Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 04:15

General

  • Target

    9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll

  • Size

    513KB

  • MD5

    dc8bc6ccd74d328c9f641c282a287feb

  • SHA1

    a56f0a1acc9efb8c3e3de608bb8a2e840073f5c3

  • SHA256

    9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7

  • SHA512

    36cc0402fa295a6bcaa43da6305aa2ea1a8547bc6985b38bb465c53217c05b1819c28818533ef80c0b056b8d5bfc2bc66ac95683f4a11c78e05d29a8a9a8036f

  • SSDEEP

    6144:el2uHQRByruC6NFpkt4nuTU1d76R27lpiRHfdXluzGjJOCcoGFccMWDOJraQ3wBF:en40IOc/RqAzx5

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2172
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    096060f9f4038540652108aa0ad08c43

    SHA1

    8bf72b60c578b6ab238daf1a04a4562bcd13d0de

    SHA256

    19e1815e53467410a12436dcd8c5b5f57b48299f6505c6c605338bc16c5a08ca

    SHA512

    2ed48bea2e4c1cf5068f34ba2054dde70592ae3296b21e322472466682d3bbc6b98fa5edab3c3352eab3dc71ab4b3568fab1fa12afc829fe289c60bff4466fc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87c6ee5d5fbe2da553c24fbc85797f46

    SHA1

    0ddd9ca5734c423381ceeb134d0cc3d55ba55716

    SHA256

    b0bb7be6edffe452c7a9ff5f412bb9f59f8263fa4630a7d3c3e6617935e7dfd3

    SHA512

    b0cfc8fb54fb5c075e7243b9d9060443e304bffd3155eb329715d6b64b6f4753aab1495783684796cecfedb3766d1b0dbf2cdb8ae9fb426a4d9d711859186c29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cddfa30084be37685371792c76f98248

    SHA1

    b62d5e43a5af30a22292defcc11e82b5ce834b9c

    SHA256

    f558fe0ba7362e366d4848c70b33508f88c32477d315684559224b83fae3eeff

    SHA512

    df14b303c7409d47f4d002d1bba48223d401074db98742adf4cf4803c1ff7d85655200dad55a02a3b7de9e5648a1d571b100defffef867024c09db87031b7d90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dd0d0b84b68158ddf35baf74f5c499f

    SHA1

    c66fe1383bb1be3e46413c7296cb8152f2605c4c

    SHA256

    362351ad98463ad4bf48368269a571378887897250d49be9ceb1be50a61dc1d2

    SHA512

    7f43d25f01bad7d174f555e7e18a23e5353a5f1f2ea58f9b8988d1ca381a4bd00df0c40bda1ab29fbbad9e472c8a5c08ffc20a7e451456306195edf951b29d4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51f5e5982e81908dea6e4554e9390e6b

    SHA1

    b5ba61db6eed7f7e5e1596f147fda4af4a7f92b1

    SHA256

    4851e5be15a2efe06e28700063317a12d597daaa311e96430f4641a6b9a17d37

    SHA512

    bcd76c5f5b658272a96b4358584694b96234fdd093da9e7daa9ecd2af3110db9bd5ba6c4b35c8390e01e8c85e93720c70ef2cec5cea1d95aed9a6b022ca530d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee047073156afe84a57fc33c17ab3a21

    SHA1

    f891200aafd8a93278934c0971190ccf1a1fe85d

    SHA256

    8446976c4f5aec54410909053a69042f528cfcb6eec67d4f2af176fbb7a53030

    SHA512

    5349538e075d1654fec33248e0b507e469874b59ac85189f83856fc0b374ab66e919b7383d3b21a1237523388bfc486f4c452f87b21bf6330239b08d588b3b90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab646a87b81cd32b0f7e4cd85fbbd26e

    SHA1

    cdd15b5d0ab723818f82bccd5755bbc146d35127

    SHA256

    f0801471324a35b697ca39bd45e46a0206bf10fd3d22203da019183344757a56

    SHA512

    9f9ccb61c1e36eddc6b25c13eea3bb4e0abe25e93c45d45f3dc7c7f144fde82bbc5aa2a94d631fb477d6aae8acac2ae30fda0a1e857d200a4734af0d9563a8ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4b22d2eceab85398319c78145d8f1c0

    SHA1

    b58b702a0cebc29e3637364af974a03585d8922e

    SHA256

    f698cd38f7033a03600c1500a042a16477f1931ab9bce1e54180becd5c9be1dd

    SHA512

    aae384239eafd0792a121e0c15128f8f7d3d642730b06380997a3a9f884ca07a3847da90836eff8262add584800627af1301f802dce0b07c60785dff3ea76d2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a56d42aba0a052db6546d175a21caf90

    SHA1

    6e2fd7bd46ce4577be4388d669cc33b5a6cda693

    SHA256

    d8de726dc9ac7543a9f3ee3b2d116ce968b91ecda0e5698b77e1e3ba62cc682f

    SHA512

    9d6d04082336f92de2c502a0baa1096f0d3bce5d8c85292e879a7205436ee4b73d9efc197d3be1a39b5cc0d96ffe677ee182d4b25247c3932af895f91eb39128

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c52534ea9337f2a7fc8ec897709fbb3d

    SHA1

    47169561e6cea7e30a8eb09acfc127f46f9c275a

    SHA256

    ec5395ca14fbac71f1951d1c84f80bcb285b8a5b3c7159785b6db7928523eaac

    SHA512

    0ca1bb7c8376311a298c85b82960b95f69e8ccd008ad57cf3dd837657080907975f5747239ad4b16e0c73cea9495bfb5ada4e272c7b08cd3074350042a375c35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    900217d7e6c6a89923c973c7b7283258

    SHA1

    ed8c3bbb38ef0d37840126a40f9bac2e14786d56

    SHA256

    2eeec386db0d365903e2dea44aa622482f0a143abdd7a732e2341aed722d1606

    SHA512

    c97f0a23c8814a7c4072228056be1c6bba6a9ac0acd246f2827f2542a87a7c41f9e36a0c5b9e5b2fd487131750716de56de1851cbf750db78962f43fe7d23e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e861b6082a372f2171585b9fb3081316

    SHA1

    8104f106bd7dee55c98e4e4ba310147a59b7d85e

    SHA256

    95a31ca4ede8fa72f348710fcfccd3cea2349fd601bb481f0d12cdc1e88c397b

    SHA512

    e0df5750457c02d8f3063ba77217f9504e1a2444e122579c84efd18f850d39e2d30b17f5638ad0220a58595e5fc146bec6fb00d963df7c146c1a0230d89d7ef8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4904a2f067f4d20fef395f655ea977c4

    SHA1

    62375f79c947bed063781d3a65b02a246e9fe30b

    SHA256

    00d863def23606c3b2173cf42666bd4edc4d2dca3583221bc84090259e8ce5f3

    SHA512

    d05f0f37f2d0343b799cb2fe96302415c2114ab764007140a45c250217a55dbda2b3c2e89563c4db3fed78dbdea4c29c00e470fded36efb0eb4fb31ad058eff2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e2b3f7ba0281148d864dcbfaef5a5da

    SHA1

    147c8f995fd5cd2437cbd4a1674f6fd166e5de27

    SHA256

    b5e6a35ac96e34fc05f6ea9ca0866a37d547d78bf2458bae9e442cac6f9df202

    SHA512

    50b2f9a6a7c85f52695a5707ad9b8d3e484f26cda8c2a7480d53432a9ddf472ecb104b80a9747ff4bf45b2892f0526b607f5268067484f74546db6e4973936c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bb2dd13ba73a29e625c0c59add7a38d

    SHA1

    f542c428e1152121342fba59b06286eef4726237

    SHA256

    5cb610b4ea7238b4ef70e1b6b9f38b8f75a6ea80e2c019caeeab6e68092f6d8b

    SHA512

    03322b968004e7c5e05227e4ae6a790e7032b9e51b78c338b6279c758cd36cf8f1b4905c793356f4e2f1e30634598ce1be655303dd7005d7a37fad41d4f1b7a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4265f5245bec1c619fb5edcd021db762

    SHA1

    1d4f00c11ca4aaf49415c748faadcde5913efc58

    SHA256

    9518f23d778f5937fe1c15f9cef40ccdfb01e576b2ae2ea05df9733219974af7

    SHA512

    b01a53bcea72aaf801e3211430e98dab1cde0bec824915bd647440dff25676fc384cfa93d4f5fa8f4bd114135fa945dc8c7b73c1214c570475efb3da0dea76f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de9acc27480ac76bdddc9ea13211d945

    SHA1

    3e8110b40c8dad76e8bf438916af5b31b226e489

    SHA256

    186df4b7f90b787247c90e7d81dce89cec50365f6a905cbd6991adcf2bf31743

    SHA512

    ac5c7802f94f2fbf347455f550c5bd1f0767ebed1db7d9aa391ebb809ce1eedb7160da7d8e19b7852524a7ca9514ec634adc163c3638d54b1556f1dfe3f9ed6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d9110fe60f368cb2a4862feded2a94d

    SHA1

    110c0733c6a1f4054ffa9ceeb740bed13dbfd03d

    SHA256

    2e3c35c86629f9635e954f6c8e720ff4614973744ec16e95e8703e26ba84d5f2

    SHA512

    e1981786a172287c6a8ffe0667e23a912d0fdfaf18c8a4c5c2ccfb94718b21fddbc9be84795b225b0c56307c43561f1a6ec5fbb2e76b6a5ff23387e809290703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c10df6b207454b5bdbbd013fd1479b2

    SHA1

    aa5e287cfc41301db84942e07163105bdddb80ae

    SHA256

    857164b98d2133c966b811a8de843717f8b149618eb014d38b3b5bc02cf99f3a

    SHA512

    10f7d41e3921af66ec7d91842c51b5118fe69f25f6a66122cb6278513ce0c9f313fc0a89a25a755c28817d77d6b7c885b76a76d79822f759c4ea874c3654a8ba

  • C:\Users\Admin\AppData\Local\Temp\CabC41D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC4FA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/1548-25-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-17-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1548-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-23-0x00000000773CF000-0x00000000773D0000-memory.dmp

    Filesize

    4KB

  • memory/1548-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-20-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1548-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1548-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2616-4-0x00000000749A0000-0x0000000074A24000-memory.dmp

    Filesize

    528KB

  • memory/2616-12-0x0000000000120000-0x0000000000140000-memory.dmp

    Filesize

    128KB

  • memory/2616-454-0x0000000000120000-0x0000000000122000-memory.dmp

    Filesize

    8KB

  • memory/2616-0-0x00000000749A0000-0x0000000074A24000-memory.dmp

    Filesize

    528KB

  • memory/2616-2-0x0000000074910000-0x0000000074994000-memory.dmp

    Filesize

    528KB

  • memory/2616-6-0x0000000000120000-0x0000000000140000-memory.dmp

    Filesize

    128KB