Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 01:55

General

  • Target

    92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0a.exe

  • Size

    1.3MB

  • MD5

    c97b0b912b89e5be7faee70af4a77ae3

  • SHA1

    3da4cede0b3454b76208ee2df4edada6975796c7

  • SHA256

    92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0a

  • SHA512

    7a0863d8a6027c05338608aa71f86c194d5a6fba368c99521d7590ab81672e16ec77bbfe68d19bcc964ed7043df23724ad699608189b2158ce613e04b1bdabe8

  • SSDEEP

    12288:vqOPajQUXXP8QvLWFx6Mo5rippDC7ee1hpls4Ey+xi3LXct9:vnajQEPnvg6PhWDC750xEct9

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgr.exe
      C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgr.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgrmgr.exe
        C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgrmgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2252
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25cdd18a915cb2ef643ecb6a87d31992

    SHA1

    89c9449a37f5cae2853b7d8d92c1fc472b88ff35

    SHA256

    9a9e8eb5c476ad81c343feecba4bf2c901a1cd1866b16049572b39073b3d99a5

    SHA512

    0dad6f6696fbd51b0d1bafaed0c49a0871f53969a5af02eaf20bf524c117db734773f3d5f9639bf4e808ae8552ff22939efcb2110d4ff1f616baec46527db77c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2f0f0daa224ee5158205a34addbf6df

    SHA1

    dd7051b985a0dbe1061ff5aeed484c7fbc34d81d

    SHA256

    11e9dfa75d205abb5855c19385f579d70b06dccc3842b3e8b0721d5b6a220705

    SHA512

    2a2721458c9c4d22f74afb05bc7adaeea20de073290bf764880773bad0ac670d15a437439d86a4a9cc62094c6319c7c00257595f84a08e3bed60178cc91aa727

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea5351b86cfdc55df8ee93d665382efd

    SHA1

    2cec5ee39b37ae1d7c50ed6a442cc7046ee054ed

    SHA256

    b591d8faf81179b12d28bf2db0c32e00fa9e5cbc48c6e402ec200264959de194

    SHA512

    475b60daf2fcd89c34c465af7f443007ddc84a355b5a4d7064941eeb83024cca23d005ac6a8310a42c23d61bf272575c0e7233ea0bc70babcc08f0f2dfb4144a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5eac422354ca43f30525e4476e76f4e

    SHA1

    974da497d34978973d823ea064579578658cff9e

    SHA256

    e7b0e548f31ca97f0e93ea171ced8ea2205acc005b8798a47446266c7e201e00

    SHA512

    9c2a17e2427e98fd756430f9b57d9894b25f6b18ecf929efd9adcfb91dc2b493b36a7be27cbd00c064a465b45c3ebaa80ba870d8041dd1f1311d99caf713b84c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afd8f1c93e7468f5e3d21059bc33ec2c

    SHA1

    109c1d375df13ed5d3ecced32819ff37fc467cc8

    SHA256

    e448f9cddbdc1146b3136e4a2ab341aafacaa49279305fb11fd9ecc8790ded4e

    SHA512

    d3ce20400f8f6007525fc905b9ec2ea88e9ffbd736502156bd917a4f95d567d43f789878ff352ecda0813174f947604b2949af68f3847b4824810162206dddac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24ed4e813a07cc9611ee420bf3e08a92

    SHA1

    143cb26cc914b03b58081ff21c65654a1cf98a37

    SHA256

    8f7665a26c012fb3d176d393b462c2ac0c18d2ee6e267502b195cb50b2f44c81

    SHA512

    30a775ea17ff01543e4d2a4bb9d3e3e012d62d852bfe7ced81e5043512f5c5f1bdf1999e2690242451bb14afcd72ac025a19744c823b47d6a46f7fb39b3a96ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0dfcd707f4cd45ebf4f5b3f18e9635b

    SHA1

    cdfef084732a9324f9df7cbc1401b7e338fb6c57

    SHA256

    ced7133169714e5184e988a9aa10b2b94a5dd3fd21a687a7852b5c4214f23062

    SHA512

    9a23c784a576195135b6d36bb078e9d567092308f91f3cf61b8e9f10cdad6120c4866da4a132d367a14e59412a8f2c766f0ba23ed2539d7c467dfdb9a623135f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de23ed97982f6288b53b390f073d088b

    SHA1

    7913e5cb292dd6949edfe3a0685c052e34da2fa6

    SHA256

    021fb3f4f3505ae37fed4992d1acb9e90acfe4861c9fde03ccc1ccfe48c3cf0d

    SHA512

    8c740506d31eccc101bff7c2383524c7c341555d6778397e83961a5d06b3c729fff6e58d6ba45cf4b19f7c0c6502f739ec7ff5de1c1d7a723e861daf506eff18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1136a629ef4943129aba1cd59fb7874

    SHA1

    3af74b016b7e6c0ecdeec6f64f8d7e56af8553b3

    SHA256

    dba41943a667e054deb3d1c098e64cebe92673eb6f8cc6b05456095e93c428bd

    SHA512

    a0a1b7d8bd76ccd02e620a37d412d8542779780f90711a199c4837c95a48294251f663954472cd0bcd848491bc324df7a5d286615b53f30df5bfd5e6afe6c11c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57022d0d146e624a71315fc2d2e7701a

    SHA1

    b17417e5b2436dba4cd74a835f52812a21f22776

    SHA256

    de68cca03a69f0f427f5628be9fa5ebe487133be34bb2628a68ead92c5ad0ddb

    SHA512

    e21ce9bc137c9df6f2bfc185bfd1a06589ef48ab4eb7122071cdfe6148469101785c5225da754ba3428aeb4bab85769c4e2576f5287836501350be5275828cc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    687465e4084d9ea70c38673c62c219c1

    SHA1

    fe3f8c719f4c2fd2aac8208615be19bd89b03e34

    SHA256

    503579f2c05be4514c0d8630a7e9fa12c24fa281bc08e00e22ba280ddae676a2

    SHA512

    93eece63b95bed5dd943293ff3c92058cd01071e84c3803d20548b51c6e6351f9c4341258058bfb67cd0067573d55852330541e658263086476b895ab24174e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    514474f6f852e2f94ab0a0e6ab6cf39b

    SHA1

    e075a3168836bc0c8511e6c2b41342a585ac827c

    SHA256

    c9dbab4948c1f42633df858995004076e7256bcd433e47b92fe6e40879fa8e79

    SHA512

    9349c48edddb2b5c07995f112eeacff8479a83013b790981621975467d88aae7f1bb798627e8b716de6a8d0a44745047c12d9794432e99ad5d3dc82398b4f939

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0788c98d537de7d0f6bcf05f779ca8b8

    SHA1

    32ae121eec10fee852e309d4d36c583e2e73a40e

    SHA256

    0c1cb6940defd855213d2698df89ff43d00d5b3f009426c412f9295e5e30a71f

    SHA512

    175db84eeda91b21b94d43dc43af50bdafc00c15a64461196b1cee5c3fce5bb3459dfc94a4e244bfc5ba9ac707831d44cc6bd33f5a5d57fe8bd17b39828108b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35c464864298ceb0757aacf05f0ba52f

    SHA1

    ba4e9ac23783dcff2ac047ad3017011a41ea868d

    SHA256

    1363312d637892d766efde09767a2ffebc85c6171345904c5ed398a71cd24f98

    SHA512

    70bd6a7ea3513627fd2cc89129d7e500f0e1c70221d145ed07b572b0c6d6da93871d3ee5b252d5c2e253f37da9160388b75bf5f7e49640ef1215d104d130d531

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    872fe1d3816bbfac49adcfadd92fb917

    SHA1

    1a8699f99f15767a33831718efd3a909b3b070b7

    SHA256

    f88f08aca7bd8aa13bfda711f23d4845be579612c6a8695f4107e7fc5fcb28be

    SHA512

    44c98c4ddbd1c959732ea03d384cd4f8729237b0f6d0eff8f09ccd2eb63f38503dbacd06371c21786fbc88b2ffaae5b0c30fe46c59effc02cb350dd885beef26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e788e98c2fc88524ef26b1f0830e9c4

    SHA1

    0378f26131d0179b2f7636f5a71ebb11033f22da

    SHA256

    cecd8844e53925ac5c95b295282a2e0be1dee03a993d17c9551c93de29dc0516

    SHA512

    6fb36ca0d9fae4e8585723e309b0a4d65111076b07f1e356a809fbc3d96b33526b0a9fb4dc7c3101c0902dc33618edcb4b18189519d41ed46986d7c97a20adfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0d942d3ec4224a63d6835a75adca46c

    SHA1

    b9c25feb2547614a5430d0cdde1fab348fb1e568

    SHA256

    7960a6694604e77cdd96351ea24089c98a6d06fb1d27b49c526c94f2979f5a2f

    SHA512

    fb84cd3a302eacbb1ab6065e647e44f36fc13c4a0b7fc42e2adc59cc7574c44b25d5ca09c22ea424661aa65727e8a7b873451d76e544444686313d574e5bd194

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d2c0b89a7827e6b74847868aa281ebc

    SHA1

    1d27a614a360a9926e5cffa5819a8504802b5deb

    SHA256

    0d476efcb478073cad855c18bcb24c45f6210d9079c6854d17550250b0968553

    SHA512

    0cfb9a0fb5803ebd2fcfa98ed39d68e9a2494478b4c2837cfd974f8d089b1cecda3b9483badd569a404ee69d9181ef9d1b39649f0af3c76e24617c0489ebf04e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59c85f505185f0bc86718cc1ce37c49c

    SHA1

    ba777566497d2602acc92e6c4773ac5d770438b5

    SHA256

    8d79c661e6f21a7da08c94b4fafa43bcfbefaf9721d6d34038e03d4e4bbe552d

    SHA512

    22c37f66fe50ab5d9a887bc8177ee078f4eb22daa1b63a3e8be7ab4c24f4cb708be8e7c385229576f2ac2e43771ba69fc071cf8491ebade94bc6ec5fae684150

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0CE495D1-C588-11EF-B557-C20DC8CB8E9E}.dat

    Filesize

    5KB

    MD5

    84bd9c58037aa5840be47f1ecb6517ba

    SHA1

    56ad9d09948f11ccac2c4939dcb4e7c3f4278e54

    SHA256

    22cf3b8ac7c4478ee66b76caeaf4b92f06b71740e1d7f188456db2f822b3590f

    SHA512

    f30f2a814279145158106476716ee1be0d917b7bb0550d5521c86679ff89c46f54ef2f9fa2cd80cf992b6f1eea12f4bf69bb22386d678fa3f1923632c9f4b332

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0CEAB051-C588-11EF-B557-C20DC8CB8E9E}.dat

    Filesize

    4KB

    MD5

    fd1f277108517950b5c00518a4fe2330

    SHA1

    e8628095619963aa3ee6f0a6dd7945bb424fe573

    SHA256

    e86eb382040274ddd37e280740d22796c1b29d9904e6b38a4bd29ab4af07b21e

    SHA512

    3badf0b19cd3d9e98d600227a7b8cdfa22a921f60e1349d10e2beaa67bd7df20b130f351e04f0b0d0b6b8cb1839c8280204bda122f824fe7d39a8e7042fc8ead

  • C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgr.exe

    Filesize

    176KB

    MD5

    fa7f8da80fda86aae9a3f2364302b5a7

    SHA1

    20d1e7e3ec9db5fc5992c368a213a3d4f8f785f4

    SHA256

    1458f7f05d222fcdb2f4131a15c9408144e5be45a5e53830823124bf3891002d

    SHA512

    1cc17fd351e8c493fb3db31d02fc2300af2d8ae8fb081879895082a81a0f41809f1cf1cc594eae9faf47ca3d2086a26af9c007c065ca73007737bfdbfb21cf04

  • C:\Users\Admin\AppData\Local\Temp\92c24f9cebcb803f5b02791186b226744a4d5805f82c10985293395ab4b39e0amgrmgr.exe

    Filesize

    87KB

    MD5

    1e55a2d7a5b3b8f2970c134145d54ab4

    SHA1

    3113838605f4c4a84656a7dea5b1b0effb89d015

    SHA256

    49a9fb163b538f1d32f5bd492b1089388b6ed9293ff7c6dd2756100e34f87c4c

    SHA512

    9b47379aaf3e71d6a4ee3b0508768a42eb247dde4a0b8135e1af6119e26fcb47af9f45bfe3f4f0ac453e19317bf121d7b71d0d152987d6d40ae5a8781beec8aa

  • C:\Users\Admin\AppData\Local\Temp\Cab4B44.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4C23.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1976-0-0x0000000000400000-0x000000000054B000-memory.dmp

    Filesize

    1.3MB

  • memory/1976-4-0x00000000003A0000-0x00000000003D1000-memory.dmp

    Filesize

    196KB

  • memory/1976-9-0x00000000003A0000-0x00000000003D1000-memory.dmp

    Filesize

    196KB

  • memory/1976-44-0x0000000000400000-0x000000000054B000-memory.dmp

    Filesize

    1.3MB

  • memory/2076-14-0x0000000000320000-0x000000000033A000-memory.dmp

    Filesize

    104KB

  • memory/2076-19-0x0000000000320000-0x000000000033A000-memory.dmp

    Filesize

    104KB

  • memory/2076-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2076-23-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2076-24-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2076-26-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2076-39-0x0000000076F6F000-0x0000000076F70000-memory.dmp

    Filesize

    4KB

  • memory/2076-41-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2784-32-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2784-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2784-33-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2784-35-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2784-42-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB