Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 04:20

General

  • Target

    9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll

  • Size

    513KB

  • MD5

    dc8bc6ccd74d328c9f641c282a287feb

  • SHA1

    a56f0a1acc9efb8c3e3de608bb8a2e840073f5c3

  • SHA256

    9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7

  • SHA512

    36cc0402fa295a6bcaa43da6305aa2ea1a8547bc6985b38bb465c53217c05b1819c28818533ef80c0b056b8d5bfc2bc66ac95683f4a11c78e05d29a8a9a8036f

  • SSDEEP

    6144:el2uHQRByruC6NFpkt4nuTU1d76R27lpiRHfdXluzGjJOCcoGFccMWDOJraQ3wBF:en40IOc/RqAzx5

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9b06af982da13a032e29a0493fb0645b821ab379e6fc69d1c755a8b9d4cfafb7.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b485e5ad6fd8ba559d79c25bf212bb03

    SHA1

    c73e3afd3c9dec56be95d133e81cdef74d0fe15b

    SHA256

    7b4852915b5acbd599847e55722e941db0e685c98ae3917ce2674271c0e87ecd

    SHA512

    4836e309c70c9d02bcd04b87b133e41f977e2a9bd4e928ec68e87b08cf0f50f6a07f5f44ad723574f868b6871dececa5ebea4b3ca59102d4300dc6c949112494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4660a3e701928d1b84b0a61cb2a558b4

    SHA1

    fc755b0d6d6457bba71c548c2095729485b65591

    SHA256

    48359c2a349a25f924726ad96f571cb9fb7fcc9767d8d2e29e2ac6371ede794d

    SHA512

    e0fd06702cb3978fff7fe65db54239c66461a2af5e1dc8a7e11fce0dc67990d8a65a1d930053e2ec8c29156c6a8a8da85ad046955ad186b4de87120a5b4761bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c07e54fe62d10c40bd05cd116374104

    SHA1

    007b1cf1975ad8a9bf1c0fecc3501b1b65add43d

    SHA256

    55200ca50132e36bad35c1643e1bdbc39431d7d45a6b0a08a65aef0ae71da589

    SHA512

    0c6d516f69451f0d4536116a4383bd2813dbc47223c6f6425b91fd67a5833e5c89d507163546945a92a4a9ed7bf0b1771a83cf54f59cc3b5437e25d78a716957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a860c411a7f7255dfcae0b44516b7610

    SHA1

    713b7bdeeda47e04371e0b21ba5ed7b3a1cbff95

    SHA256

    082855e6c32ee33798c611143cbaf1cdab63f9d2c48018406db900e25b6d1db2

    SHA512

    0b375a4f3b79f7a4798a8e2bdd1feb5fb874366724ecd000df90a2887fa26b4b1c9e416358926f38e2903a9cd9907834bf3944083df73931b9e8a9670ac39cfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5894cd4712b7ea4c9580766f6a73568

    SHA1

    7ef2e044ac07b76d20279cc8fd960f8b5a968a95

    SHA256

    55bdf32969cedf31dd9d83a1840d64989a3bcf249836ece162fd32a14510fa64

    SHA512

    37f663c5c0f4d3c2a575f6814d10941c400b6ea7b70fbb73b4dd8ac124ce5a7e0778da2f851cbeef6480175da1f279515e0c0b26078e1408d728f7053aa09f2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90cd7cfbc2661f80accd61f535f68b1b

    SHA1

    b7010bdf756c4ef58999da684bd7cbcd619ef5d9

    SHA256

    40a6440df1d2ca05181702b47846ac2281db58859ba0385734ba9e0cc29c4021

    SHA512

    75e75c2d3cc131506205cb26db4d3cd7ec7db5a85b9428b976781e14d9ff660ce8f7a893b6446281b1b99dab7eaacddf60b3160817c3b0444d4357978dbbeb82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0043705dfb84dfb6f0a8d1d7c36cd660

    SHA1

    51a568e388da4d51b05d94c04808fc43e8bf520b

    SHA256

    e782c30fba8b4aef3ee863b11e4f7dfc4648955829dc16e5c290e69f69fed738

    SHA512

    5be398d939162e8a75f6531990635c089a7d634179003a76afed7a1adfb701c561d525ec81e9468270922eb2a42d718423eb5484327ce8b1441601d5a2144ea9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ab9cc3ae4e452def5f791339fe4e40

    SHA1

    ca0e52f5db8a59ba9e9bd6d41a558268d625b5c2

    SHA256

    8fe83eac65aad90fd47fca7bc95f907faf538298d4689bf63b11588078f5855c

    SHA512

    fd2aae9dcf18566f05da09a39f4e9932ae6deabac1a0c2f074e67f8b0cabbf7cba5c20e98aa20619ff5a52c3db844187bb31d26e08faa28c3acfa1de730b507d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dcee08323fb6626ca3b7a6869edbcad

    SHA1

    9d44b8b7899c8cd593c66d5a8167b059127f5773

    SHA256

    bd71366f656a36b54d424a74fabe20bec0a6ed5fadd3d8bd5b424a6715807bd2

    SHA512

    372c2242022def2e7a632ddd205ee38deac582364a0d5f4b3178d512414e79b55f7d2a02b407619103f50ce99a7694e6a1c23c49902e6af2cb8bf611920bc8f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6f9a658c445565b43ce8a4d8a277071

    SHA1

    55c06d4c0ecac01d598590291cd00674bcc9632a

    SHA256

    5754ee251beacc2bc95278ddb9d9f0486ac7aed345e6eb0f7ba3de8f5716a822

    SHA512

    aa9fb29d2f4dd9c2ae3e118dfd434edd9e28045946d5165286a54b2dc1838173c3878aea41da556ed442e9b8ed5d53ced73507a41479b33139dc00d33ebfa021

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    039904502311f6982529a83e99ee95ee

    SHA1

    4e0b649a7290d88f921c0e83fd26463d4f4e65c2

    SHA256

    45fb37e00dd14d51232d3f2ce0f7e4ea2e6fbf4a376bc261f413e2dd4aab89ab

    SHA512

    13ac2e61a9b09f53b08a647127352033ecac2c5095341aa6f4d551382fe9ed3dc5710681c0cb85e6d1e4a042f4c09b30b51367fc1910285cad7fbd5116f043be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e094e6ed2da29da205676ab6a49568f5

    SHA1

    fe3775a338308b774c879483e63831b4f8fc8256

    SHA256

    50313e7a84bbe3be0e4482bcab3ede5b12ae57ec6618fd4ddff04c6d1cbac4dd

    SHA512

    f15024911fe910c0f9469209dffbfa29cbec2ffe08204116842c32262b12c088db1faa59a4e92e8ec7c972b13532f82347b8f4c9793b9121eabd93d991c9c24a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dbdf5de0586380c2d335479ea8ca7a8

    SHA1

    ece32a65f943017860ce389276491d386f449ba5

    SHA256

    3b86806ca06cf960afcc28dd7445417143ab77f4b584959ffed9457b906c1f9c

    SHA512

    5949de4a2210ea137cfdd38fd3413dfb9ae9ec303ae01e2a3ec763a8f6dfac3f0b5267693561dcb50c037da2828f5e65598621999bd9accee194b1f649fc29bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    312ba6d734ab43b14fe38ebccdabec5f

    SHA1

    203167153e4ae57285269e028e62e404c4122cbd

    SHA256

    4cfa43461df99bb9a162d08ce5d93e615961d452256446615eb26732a7956dea

    SHA512

    1b4ba6f71fd0062543588f93b42b9876639fec71227e8d868fc905134ce17b7283af58544cc269c3904e762a5254ae13c6bfabfbcf617508241049107ac30c15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6209c809e5500577e4291d91d52e925

    SHA1

    a32b3ac6a096c17a25af8f2199a8f4a6fb9b0cda

    SHA256

    fe948ad2d8bb819451cfb59b39d88483c69d7b203d7e781bc06de6e9a29dbc0a

    SHA512

    367c6c27e28f5bac8d91708ae8f5b2a7efbcbce4640f0b2bb3744f8e716a180c9f68edf757a67fa89b0b054306e77d0427ee741953f4c09e3d2937b9dc6d4493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abf8f2633b95c493106de58bc782658c

    SHA1

    70db799e6c2e7331085cd2303da193d093d5eb2a

    SHA256

    147902ce969972705f683b071fcbf05886fc7ef87a1c9bab1c564f2e7bb7d38f

    SHA512

    3f2693979487325211bdb36cb878680dd83c17ac612c62ed665e96d464084c35a788b0d902bd6a6f06340d103b401689225f209bfb9cd6f3e40b444a591d2fe2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5249cac78e9fa34d549b5d5693825aa

    SHA1

    2cf89cb53d4f678b4a5fb2c901afc595e2a3773f

    SHA256

    679d73f8421db18d549c807e2f0ceb729164e218fa771f9a87a93d0fcb99e901

    SHA512

    0ccecbb6d1edf04f2f9b561ff95148104479f50955867157f3a5bd76f145fd07807772282254d621376f28a00370c905bb20276b23419df5fb8a5cf03308a54b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c63a415ca477f5f02137bead6c25b19

    SHA1

    d6792b57ad8f27ea0c393fea4b3bf97922e216e9

    SHA256

    c2aaad71edacaf8db3faaca2c1521fbcde5728ab325be20dcd06b69eae898117

    SHA512

    0633beb6962b4758ec0ef017d8c7313058c9c4ca06d8e998e9c5d384eae5f58cff5f3a43815d2607eac69c3464bf87296fefa3a811d3c62815c65e987d6e4b13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d45306f1fb86b3a68133d9b7afc34eb

    SHA1

    c3c23a6940f324e4092ba6b62efa4cae7a8f3cac

    SHA256

    6fa2343c91df463613bd4af341b05cd939a8da315ce504df86c2bfa113129f14

    SHA512

    d4dc25873b8e5bf12c24c75d735fb67fe790bbc55dc9fc1639ad02d03c5f277e21596ae556365f891c926a36d995bbb78a54808c32d2b7ffe2e8c1a2948cd5cd

  • C:\Users\Admin\AppData\Local\Temp\CabF73D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF79E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2304-456-0x0000000000170000-0x0000000000172000-memory.dmp

    Filesize

    8KB

  • memory/2304-1-0x0000000074B40000-0x0000000074BC4000-memory.dmp

    Filesize

    528KB

  • memory/2304-4-0x0000000074B60000-0x0000000074BE4000-memory.dmp

    Filesize

    528KB

  • memory/2304-9-0x0000000074B50000-0x0000000074BD4000-memory.dmp

    Filesize

    528KB

  • memory/2304-10-0x0000000074B60000-0x0000000074BE4000-memory.dmp

    Filesize

    528KB

  • memory/2304-11-0x0000000000170000-0x0000000000190000-memory.dmp

    Filesize

    128KB

  • memory/2304-12-0x0000000000170000-0x0000000000190000-memory.dmp

    Filesize

    128KB

  • memory/2460-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-27-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-19-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2460-20-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2460-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-23-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2460-24-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2460-25-0x000000007746F000-0x0000000077470000-memory.dmp

    Filesize

    4KB