913690b0bb880a

    SHA256

    a28d4f77384d4579728465a1b6e184beabdb6c7acc24e20d80392c8fd3f22903

    SHA512

    8d535e4e3422d9a6df5c973610da9cd124e34da06ac6ac60b68d96212fa9f4e835d751ab25666e86e43037c30efcad0f2fc5659b56cde6430987ad78934e68b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c697cea49ae216e935f912d5bf2a893

    SHA1

    45953502fe612f47535224ed73fb5919bd307aaf

    SHA256

    fb8135f1c848fb021267c08314cbf712b8d0078c09d7492ad00791f212d0ccdf

    SHA512

    18904bf7687ecadc74ed6b791f296d6d59e52e08b3c218959a0d75fd75fee517e364cbc53733c2bbd7057b9d08c966fa80183fa5953aa494219879fd44476300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ef9eeeca449c972afe6e8c5064f544c

    SHA1

    162dc82fc6341e60f10a243b426d8d6fef209301

    SHA256

    373a482b36ddf90b4c3c207a9e8fb1d3cc27becce9f57ba392e60e1a8523b7e2

    SHA512

    7d701d479caa995c0651f39d6b4f682b8b8895e8ac388ea7dd725248334e055f8b8f8ff4495dc3d8c8a7535bbc1f076b0cab2a7470b7081a50a2d607b9155d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89bd1ac5e18dee3aefd53a2c99452b05

    SHA1

    99d55f8dc071f538eaf2576154b2bfe61d1c8746

    SHA256

    b73f80b2b941e2152547380ea38a90b55578279177b1ab4a37c57fa74983ed74

    SHA512

    331a0209ab8c52b9eef6a1fe01aceff1795c596c866d23092b960d3a9bf437b2ffd96851589e00f1d73556f7b9ca491b36935b0822925a5202f10f1b2338f451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd941d3540b2c57fbdecb2bab5b49463

    SHA1

    4a69cd2c6ee63a41516988369a27614a02f2bec4

    SHA256

    6426370589660b9eb61b309069438f11b421d518f3736ed5d8c57a74c9c7b559

    SHA512

    320162aaa307911d33e794521f151da96e8791f35534a8b0c15b05874c8410c46d8f2572d898ec28a98d3c68b09c79c81308c1236f9f1b6322b937b2d8ec18ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f49a4ce38efd859973098c0fc10e4f7

    SHA1

    80c48602d1180789ea2dadfc3e64e254017dd4f4

    SHA256

    4ad229dde51ed12255ebd7274dd1eb4faa967ef057002cc4f905bcfbae080ffa

    SHA512

    a0d961918404421dc6b3fe95cf88323eab7a934f6d807537bbcc25b6838d361da0a43f4a7247b698a1e4299832e065479fe10bbcf74c960cb73799b82e444813

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf39573440581701f07110d0c0565022

    SHA1

    4b31d1eed8d11eda9499fe23459d0fa756d8684d

    SHA256

    1904d441de64603179d5f564eec09029e51b75582f757a2a3091f30521d795a2

    SHA512

    47c617c874230b642da4486faac373e6bfd4bbe13880217bd12f11268226386c5121e38ddf3ec11f7948703f31f38e076221013d745cd7ee9407661f8d0a304f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6373691ce4f86c9f7084fbaee1f837b3

    SHA1

    251d9acb5b2a7026a5d5763abdecd48f27ac894a

    SHA256

    7a933d272318dc95600c5c6bf764acd00321f5edc8ab823c9f1b7c547c4e2781

    SHA512

    b04942e0c9ebc3a48c76b2ff89f7a338fef959583a233b103ba0b85a12fd6cd6832a29d74e6cd94e459b61eeaafc232d6103ae0468ed135c023fe00d24dd02fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b13011ec83d0e30011aa7c5adbad00b

    SHA1

    2e30c09111f4cadaf6693f00ba2c38486e0f82a8

    SHA256

    aeaa970a42a1176e7469a6769766e69ed656ff870fcacf34454b19af56d281e2

    SHA512

    19804becf381f602c55d4bebfb4f7bb27ca3f9b21dd6ed2867ededbc8d920dab0a51cdab728521c2bce70d67c3178a62a7f19e9da66817c663dbfa4d1431f784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c207978e5eefef7ae38c55e000082333

    SHA1

    ae72abfd6c130b08968f89762c36e6375400f18d

    SHA256

    543709e698b270b1abcade143e403a65380d1edf01433706eb40cfafb9ca1243

    SHA512

    5ccdd0d96f95e79259c00d78cbc67c5bee65aabf9ae57f4ac091eba22d0ab9f3b197f702e50e45a1fa332ace57e6ccd15f20eca478527ed126cad9db15d7360f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2304a97e7795e33f970f8f1ab8ab56d8

    SHA1

    bebda74ec564b7a6a31808774c3e8f5f4d1af104

    SHA256

    6ff52a3b61108f4bdcc10668d852ff28333985bc3f66ff5c570618a9efd6b7f8

    SHA512

    b015d66ef607027c2971f5af78b0343159de6515d68200c51a9cf7588ee8a1cb1225d5a5a962b5cfa904691a990bc62ee07319550a0937bfe2fa6b809aae50a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c89cb0055a21c1ca1ded10d7236ed142

    SHA1

    e095d39fc5b4f11c583933ca9eb9b33001edd581

    SHA256

    679d7fead8d2c7372222311b03942e7f28323b8a7e2b10fe319c856d7c5d5b50

    SHA512

    567e2e85f17be6e7bfcfdd42f0acd704abe33017cd9cf2145a1d29c85bcb3168908bf94e14ac2d0f348704dfc3083f415c99589f44b5ee638a3c3b2cbcec3480

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59fc4831d8f2dce0ada377300ac4423f

    SHA1

    1eebf6de635057b009cfcb2ad813c7d89982c7ca

    SHA256

    c57b876b95f4aad4f307051037ae415ad17c8dcea325593b696f12de45e7b615

    SHA512

    218796c5dc56a7aa69633e349e55d97025590122d0fdfc5f33a0028598fca0bc9791f00a414071de5dbfb0ef93da817dae364aa631599e75dc53506530503b5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b8e0d59e40dfa59d3b003f05df570e4

    SHA1

    5c18e0d87aa351eb766a5cb8d37b04c73952f9d9

    SHA256

    12fd7949dbe89515cb5055fa306e45bef8fcde8e44c9d05837529fa2f43d97b2

    SHA512

    ff4e6a1ee1d4e54aed2aa25e626a59bacbbcd6c1d723f3ef3568fffe3bf9a0327d3de3d9540a99500fa504809d5d859f995be752fa0e1a0a1aa56141cc7129bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4837f3e9de3436a2512169a45bd4d517

    SHA1

    14ef40faf70b4dd72c144fe2ecfd830babcfdc2a

    SHA256

    89fae05f748f43d151a10a0668f95aea7f2cf71c3c9d3cf98b4992d1bcb2a11e

    SHA512

    9b1d27ab9d6996ae2dec887c07459c0d982597b28ee50d9bac3ed313ac0c3c599dd97b3cadd9197b918f91fa85da06c3721fc650ec52e9cd2e83afd87a4dad12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50141dc4a57cedd4e9a29972bda71213

    SHA1

    8f23f756c949d15065a7dce8540c150adf5568a0

    SHA256

    fa5363e2590416fca03d27d5cf5b74ca9cf87d9669e1c7217832327953354f6e

    SHA512

    052cde2a4fae17bbaa1867905b41292bfdcb126fd7695e49d0a889c57847c2f92ac169c98149b52418866a74d272d357148af6f5bf174a7d22e990cfba6badba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93db6a565b2c2eed16b665ad0a7e9697

    SHA1

    31d686193eca8810e25aa09961e291daa7eb76d6

    SHA256

    89fdfde9e99dd3ad077472f5210fb6259d016003fe4dfdb0b03eec198ad82485

    SHA512

    7655b1e8d98fb283a9e26984a433fad3ccf298d683b6fdf441071a7233d60a2b7acc9cef1c03c9117dba8bb0cd60c50039f052853481be9f2a76ba9a7a1b7812

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    406fedf14eb697d49d4e26adec4e48bb

    SHA1

    1c36b3842d58522ecc4f79fbe7e2a8d432fe31ed

    SHA256

    fc9dfe9c06891fa3ce7065adba8d3f542e0edbee1a4d40354d852ff9c5954577

    SHA512

    a2b20446ad2ab8b00ab6ef5411c24dbdb5f03b4dc4c6053e6e1211301803a237dcda5adae0a5bcd36947857cc3005dff5a4ac836621b4446f9d035605600de76

  • C:\Users\Admin\AppData\Local\Temp\Cab90DD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar914D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\86fb9e21a026067342c9a95e2d21860f365c17f9f523a8b9827dccc441ca9e61Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2344-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2344-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2344-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2744-0-0x0000000001000000-0x0000000001106000-memory.dmp

    Filesize

    1.0MB

  • memory/2744-4-0x0000000000180000-0x00000000001AE000-memory.dmp

    Filesize

    184KB

  • memory/2744-17-0x0000000001000000-0x0000000001106000-memory.dmp

    Filesize

    1.0MB

  • memory/2804-19-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2804-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB