Analysis

  • max time kernel
    110s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 20:47

General

  • Target

    fe81a558034dcf5f4dfb709ec5b2fc0e5e43abe84555e85884b7271547bd58f4.dll

  • Size

    148KB

  • MD5

    e7f7955583c677ea596b6e9a7c68cf9e

  • SHA1

    ff46415c6367374454fb2abe612891208377962c

  • SHA256

    fe81a558034dcf5f4dfb709ec5b2fc0e5e43abe84555e85884b7271547bd58f4

  • SHA512

    df7afda1e4b570cf92538da5ccd73f285887294db89d28d082a5ea3c4d8a4bb536751e1b7f23c0a978539939109c1ce7f7f760ff28f0f054048e19fbe1a36648

  • SSDEEP

    3072:+Bbqirt+ZEM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X46:F5cvZNDkYR2SqwK/AyVBQ9RI6

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fe81a558034dcf5f4dfb709ec5b2fc0e5e43abe84555e85884b7271547bd58f4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fe81a558034dcf5f4dfb709ec5b2fc0e5e43abe84555e85884b7271547bd58f4.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be5e971a1ee84beae96d233baa527d1c

    SHA1

    a7298deafbb2db8545cdbbc0c97a61a5d41a5383

    SHA256

    491c36c94167d63abb30deca542cead32f11a1222fa9ab42f864055179177d4c

    SHA512

    9a30c3a4fb271a232953a907699b678b6626172198701985ecc36d4e2d705f3aebf73f798b3323399a233096aa6113165f7cf5b6494f3576f7d7293baacf3524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ab2a86e341e4e303f718ac08e03d345

    SHA1

    565fce2b75cc020bb28bd9aebd95c032d7352033

    SHA256

    0535e23562a7b1916b449f569836ce9728b598bd150ba63a0f71087f5f4bc1ea

    SHA512

    5e7a55074e5f6a427aa1cce5f6c51fe9802c9960fea29d0b5342125bfdcec381c7c584d99c0f526ae5340a81d7cc69ca4a091dfc331a59f9c597ead1716b6c07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d013b27ace9d2f5ad1c89743c54a5610

    SHA1

    52f6737fe9b01d5a29d0a0266f128e86dad74b76

    SHA256

    9b25a778425aba1d03655c7e5e56e7535e6297cd7870656115a9df7c6db49b9a

    SHA512

    623b0ae7a939f944daff0f0dd1ce9727a2171110bb43823e132a209de0da7f227515bab3c3476f8bf4964699d308bd856c06dc5416b85160fefe9b5dd3504f31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    814c31102fee22cf046a30fbace1407c

    SHA1

    f7b7e14b5911f3d6c3b5fcd825371dd2c1deb569

    SHA256

    6d11de718678c0cb14d41af6a06d6fd00d0fe8e13d85c5709625e46022334194

    SHA512

    8f62194934caeb8452b74f7d1dbe8eec0ff71fe289a066f00140428406f4966bef5ea4a237748a53b4e12993eea380711178b8155951e4231c35850983f49b09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2125a00b547a8d73bec44986137e70e7

    SHA1

    d35b7aef2fb9fce5b8b3248ce023390c155f6020

    SHA256

    d6678c0145aa4202cc2d79c67ae34d27de5b3f33f2190b1ec64f9fa6ee62847e

    SHA512

    598bf8aec6232e87226487b817309586e1fb4644ac208319a3460b06f385af6a4446606f8488a8f879e9285985586fdf73f3341fbddb8cc08f1ee05efb139985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90526fa71d78819891f1350d0fb4a1be

    SHA1

    d6d2e22eb6273e38a5825d56f95d038832291a4e

    SHA256

    138911884c30473ff9ba58a7a2e9a0b545ea14c72d5b9a13f5bf100021fda610

    SHA512

    cc64ddfed3b6b734515aa64cd2024357941a6c8988d142d6601fe3b66d89ef8fb19896e7e963c8893020508a3d41ba5d62b67b789b3525f10c44972b8d5a5652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8a5f8d7dfb5de4c6bf833b6092f5a59

    SHA1

    d1251cdb520236db5344ca62a36cc10775bb8c6f

    SHA256

    e45940518058017d8274594934afc05f1b210a31bd2c082213a4206d1737c874

    SHA512

    d77ab3ebb8f0d1d6032dbbfeaf455da295b16e730f5bf13cc734687490f0b92cd2075a1110dcab4fedbd40f51a59f519d8a6c3f3a99ec9f4d2085e0e089ecdf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    766d872a45212c3511b4500f2cbda7bb

    SHA1

    db52ffaf4112ad198c1ff90302e1c6d5b692ddfa

    SHA256

    113ead96ca824ee1dd0f959e2395443e3abd1fe6f9c813e1b6083f061a7f4cd5

    SHA512

    e2ee33a3d13b85288c1dd97a91f69a80e9c6bf05389d15c23b0761e21527d4c681490a37c4aef0930f3f6e48cb9d6f5c793cbf7f0461587571b52d9083b1a740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0d3e547b2e7f5cc9fc5b57f6e3a51d5

    SHA1

    d8f3077c34832c07aa06a6fae67592f5e74a661f

    SHA256

    bbfe0e74d1f53f3e8b4f3c0647004a97572f4bcdba392cc014b5aa42d376ffe4

    SHA512

    cb153958114f99271646cb9c10a5e60ce7117d1a2a03f56a158bf95df8d4e705e28b96b47c283df2ff6a6a3d5a5cfba5ea779b6a8f279f7654a5adf99564741b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd6ceca20a44efcb642ff752c53ee410

    SHA1

    a243523083fe63f7fd189e6a5e9df8c65c5e8a5e

    SHA256

    bf791132cb28c9e35e9127145d3f8fdca551ef481ab11b76748d24564bfb5c39

    SHA512

    cf68a8c54fd8a726ad9a77bc262ad4b2f2e0640099137db97afb05eb353d127250ab99d67312af8e964ee6420789d0c1ba84a086aaa8530807776b8f1a598ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5405aa95a8d179626b0067b3f36be3ee

    SHA1

    62233e0d342d2336ea7426ea94ea3e68cc8e3758

    SHA256

    e168ed56efaaa7b35ff6db4d6000cb70eb7e71198995778f7902b593a8bf233b

    SHA512

    6665d34946f00eb4866705beafef934f18e8dfab06ed0b9add8ea7afcbcf791a49bdab33608b836fd9d961b08624adb8f2e3943fcedc910816b657342fdbfe12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6e99ac657259e8463641d37fa4faf49

    SHA1

    f85cd8378070d2f294d2cee16a7bb46de2084808

    SHA256

    c9ad4ec39e373d4fa7ce3a6dc3919acf74f624ae5210b6052b0ece5977664161

    SHA512

    f60201c4a76707364d65a08ae364c5eaefaf5276dc6376e949e6c149734b1111be4c0e8efdf2fc8c8c60ea8a43272d14cbed920f366c41abe1e797eb85a60157

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e7897c58b17ff570df3dd94d07efba1

    SHA1

    fdd7ed5cdb101d731b981513d28623bdbbf5b985

    SHA256

    274d2a3ddd5bf2308c45126baa0c0bb751e0b2891c1fc12e9f8aa548143f2937

    SHA512

    02c1d131c58e9b30e9b6615d4328a977d563a68499cb79b74560fb5d1a2406424840edec5a6b20b263902c43971f77fe0ce0ae2c461cb53f0ae7bd343d351135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99757d61be0e2ab6c795802828733d5e

    SHA1

    06454891e307cb311e7f6081701d2596cc441eb1

    SHA256

    15016448e99fda74f9ff9a6f2d7c72913d1c2aa9f9c7d731391ab1e886b2bcb8

    SHA512

    bc4a7853b0c306084ac7b60beecef5bfd87b2d83241037ff6aca4f044d532f7f3152ce141dbca1b9aa570943785f04608a8c27b702971572ae58fc8c6ce24f9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00c9641a0773295e33c5ef791323d0a1

    SHA1

    edaa1491710339e41cbd15bbea780c8380f8a658

    SHA256

    eebf9ea78b4b61ea46dba08892b162b7f5840dfc0ffc60329af9656a8d8c5a75

    SHA512

    90f42cbd79108e3fbce27acf23bcbd45a8cde5ae79938cb1dff78eb0a8f0317da65208b3a0481288111b3df6db84716972cd38d686e8f8f62e42a08391544eab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ac554df786fe73c31e32ce771897a44

    SHA1

    6227d905c68aa7118f1f99a8e0879d9c1850a6a0

    SHA256

    6d461249f158453d58e9ca7ba0915fe281f81d826f2805a9bf0a61863e184549

    SHA512

    f0eedde5e4d882c598c63ba7efb83ef0fd2ae9104aa096026a4d7c6ffc7f4ed42e354a1b62c9cf1723bf306cc1e346fe0bf772c78aae33f22602aaf8179e479a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4489f16eca4fef8767a15864b98430be

    SHA1

    730a174940d418f7bde12e59785a6c8783e679a3

    SHA256

    ed16f8d8b80b5dba56f2ea9cca30c575dc48558e568a4927ffa62dd5eb23e1f8

    SHA512

    27784a4c89111ea5992da6f1e67d76acc9c874ee4f72f408bc3ff91f9ae364a8bb6a65b16c8133625f8666cca2511199dc870b6a7ff8fa817862f1a57f76e0af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a54f7d0d7f009d317447bf7f80430fe

    SHA1

    2b68e65e993d34a59f04a811926d54225592c4b0

    SHA256

    8205867f0da04a7dac22c9eb62a11b3b1a0340921f93c572a644a9ad406fa044

    SHA512

    7b62a29916160c69d5a9a3c7eb2556656371d44d28eb2981628b9a4624da7aff141cb9a2ac4ae3cac6da9797e9cc19f0dc9267aeaf0a757c1a913eef25837bab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1803bb99060fadc00702a45c9bcebafc

    SHA1

    d05b2d047e22eef6cdb0350b36971441995f6ac2

    SHA256

    c844a638b9e10a1725695fdebe4b2e99082977e93384f7b9a7e9141764324c2e

    SHA512

    51d035fa445013fe2b7f67e46a050525588d7a90187e3e3cdc1b5909a8188ce9124884454ce5af7c30c8aee55e0807930d3a95e964d28153071116dd2ccd534e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6378f6ac450e8e15972c2ce4a2b20ba

    SHA1

    3104ee4bf0f59766c5bf39aa67e5814eeae9037e

    SHA256

    6fbb3dc81d4f194268798fb309010bd1d905468d2a4f5a64f7e122cde33ba9de

    SHA512

    c44aeefca771f471c1712cadf214c50d151b5a41f794bfa22417b326d03fe0126a8fb20de01f0835de810a845cbf3c83c68da340904684ac69d4c26a5b765e8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed712267645142b4531d3001a2368651

    SHA1

    03d255c186023cab861a9ac0d0615da27c3e7d68

    SHA256

    50f69e8c62f4185af78296fd0ce7171796d51359f0818ce16871c5c2a6d9c8f0

    SHA512

    5d3366d7226317b5555b0e48b507c1acdd21d363b36cda68ef8fc6b61254e6cbabe362587cdf5fd2862aafde933b49c937a1d055c5f3ba6e665736a852b8466c

  • C:\Users\Admin\AppData\Local\Temp\Cab41E3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4254.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2712-2-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2712-5-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2712-3-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2712-0-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2812-25-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-12-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2812-20-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-23-0x0000000077C4F000-0x0000000077C50000-memory.dmp

    Filesize

    4KB

  • memory/2812-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-21-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2812-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2812-17-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB