Analysis

  • max time kernel
    66s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 12:36

General

  • Target

    5514c97bbf2845cb244e6603d16cef52f1c0335f968d4f44097ff88dda70194c.dll

  • Size

    124KB

  • MD5

    352731e9b9344d98404c27581ff7a396

  • SHA1

    b88ce461d86f7fb0e530e166b33de8888a7d91ca

  • SHA256

    5514c97bbf2845cb244e6603d16cef52f1c0335f968d4f44097ff88dda70194c

  • SHA512

    55554a4f622bec3f4b759323e51e5c116ccd38bf38151d6b9abc3dd34f1cafc486b0c6779ffd4b2bdaf3de59d5f80e35a29b96248c8a4977dff209026825d9c1

  • SSDEEP

    3072:ijulMZM5M7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X47:i9BcvZNDkYR2SqwK/AyVBQ9RI7

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5514c97bbf2845cb244e6603d16cef52f1c0335f968d4f44097ff88dda70194c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5514c97bbf2845cb244e6603d16cef52f1c0335f968d4f44097ff88dda70194c.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3a649d0edc2c80bad4aa5b102367231

    SHA1

    b14126c9bb424e67a2227431ef52dcee3c8a3bda

    SHA256

    ded67a79932214c8ef0a168f14b13d5e97b44105992c5c515671c472a49d2e29

    SHA512

    bb5dafd4235cfcb036dd9c8201ef9dcc8e707e8ead99f531353ca9dd910d9620814a2d17fdd97d87cf59f895f9c24ecc1e230a69558a4d395dd35e854b48e0f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98457371c37510ed38b62f9af30c14dd

    SHA1

    b954b50cad4a33e6947b602506f4519eb0565b7e

    SHA256

    1436f89d00dfe217b7c95da217a2c9db8101a2ccd515d9bf6b8b86b02d8f9a14

    SHA512

    c2fe50e192f11dae6a5b15394092b67353375578f7f387a902a7d328482f27ba6bec3239462c21ceed6f77fcdece3a1f6578e14fe0501474362b682ba3f4c213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a80b3920d7b00a82ff0f2c71d22d6649

    SHA1

    d3e0135f35b07a82f6413104203212b99de9f9d6

    SHA256

    8e99a9233319a24ee99e2e99cd99b65c562de329d710525643637979da65f97e

    SHA512

    889f070ec3728d93b090fe47b756f80f086d13ef375e88f18cf1d7a5d0c7ea72f40cdc8bdc6399afbe8acd87769b633998cc1ef03c52c55b4af6bf5219fd7d76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b7b9ec02dcd4514a0fef4ebb9418658

    SHA1

    2d49ac8d6a0a87c40aecf2eb6f023c385640be85

    SHA256

    2e7609b01143b7513603547ab586a8ddb62821aa776d1b45c246f1046d15480a

    SHA512

    8a3e212ea95fad7b9a882de933215d5dc0238da194dd41ecacb4940c71a25b060a1f93918af2820afb75c92c55e0766c1eccf7c9702abd9976a56ebe1edba87c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efa844f16a4a59a6d94b11356cca7cba

    SHA1

    ac42995bb72cdfce05b997fc77cea5675858aa81

    SHA256

    1f1ed8bbb9296daa6da93b71cd34b7a7d12a60d5b284bbc9dbcce9ff0a4d7b0c

    SHA512

    2ab0dc43b935ba4c80a2edf87151d199e44ff2b1300418ef2df0290441da0a6c969944d250fd3ca562a379b76522156704af02616e350c4caadfffea291e71fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92df22aa70367e4baa1ad39ad7bfb478

    SHA1

    d32cdad44112ebf4a809b537afed89e9202a3b0f

    SHA256

    9a46fde96a9a91ea3a87c38cb8b68ddcda96bd280f2a9ce4b19ddbeae00e02ec

    SHA512

    50e56506ce9d7d7386c7f693b3f6387affd9b3b6cc574b827a8ac4474df393209b54918cb693d6de1783dd9b5a7941b0a51a8de392fe7938d6a74b79b0c7bba7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fd5c200200fb12fd6394e6f15bcd185

    SHA1

    c2964596db3b82a172904319f822d00fec339055

    SHA256

    2296dd0dcc7533143ddfca86a3ee95cae381387509948adb607fced7972ce149

    SHA512

    28562ca57aaebcafcc0c5c024165d1e4f23caaa356fe90ba940504d41566f38ad779b2e219c25a03d253c98efaa07fb02008221b42fcfb96d5e09a1b2d7cb003

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38d0832b8d25a5fc978c64d0c8f8910f

    SHA1

    f2e815526e6ef819e8e4ede28b1fa7a9c3e8b56f

    SHA256

    cd9001dc7f848ed452d3c712e5f8882e133320a3c0d00f6a13a39057633f218f

    SHA512

    d130a2fc621d3cdcba35718efc9773d69216cfd3d1c2398353d2a1e2d2cda73dbbd6435c0624a75208bcf64199c6c9f738752e76253ba77d54c5d78f9ba9a8a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d38833e4ab30c805c50f40567d81afaa

    SHA1

    d500abaeb1e75347c379f4eede51f7ada5800f6f

    SHA256

    771466badc596a4d904fca3d980e3df9b6581552c9d69b9c3e2f6ffceabd3027

    SHA512

    b00bae250d304387250fb4cba7bdca6a0243beea7a648e26099d03e43b8d5b48a07cb054aa707f0ada81e27d65c53207a9092825cc0692f9152d1107f85b9472

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d3bb34371c5ff0efb2699392c9e4df5

    SHA1

    07d7488f93b8de1e73b3becefa617e46715ded22

    SHA256

    08f8f78e49d47cfd9d6528ef0463e5a49645e40286ce42a1234570f48a6e4f00

    SHA512

    4e80ae112304da36ff16b507e784695de14705de4d187def541230fc0d4a34faabc01ac7c10b3efcd27864c7b3298acdea5cd01a1fe08f151b5745db702af6e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    855502d7efb95270ab530859c94b8919

    SHA1

    933edec66846c31e699f2fab004c8d8a65f36cbe

    SHA256

    79d2580149543483c6e92e5b4e76ed502a091cff43a8a831082c73ea5d81ff28

    SHA512

    cbb663597f53c0abd1de8640d4c4df74dc714ead230616b1dd86c4627824733688e647ebc30baa5c4ad71be9beeebb5ded86205c97704e89653be21e4db6861a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b30cd51bc2868f18dec9ff3d488e4dfb

    SHA1

    2131fed93fe19a51ddc8b894cdce16f58101f724

    SHA256

    56144be8059d49f82289b9216fb5ca6fc91d2ee9ea651aa2bcec69710079c980

    SHA512

    efefca81f067fc5afe28c44a4cd73c109a267fc4738707a4a56ad31cfa65fb7c87f735c109395d3c6b538e4e28bcc60e4e6f9d632fd607c5bcbe0047f43deddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    649d9e17a1665d6add5976dacf815035

    SHA1

    d4f2673eb09d2b2043ed137f67f7ad68c12d128c

    SHA256

    6bcf3a7f6d70c2c93d4f3a0f3653ffe647794f1e484dec5da777c18dc707c6d4

    SHA512

    b37017a1db7fb1b4c4e44b18379fa8f14239e7e2a28d0159a8afddb5b0adeec320d93c0e3ef412979e7f5fd8344e88046c4c32084a4d7f3d56685ec58649b0cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0382a791103c890aba89ec07abf78bc6

    SHA1

    a92e48105b09dbf598791a34f6faf7eef70fd54d

    SHA256

    bec845e406739b44447e9c35d14fa7f6d2e5857ae7f1a60f0678089c54510401

    SHA512

    87ff9f3b81e4b069494b1483992cc4cceaba0d91f92cb5379ac07de41f0eed5beae6afff02dace0e121af7d036a644df58d03539fa06983b83c0bbdfed121579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0d0dca5b0dcc0cd8a4255de26c18e23

    SHA1

    4a7315884316af18afab4cb4234ec566ef5617c0

    SHA256

    6f40adbb69d7db1e2fcfb6531b8e926ddfd67200012467e8eca4c4d45b3d11ab

    SHA512

    9bc1da06ef6e647303fae18fe4e8e5913fa6af94995fb20495c560e20944c042f3bcc3dc6068d232a96e4a26246495c5410827d3a3fbd15e2ef5b1982d5ca359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc8aec5315772abb0afc6792d870d40b

    SHA1

    8706154349a0d6653282fd560f444bac14150fe0

    SHA256

    d6d61caa24a70d281244cecf63c8241c4ce996c2d00fa302c7e65e3e89af9e8b

    SHA512

    3856349ca3bae96a034507f6de523e83649ec231ae9fee2c8bab0ea879ea9fb2b43d4f36de892068a2bb741178df8898495a82fc4099836ad7da9ce43f1a1bee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc1cca46e7623cbf54f67aeb536a9da6

    SHA1

    2f0c5c9d14c6908ad3dca7a8434ce39a57686fc0

    SHA256

    05c0b2f8f672a9860d9a34d4463c4f9793bebb45d974e682f0cf670a10dee826

    SHA512

    e852c2bf263614b9160e83c1d21f0ad78cdf52a4e7580b4c1a3398588cfd93cd3f86793434e31286d09bfe80f4b62f37b69062a96e73542628eb4270d46ead1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    357c23f7566c5905def5a52d8665ba52

    SHA1

    fa624d3a037b0754a3c9601dd8b22ebf5f174259

    SHA256

    0e8ccd088a5bd54a9fd4eec808a8428511a9fc8a5bfe8e1c9d04405dc3d22aa5

    SHA512

    b4cdf49f3b2cf4f095dab26b6e4fd6bfb4e1e24f2b659aced3ef5405edc8099aa47a340ca85d62a874f02fd6f3a602a0776edc1f49692c8b7273e835265a9e9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8df3bde231eb35de2f184ede2619963b

    SHA1

    37a6b4ecb3ed09c0b2ae65e27694d3e96f400fea

    SHA256

    0be3c2a7c1e2f1013b689502bcfe8db65f027429c175d4a58c336e9f68dca5f9

    SHA512

    203163854a227515669ebb51b76c2bde5f3d9190da84cdad6926956312571eb4d0b90d146bc842e45b7188bc8de0dd518512c2de816cbf51f54b16a3f78ba800

  • C:\Users\Admin\AppData\Local\Temp\Cab6C6C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6CDD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2236-1-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2236-8-0x0000000000210000-0x0000000000230000-memory.dmp

    Filesize

    128KB

  • memory/2688-20-0x00000000776FF000-0x0000000077700000-memory.dmp

    Filesize

    4KB

  • memory/2688-15-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2688-19-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2688-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2688-10-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2688-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB