Analysis

  • max time kernel
    68s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 02:13

General

  • Target

    ac2c4be5b4becca042ca33db7860021013eaa2a69cf6d327990019fd25f912af.dll

  • Size

    200KB

  • MD5

    c6164a93c09a9e93df8fa2c3dab0589c

  • SHA1

    32d16300cc9d56661472d715cc9c04dae159b018

  • SHA256

    ac2c4be5b4becca042ca33db7860021013eaa2a69cf6d327990019fd25f912af

  • SHA512

    c20c00fd9e328896f7f41382d8b7736d7066cbad097395b32d658bb3578a33d66c3d88dfb00c81391019ca93b880a7fd295dcce94daeccf6ea5582a3b7286828

  • SSDEEP

    3072:m36N79shVVoJXuSfjfGqlo58fNLFc6fpO9dC87YQXaQN:mKLgVVoJXuqbGovc6RO9QNQXaQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ac2c4be5b4becca042ca33db7860021013eaa2a69cf6d327990019fd25f912af.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ac2c4be5b4becca042ca33db7860021013eaa2a69cf6d327990019fd25f912af.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2876
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6ae8406b69596104fef0ad5cea23ca1

    SHA1

    f5e1f1c07f5f7edadacf913bc84c787e4e00b7c8

    SHA256

    14849da6232769ac14a59f069b81fb288960e0fd5c97a235791debafa113ebb5

    SHA512

    fe7027cd5929c8ed7fbb3cb1c929125c0778216061d24dd432a8006804141546bd10241b1e4913c7a524baf8009c85fea242840b844b051c59bcfb6fd93c149a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f06d395c6dd5fe48a3e6bb259ade520

    SHA1

    b76b262c193c06b5d7e6c903c7fec5972095a683

    SHA256

    65c9a46c7262623c131f7e9d59ffb8fe56b8e7da9f474f8b2360b1ecd566fcde

    SHA512

    887f3e40e35c3eb68a513e7b0ea532d228029a4dc5f4867b86c2eaa16099f344d12c583c4a82baede1364435a5a6a344d8dad898060109f0f827113efb0a7227

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3aa7c09b13afe536d318e5d2b449da6e

    SHA1

    4237fd29f4ed2a92e2ea4e4e7c8ad278e0af45d5

    SHA256

    681fa127216c19df401ee225236711afbaa639cc1ae52c51af4abb89d787da31

    SHA512

    3a18d6626ff4c2901a4bff05d1316dc191dd871757a5d2794eef907ccd725204b10e635bc40716181745a09e87b418926455a11308dd745ac1c02b867de04160

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10d6096aab74e2aa0c51efbd3709fa91

    SHA1

    e2ff86a252bbf11d9081258566e6c45f602ecd9c

    SHA256

    162e381e42660a9a18d05c9ea1398dbc23f889b853f024589320a577a2dc0247

    SHA512

    10b78a2db6794fb4b84b5d4f51161480994f445da1a7af8cd18f4dc71b4682379686ecd5a7c18840aa9d40a4a2d1d3cfbf8ef1592afdba22b8a73d6cf4ae768c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cf0695dff73d796138c22eb4249cb32

    SHA1

    5fca70d54c63c0c29164dcd49e9e4b97081e2e51

    SHA256

    fb2343aa86ef202521373e010279efbb143e113eaa670f06cee335e64faba7bb

    SHA512

    da92410f017efaf0b20f4464a21d61bcc5e1e8d3a367ff35b845ef581e123448f5cf5999b5dafb2b748021a8bd185527b3d201c551487e4ad9eca829c036816b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d694905dfc45512a7ac4304b69ebb43

    SHA1

    1988989c457b02c327b4604e6ef2bbf29644690c

    SHA256

    94e6d8be21108c38ad16dfc0c9c73dd6fae62fb62052f3eacdcdcd6167c49eec

    SHA512

    ee0b65339a86d62a40add565f1f4c8154e76fe5a70d89645cdfca847df732367a91b4cfef4a90ac1bf33f78e2f302d45d1909cd00e31276fa35f1e7e6cf2ffac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68800ffdcf984c4cf8f970fcff0411e6

    SHA1

    9ed2f0e903b5c9a4b32f160f51f53dc4510264a0

    SHA256

    3a7dada91f8a2b944021865676057c6b823cf8a34af2ca7ff97309bf25c6e017

    SHA512

    f089e3ed9a2ca5774cb2072d97d15e7fbebe357a0acce063beb6452f65e561f4d53737c346373a8e03a11318c084a774ca55c4d69c14cf213a4211eea6aa891e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eeb11f850ec04d6ce01df50b89e9a8b7

    SHA1

    68fbc9a86743d1f85b22f3fa992efa4ef126d043

    SHA256

    c9758e3c78843f982e455a3ee2e4b3dcfe4bf322b99945d6010e0e2a1c56df5b

    SHA512

    249ff0b4e7c9831c36f4f6629511e57194a1e8ca6f0f785bc9e7df98df54a99fb261da2a0744facb9801f5a418d20462cc9bbc8ef4458465cf041898cab57a22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    904312de152d9851aef36fb037823451

    SHA1

    61a777a8d1dbebdfbffef4ffb4163d9413ef48ca

    SHA256

    470c93935cab0067d18e1d201be02d4455017c315ce2242affd8eae95ef49305

    SHA512

    a85f7f91b27462025e1892a6b507a70a018328f80fd8e2a2e3715f15ed3afddc79460e6d8f3ddf3e783a7b9ef1ad5170f5a8634420d8f7e048f30f0329cdfec6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da1bc5fec81e7c1f4ae304cda9e39f47

    SHA1

    e67dcc960b3a59d3500cd537056e5599cef0c83b

    SHA256

    0ce9fe7fbad748caae0f47d27089b46df39eb5779d559e9210d021d246ed383c

    SHA512

    3f42fe1f6fe6a827e2acff951f0140a4fa8b5e604f7e6786d378e7642f006b9a091bd34d0693cccf1cd614cc1ef32f88c26abc1d4e7a6534c012f82b03471866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab2306245a5235b66786a6ec702d0bb3

    SHA1

    e2d856fc52589389b450b6dda6fc7ec4c0b24edc

    SHA256

    78c043090846f38c595d9c9432d1a48199c5f276239b0c9ec5ba348efd6ca50d

    SHA512

    2c9548c74ef01edbf104460d750ce2df5e8e719349b0f1a1f514712dca0efe8ac06a82b6db9fa3f01fb4e50de41bced2dc48585fcc4c0fd791ccc002d672aa6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26ca712e1eac22e778ddf93dfd6c6a66

    SHA1

    fc7378e0fbfb37af71089c6370329cc845fb3aee

    SHA256

    05094c1edad18997ac3136c76ccb094e6a8af875e148b998c4809c96dedb9d80

    SHA512

    382a4e5f421cb2e4eac03d5d88c3e9757c3956b9fbdb3151ae18044f72d48a0e1a486bd053de087b8207694ee428a66815221b671dbe0c25a26b745117c44e13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c651bb3d24c8b7da04b68bb82a2c6239

    SHA1

    6fb416bc9eaca4ad5cbc8f5e3b4fb336b428c099

    SHA256

    15bf608f0fa55c31a7b8cca8e94939a71068c9535135557c81022ee8136e1cd3

    SHA512

    43e6dadb26957a7c77957069d6041826ad7e910d9cf8f7885ac62a45acae50aa14e4f5a9e64014a8c3ba120917cb39e4000a681d0afd30e701fc4232b235cd70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e49e286df50548bb861270a28c9a3612

    SHA1

    353a8c0b4641675ef57f3a47a8688c912ab3f61a

    SHA256

    2721c190ba41b2123f1f99c6ff9dd4222ede670f935459821305f7130cea52d2

    SHA512

    f80fb9f586530a701988d9b6affcd8b9c8cf1447961520bbf9640cd1da7fde0ed4a20d1cc87993df288e94cb6ea6c94d1363029a1280cd3caac1ddbf33348f52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ed4d7322d5717833515eacb8aa02414

    SHA1

    0466774baa1aac4b3a964f650e8d046dd52e2039

    SHA256

    f860f0408715e3e2c2ad8963e2b920fbaa1d67a407314c6e6673a00dece875a6

    SHA512

    b623f5e0a0e30f461435311942714b40aeec9d12f51cbbc71cba086358ec6b8a60312b3ce4eadabdbfad1b76dcfa2631da50c8ee6390dbdb0fd2193426ad4b8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c6fb47ba3f5e9a94421a43902512e48

    SHA1

    787d04ab1c05d3eda271f6b05129528655c2320d

    SHA256

    190a8b120325d04946b27e901aef1213dade8c76ea5943d3f9a220d5b4fcbe9c

    SHA512

    caafa29627e49e708d7b894e3e4f7f8ba97003848de3e5b578d0d06def77c487c95a5dfa5914685c914e930867a2b9389f4ec3bac99260548e9f036116174416

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76c369486756b29db46d0827ce50e4f4

    SHA1

    3f2feeb89fb0c78e120ca2466fa50614f7fee836

    SHA256

    587c0ba4fb23b5f470eb0c51b2049626717d5fc3aad022f1d92b8e40fa398e21

    SHA512

    820f4ae538c95c7eda8a484261e4702609cf08023b4962b02318f636eac27e536059c9e75e6178b79a70b8543a3c8ca452038d7ea6315fcafbdce340cbb69a01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56173c7cb1617e43ba18c0dfd0d7940d

    SHA1

    83af41b6fc99249a2e341035cef2ef62613f105d

    SHA256

    c29b608b1da4f2bfcb6889fb24be6a92e523b9d22f8ffa37bb55236cc35fb05c

    SHA512

    7271092bdbc5435c0c7bff3ac5131ab3b5b0e7f3d3a5f0acfc2c25d7bffeb16eca16c00986e89a1e5940f32fcd788640d6583eca55e91f838796b892d0ddc869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5990219d1dcf9f77b08f3d7853e2df7d

    SHA1

    5175b010fb49b08c9d35fb00c3a5d0110e1c4ea9

    SHA256

    599d09dd7e9a8ae81267bdd95ebb4cb3d97bb91acfb5add922bd36a78031ed05

    SHA512

    cec32441ccf1aa53af3de9a96dffd3ea78f5e4ed303468295691a821934fb95890132cd5daebb3b150ae69bd398d734932644957bcafbd0e168f4c64aa9fd161

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54ed51f2f6c72a298c042fb77e3cff35

    SHA1

    58fef1d16724cd833b732d1dcdf43309271ff7ff

    SHA256

    c76cbca2772fbec24e2b7cda1ab8d882c3199f7145328c291214d0563e52db3a

    SHA512

    8788bda33cccaa09e7359f193b7212f0787861d43aee05bdd9b2964f3073cdf532777faaede8295df04cfd3cbc747ccd4b4734d9091e6fd39db6eb1d15c18340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ba8cbfe255bfca77c81cafc4efce5a8

    SHA1

    6d649b8a4893e55f6a65e55450048cc664a18945

    SHA256

    41a3b36ce8c10e88134c9144284de547dae8608f88abab20e61eee83ffeba387

    SHA512

    3485a5169e50556043be285575e9ad9ff0b854b6f0aaa9bbf47db16b61420e5904ede28155d6eeef55aa0d50ec82b8d9cd634546090c61b18d065e13f3e0c706

  • C:\Users\Admin\AppData\Local\Temp\Cab8A19.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8AF7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2148-3-0x0000000075500000-0x000000007553C000-memory.dmp

    Filesize

    240KB

  • memory/2148-4-0x0000000075530000-0x000000007556C000-memory.dmp

    Filesize

    240KB

  • memory/2148-11-0x0000000075500000-0x0000000075513000-memory.dmp

    Filesize

    76KB

  • memory/2148-8-0x0000000000190000-0x00000000001BE000-memory.dmp

    Filesize

    184KB

  • memory/2148-2-0x0000000075540000-0x000000007557C000-memory.dmp

    Filesize

    240KB

  • memory/2148-0-0x0000000075530000-0x000000007556C000-memory.dmp

    Filesize

    240KB

  • memory/2188-23-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2188-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2188-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2188-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2396-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2396-16-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2396-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB