Analysis

  • max time kernel
    119s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 19:13

General

  • Target

    b2a14bfdfd0f46e9e7db081edee8506d044493cd037b42204e6306844c40aa6d.dll

  • Size

    124KB

  • MD5

    54d16fc26d5a926760be2631a0466900

  • SHA1

    1e0bfdc77774dbee96f38e5eaa48fa0e16219d36

  • SHA256

    b2a14bfdfd0f46e9e7db081edee8506d044493cd037b42204e6306844c40aa6d

  • SHA512

    5a3ffe7b01f8d8a216e91788acb0a2fed4e80682520bc3701bf52dcea3b14e840e29c3f76c76b507caf8ccc93615f7709fc249f3fd7fa83ac5e3e402b93f22df

  • SSDEEP

    3072:Fj6tJY+M7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4o7:FzcvZNDkYR2SqwK/AyVBQ9RIw

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b2a14bfdfd0f46e9e7db081edee8506d044493cd037b42204e6306844c40aa6d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b2a14bfdfd0f46e9e7db081edee8506d044493cd037b42204e6306844c40aa6d.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a90be61e867cdbdcace3e2d4e81e7659

    SHA1

    e63317abf777b0abcbac9774949288c9bd45c17c

    SHA256

    eef54fb66149be9a759be3d2d9a04b35e9218ad65a17b63e1acf2a21246302e0

    SHA512

    3f9ab268bb3a8071fcea0ac29fd45787e1af3b55b9022a6d7c6f764e2c39cc85038284451eb0c7ed6e3507fe840b93b6d8509985f123169ab1b8e795ddb55b82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82578dd17c062b547b3be42752bc5005

    SHA1

    b9a68644cf6256b5d66c776ee2255ef46ad42c3e

    SHA256

    4659aa433129522a7f3f3e8644bfea0806f7b3463a9d1235977cae4ea0bc8443

    SHA512

    a945fa35fb099baa43157a00077d1f748848fb84f33393da9f7091fd584199fb9938cd7fc23f90120a1389bac6bfc43209025e414147c6f8e9e60d3fd0ff2434

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8079cbae3cda4100a2b861d0475d6db3

    SHA1

    077188270635996a7168567a373d11abd1ff5427

    SHA256

    f9385082f168e86cdab0f34320e39a7a5894631a54c1e3ad9e237704127953eb

    SHA512

    9be8d7f713d183b7745129156cc11158998212d37dc31b48e5296704252f210c55ad86c44910246de8a29c5ac691aa44f3717d96b39d2aed83b6552ddd88a655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    497a64c47189a3ff50881c86737567be

    SHA1

    20ade83bb9ddedbed40900e7203abd93cf4f5a28

    SHA256

    4c73faf3d14a0e515cdfac7f9f928031dfb731d76c7c10e859c626fd3c12e0ba

    SHA512

    a8fd15e803ac8d52247edb0089bdc2b49f8309b202b7081bdfb5511f981f86c1d72d6067da5df0c81ede5c2808a5252edfc028465c9390acaffb833c8a7c78f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb26dcd5ce1499262eaa5ae4b042bad3

    SHA1

    fe7bf4d9b402039faa883c38f8e0c20fd95875f0

    SHA256

    1782158a421d3498938d0537d786ad1c1e62f067db53da1bb8ed366cadf3e5df

    SHA512

    9247f1350954cf373414e11603b825e2ab94b0dcdaf2388b6de719dad83c56a40213134bd773ebf1955dc9546f4b992532d56d0c5f2ad6025e5e6b1fc50599f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eabcb31154b5b61174f6b9733037d18

    SHA1

    01ff0910e7f02fd1685781ed44bf5bd41ecdecfb

    SHA256

    6bc8685248a0105f0b1432cea770e068b869bb7f6ee76c7da66381ce345a2465

    SHA512

    9185e619f21aa6baf769598c0b527b4eb357b75f1af5a9eefe7f59226358db9d731c8baae133b9fb404f994cc13f649f41c631a9b5599e113a3370e3f686de9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    683c8d29c0403f302cd33e9c48562e5e

    SHA1

    6f56247ea84dd253d1e4ccb80b950e5b1e23053c

    SHA256

    9a76639d93107f211cb6d4fde5e84b53bcf6934615ca40855342d8264f55d439

    SHA512

    7829b9a861010bf2a9529b7030ebec3c34948b7df8ec9c004753a4608b61ace3533252dccc76d59dbd8fec8a7fc5f42ff2608c89996a41fd733e072e059564af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dc578f468bd607af75d5d2e66c3176f

    SHA1

    a389b94c4d8519be0df8d52996c3d8ef0e09e2d3

    SHA256

    a426164e4a5c4136c80f9a71627b5c1b7b2f1f3095d2a38c7ecd7fb6f09ab5d1

    SHA512

    437efb27e33a1391ee14d8d3b19761d1e2606b40f73ace95e18efcfe04fc10c7921eb104ca899326b0a244303d94f12ad90e2c5b5a8f0642fdc79c9ba8feac70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a4c054fd470e6d7d7e1edf2227481c8

    SHA1

    90adbc68f96e070fc59c33517f6183ce72109dec

    SHA256

    faa6986d7c11d148296301691ac343ce0bbc05e77a6f67c329c6de1af3fcfdd3

    SHA512

    bdcd750a589b94229ce43c01d969cb5ca664b9ce5e1d002bd34a4afeb99b09c25ee3d454533c1cf2de93e87ed67e87f81684eaa8bd7b48db7bc2077aa9b0d114

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2336f91f874e71e35189f62290f94a0b

    SHA1

    3382d1f6df60206daf603ee52ff10c0fe188c7cd

    SHA256

    0b84722d9e22a8750467a6b834d0fd8f4ff8db75b5fb5a5352ca57324c713b8b

    SHA512

    b046bedbc41537f5fec559c7cacfb1cae8b1c45a805d8878b14dc7723e2e1cf53fdf1fa53771d024c2a5dcd7375ee4ad8e450603e129465da219d7230ff8072b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a94e89d9720ff1fac678fe524b0dc2dc

    SHA1

    71505ea5cbea19368c8e3182327c5fd423606607

    SHA256

    510bf5a53fe3d3da01914a36a8714b39bf78297b44bd60f1400ac1dc7a47cd23

    SHA512

    cc0015e5cc6f2f8e71634270e8cda289299d3570806e8648632b40de3d5e6fee17a3b52a9866377fa4a844ed49f3cdfc6cbfec48b09c979a9350913b85eb757d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    530622fe501b505ae8dc3b4a50813fc6

    SHA1

    45065d00754ced184de032455fdada001aa5dcde

    SHA256

    6e4bac8e7a48397639fcc33f0b7446193ecb16d000054ca56a2ee761bb8e7a20

    SHA512

    4b9b8c084e9f26597c14d1b145f66d250ceda3621e1515ddebd98e7b4936e1863640ce8bf4db6b4870f548c3658bc27bf08cce1bac57316ea6d11f978977ca92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7f01697f2c77c8f58b9ca8b23b2db8a

    SHA1

    2f2231ce6d2b7601d126dadadf5908381fff3d7e

    SHA256

    0994056379d91bb3409796f96e7113d261a4f4f2427c3de6c8576e0dd387393f

    SHA512

    ad793325d3ff7f4d056b5c517b80b607bb612f27e42c74e359bd7355673008df6294f3df29f2fda74c7e4bfaf237614b64941e1549a0744f3e506a084cc16399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e2d217c7712cc2042f860090db5d5bc

    SHA1

    ecfd47fc6702628f818e0ba33d022f7b6e6d92ee

    SHA256

    ec714961fe71e1a24585b530eb689ad7b890453b40cf9f40a8d687ef8e616c32

    SHA512

    2bdf3f1785a097598d8845dd8c9191203985424241c529f71ee9f882c239d2308ca5c61aa8cc6a4017dc7b082ea1c294a3cf3da9d29b15ee5a81670009d0f9e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b97fa5ed4c50002f9a7b483ee5d383a7

    SHA1

    bc85d2341c9b90e6e03e31361f0f75497e468476

    SHA256

    713a592bd1b2e1e9008dc9b62c30759dde7b4245366b598341839496eacccdf0

    SHA512

    329082c3d0488571f810c27babca6517ac704c65ce1e2ade1ee4574ab25ca7933779a69c970f592c95702eeaf9b0ada4d423590e38a5129403f3beeebfcd7ecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae71983794e06e0209c6b77653672ecc

    SHA1

    7cd479f9ad336c034d2567fc5183859b44b30a6a

    SHA256

    616461ad48f0853e7e26076400af5a05676c6bbfba542933b0dca7a59b17b07c

    SHA512

    3e4feaaf763bf01e575bbf4d889da6cb643ebcce414723905dec9e51f42e46ba83be9c91076d269a746e19617f7930183885185fd44425355099f8aec284cee1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab4fb72ba9b45d5f44128cd6818657a1

    SHA1

    d6e73e50df270077c5ad70e094628f45a6dcc08f

    SHA256

    c313d557ac3acd96852bcb8cd613a44b8b0ee6db1232229d01c066b5ef32e63d

    SHA512

    f84ac03c5d0d1908efd6e2a065e954fc487d71e0cabf12b1cadddb64fa33a46fe14fc959ac414e79b139fceff363a981f60984c0488aabfa82d82f3947cc8ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b773a0cd8a45fd6835fea27ea927ebf5

    SHA1

    a863f62722c0fa66c39caed7e87345aac13665f1

    SHA256

    fccb9a7809ca3cc71246350693c3e0f8b8dfd4c88a848fa7bea6c3d14ad291dc

    SHA512

    39460bbe46aa37ab86f76e73e71d1c8e06be26583feb9bc28249ddde00b8e64d875626a6589926297f0db5ce63e25c0d4658e042afa9738963ae2c9b5b801740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7acd25b6792a1195f6bcc2c22c4d6981

    SHA1

    7c23684b54e2048d75741ed9afa826e0a534ce03

    SHA256

    c7a1fc26c053b4155937430ca0c4c1c016609c1e7b3d65d86a295b2592f33c6d

    SHA512

    9427ac58a0a200956d3032e4187e0c5263df790e8778292036d9b45c2126fc889f6292da6f8d13303afeb1d6fb4f48f81449b3d9c15d31464d51c40f2a571c73

  • C:\Users\Admin\AppData\Local\Temp\CabFF97.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar64.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2744-1-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2744-450-0x0000000000330000-0x0000000000332000-memory.dmp

    Filesize

    8KB

  • memory/2744-4-0x0000000000330000-0x0000000000350000-memory.dmp

    Filesize

    128KB

  • memory/2788-20-0x00000000778BF000-0x00000000778C0000-memory.dmp

    Filesize

    4KB

  • memory/2788-18-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2788-15-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2788-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-10-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2788-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB