Analysis

  • max time kernel
    106s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 16:53

General

  • Target

    7552ad9a92c85ec2ec97a1399dc8318c972c2f85e3c0d7ca77e1c787a0415780.dll

  • Size

    405KB

  • MD5

    19f4174bfc7345fad8653320921d2f24

  • SHA1

    486bb23f687c6eb89c8694a5e9041f97eceeeb1f

  • SHA256

    7552ad9a92c85ec2ec97a1399dc8318c972c2f85e3c0d7ca77e1c787a0415780

  • SHA512

    2d47fae12d9d7dca7f353e040b1ac45b70bf9fc5ad016b17173b2751b70bca7b40c67d658642b58934068ed18d072618655ad3e906a7dad054a1777fcceb626d

  • SSDEEP

    6144:Fqe61qpSQpmFnW9zI8XqKkHwcxSmiJ8Eof/GblHlYUaneD6:t6YMQpwnszI8XcHwCFiJaWblFZ2

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7552ad9a92c85ec2ec97a1399dc8318c972c2f85e3c0d7ca77e1c787a0415780.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7552ad9a92c85ec2ec97a1399dc8318c972c2f85e3c0d7ca77e1c787a0415780.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:264
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b22a3cde9af44f43b926f36d27a0bd5a

    SHA1

    093ad001fbacb7de78b5822a503430a94f95a35b

    SHA256

    54c8570e70a4340436e02fdf387acdf08de4b8e71a931dfe710e9b7f43e58656

    SHA512

    0ef4b0fe8cacb36b111dd79962c4c8feda19df66cb06ac2e7a0e8341b3c7f9d80d82e37e6e4f8a29d068cee0d3c404f1f7752ea59dd4b75dd29834b3ef592c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be7328dd793fbc292b627120d726c957

    SHA1

    e1e0a3638a282f4f2c0e62bf3598e5566cdf7eac

    SHA256

    91ab60d79656e05cdde44cf0414a6470826bc260dfc533bb5b2994e2b5378e9b

    SHA512

    ce00a6ba0370dd1324ef79763d4eba61e918a8ace39f0e8f962a2a514da4c0b60069063bcd705d065a57ef8f831745df28a48e72edf19ea0d139774d63f70cbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08c8dd89d2c76adf2272bd4c4118cf01

    SHA1

    eb8036f7d1f4669a18df4ce822ff3636dac71173

    SHA256

    640db4ab46ff9880986a49db28435717086ff2badc498fadf12e8be87cde88c9

    SHA512

    83850e845dbb7d9870d17080d6bf56aa2b569345c534b9aba01d3ce935f248418ef91023147e970e7f02db5b4a308204e9d7fddc43bbb04c8cd341d5b0f47ed1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cf36f2a9ea880cfc3a9ba02a2ab0b75

    SHA1

    1f3b8492aa5abb19bcfde432e82df5ff66799861

    SHA256

    1dea88632d7a63f710218d47c1674f29ba4cb17eb4d47a168530f54eb7f18546

    SHA512

    05859f981ae73c433a8fcd867347e0b351b5a7ca039159209029ac594b356aecc024c45f5896c84bd984a6637883234759fed34bc6dd92d1432307ee79a4b24a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bca0b6982fab64a9670eae270888a4cb

    SHA1

    a7261d69acf524dcf754daa3602ef36dfbb50a8a

    SHA256

    6104778bedde565db7d467e0bc02e6088655950f5475fba6b7eb98f97e5081df

    SHA512

    1cf286dfde45858011c9fb9a4b28958b75bd07db8ed19330615f61e22d764fb48043b87718f10f5703f487e335ebf8da01e10781edc0631043e601a1323f3f44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd0521066a31a570cf93f3d45b31dcd3

    SHA1

    e77453fd1fb89920443eb0cfb373acbcf905fbad

    SHA256

    3e5302d0da3cbe6351ec5d52fff548cf1b821c0c0579fd46b28047de4236b26c

    SHA512

    8fd6759b3eac7f2a50cb7b5cb605bc43ae47edc47259a26db12cda11b1f8d237a82fa7fbbb3e550c0570d5df3fd6dcb6e59ab28e4c9bfe39ada9d55e123d6202

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad1e952794d239486f2434136fb9812f

    SHA1

    d8bb833740ee4fd93e17acdc025eae3da123c01a

    SHA256

    6952f8394a89ab9bb37e32f920bb440f960b5afedca36d7b8efc37cebcf149f7

    SHA512

    a063e4e64961f90e47cba92e4be26ef35b2a8c37762eec244e01c3c70fc8903e1a1b79d0e5239402c127a4a60126a9bb12a18a40eb86aa3cbe8d60caf117e5b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81a7b0b8be1187390ad439aee5086959

    SHA1

    0d7eb47604f491277081eeb12d9819096a1130ec

    SHA256

    d3d8b64f9044eb266c3102808b3f93a2e666fda947f3e304d813441cbc94b6f9

    SHA512

    58d23ed1569f1be4d6147d17e6d73b0e3658a55604262f7f53a8387285fa0000747fa358e7d895d5ff8aea1b6173a2305cffa6a5a78bb6add4c918bae8657781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddc7928bfb36f62d7295f6e78da5056f

    SHA1

    ccafd70b13cb52779365e79a63451db22dd6c3df

    SHA256

    0dd7a7ac842e013d2b337d9580294ee9a2de4db34dc92c7abf3838bf498b34f3

    SHA512

    8c103cf5a91360f9c95815746e7cbbe70cf7244329a34d9fdb04b4bd0e9ee29d25fd3c48b5fcd96361123b7a7362f3a145edde3fbff4dab5851760147d7ca4fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    896d046af599e2129232165ce702cebf

    SHA1

    ebc67fcf4fdae50de91a52b27df485ab0d309844

    SHA256

    6dc48994a5f3b5acede59ad1d7ac5d42a6b9d3a64a9452f1f2b325e0899956b7

    SHA512

    47dc05bf0623507e90dda77edbe3c1e472f51d997070c45b6243c85c704f4c1e86f77b191b18758aaa116f23888a016d549565669b3cd8b252b05f9c6e68815d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd999adc73d3c75547a7762511f791cf

    SHA1

    a2bf617e675bb272bc3865f6f629df7f42c31995

    SHA256

    599081a14eeb0b7175fdd581a0d12e147700378e31a694cd2ad555076d531445

    SHA512

    546cfe5eb3b9252dea54480775b15d76cdb3d9156a9a3a98a143f1549f630c67c853934ea8ad7e8625d0c01b253c26d860b2386299fb5b2007ae77e09c126e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5103b4d47113904a71a511b425b25c6d

    SHA1

    e417c66f9d78bfc3ca51468a6fdcc964b2833f6e

    SHA256

    489227fb8f30f0abea91847940fb8ca25fb46b63af88aca0a1c41c45db899d74

    SHA512

    bea4194e9f2e5a28890184147a005a3f3e8bcc50c730b1528c7a2869e15cc14948bcc92d46486d6544886c00e541621a3afffd4102404d2e9ce5e59f59072395

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3659fcd57c11c8b70e1e6f889ce2f0cb

    SHA1

    d8091c60e33f5f53b80d17f6a852235438e08009

    SHA256

    5f8415dcaa4696bbe8ecf69bc9a3f65ee6a73b4993e7500a8d1c3f9ad2239264

    SHA512

    be1de29f2d5ad79033653684b7b09d8f6c1ff16710ab20474136a8e86fe9c586749990ebbb1e65d7a6756e581bd465b8cff3e9751f0b73356fd6105c4e606161

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8085dab3de0136cd695f12fb92099982

    SHA1

    6d20d6b064533a86eb19ade909566b9bd54aa3f4

    SHA256

    44cc52664b29cf3cefd41af028c6f5c6ea6fef693766ff3274fe20c03aeef2f8

    SHA512

    30b42254ace3b64da4864fec2729dd4a3f02a62ed99703f16dabe86b5d906867cc4457ca469f5785441fc26f66f95cdbf88966aa78c9b8723653f5199f831dfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47c88516ec279e45c407b9fef0f6151a

    SHA1

    96630c6efee5367d7a693547b90ed78c6e187491

    SHA256

    a094988b50d887d5c99b646f418f20d1d199d946c9d8ca53a5f76b6bcc9f1212

    SHA512

    af9b8f74ff2b6da02e931aa38154f9f23af9edafe4d9c50dfc19506402c9b015e1d99f91ec575747952c0e8d7f3e113080e8552003b5e7f297a306474bf73c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dbab4debe18f7b5d65c55c4486dfb4a

    SHA1

    eee9ea1c7a18395f19ff655021961629809e0b9f

    SHA256

    2eff3577b7a78acf3914c3e373216ba4f0e6d48d89eed7e2b9655d27d2e53c61

    SHA512

    a8b05cb4138502510dc05e7b538cb69f3c1fb481e198dd589467fb5a0f29ba4e511b4d766489313970c5de58e5677d42b66dba77138f78edbf6716af215ae606

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c521d22c9584ae5b383cbe3b26d1475

    SHA1

    1312ae2a11db9dc2174b45d54551e0abe7801ee4

    SHA256

    51df684c40537d01a8421e7044ac5f595b5150c85d3b564d58b7bf6b39b1411c

    SHA512

    486d81c94193066dd327823306610d80c871156a01e4fa0a85d694d176d7227ed6b507c3656f807bdb0a2f1632e9a7cb2f90c220c0b51bd6dd3d5677b98cdde4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8404d5f5dabf60606be44346a9232b5

    SHA1

    d481ae2d724f72862ae120797285ce0165a9837b

    SHA256

    b12a99774cb5b142348da612aebf875a07622d776352c22cba59eb97cc033979

    SHA512

    285c057474409df149775076b7ed6f4c173ca4cb87a9e73b986b8bb70bf59848dd2b14ae3d0e510f180091e276d8f057d6e99a90fcff3c9028a5c684ba4ead73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3f6fb2a5c4226b799c7a5488fb43521

    SHA1

    799290f84a308f396d1cb5b20722ec6fbb0087b6

    SHA256

    9fac1127ad26d7b395065757a2819a4edd97f2bc2fa98b230f29135a92a4f8f7

    SHA512

    f0dd0f68ce591e0e47e844192d8bfcb925d56544e238c6e0a057988737f7ada7b87fc02386f8086c6488602487ab9c386b5b31704a6c71f40b6b575138d48f71

  • C:\Users\Admin\AppData\Local\Temp\CabEE87.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEEF7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/264-5-0x0000000075330000-0x000000007539B000-memory.dmp

    Filesize

    428KB

  • memory/264-7-0x00000000001C0000-0x00000000001EE000-memory.dmp

    Filesize

    184KB

  • memory/264-6-0x00000000753A0000-0x000000007540B000-memory.dmp

    Filesize

    428KB

  • memory/264-4-0x00000000753A0000-0x000000007540B000-memory.dmp

    Filesize

    428KB

  • memory/2388-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2388-22-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2524-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2524-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2524-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2524-17-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/2524-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB