Analysis

  • max time kernel
    75s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 13:55

General

  • Target

    afd2a399f4c0a51300c3bbd1423b8cd8331d83422ed17ec6e74fd56fdba3f737.dll

  • Size

    1.8MB

  • MD5

    b8556c014807ea84d758a54d605388cc

  • SHA1

    5f1dd27467e813b1719b0e190de86892cbb9aa98

  • SHA256

    afd2a399f4c0a51300c3bbd1423b8cd8331d83422ed17ec6e74fd56fdba3f737

  • SHA512

    6f58cce75663a327233977facf53be047fab235cc6bcd9f34697e683826d69602c0fc6ce57c8fe11d9a674ac5d94d6d6bd6a50ee9f341a79f7c5d7322c10a680

  • SSDEEP

    24576:S7IY7a9IRCRqRPkHQo411810cNScGKJydXTZDwmzRMo3DP7x5nbiQjCm:aIY5RMHMf810Knor5zqo3zNJuQjCm

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\afd2a399f4c0a51300c3bbd1423b8cd8331d83422ed17ec6e74fd56fdba3f737.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\afd2a399f4c0a51300c3bbd1423b8cd8331d83422ed17ec6e74fd56fdba3f737.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 228
        3⤵
        • Program crash
        PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c280c152c85f857c88907ade67aa38ec

    SHA1

    0d60e1b084368d2053b16bf3f14f55f6ae9f0d4a

    SHA256

    493aeb902a361e8a5629b3ab87a07283f913f30aa658dd13a475b8f07f109780

    SHA512

    f122cde3d1aa874d759b0cae647d40c8e5edaa91fffb45afe888de8bf01124ed642cb569154ae3e06f626f0ee8bbbb5256d257210ec12c24769e92d3df9bc527

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    507cdaa2d9549e20f69028bcdf342c3e

    SHA1

    b29d727e78bb9a43fff4a62c942a37c28cc07c28

    SHA256

    8f8a3856c3a91f4a2716bd34411d14c80d5d9e5a5091d8d70033ba73586f8caa

    SHA512

    14ba2d9eab47b1f95aa5ff2aea766be949fbe18b1295102fe5c7bf4bf040c95f438a82b577cc34356842a405a07825a6c85ec384ed241ed68886dad7c1ea19ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    083cd7556f9390ee9c17b3c0cecfa2f8

    SHA1

    d85a8a66214f861a70cf4b384ffd93823be3e20e

    SHA256

    45d802a1a6053db108b1f2d72408bb6b3b330ce1748a05db5cd21e1673b22117

    SHA512

    32f552ac1e7724d2b6ee5830a50820677ab1347c6ede43bc2343ab439bf16e80d823071e8abec573cf7d2418a175b7aecd70f01f3af6543db770029e8e146fb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05034b96ece09af04fb7b41326f10794

    SHA1

    07143f0e8b84a0198db675848074936316722fe2

    SHA256

    5ee641c004f542305c8329d29510d4f5912561feabc9acbe3c376ea86a08cbfe

    SHA512

    08984e2ff11b8810543326f984f59cd47213549b6ebdf55c38f8fed9820ace82edafd5ee45c35ff3a979bd58ffbe44cb593ff1018feecdc8976563725ed26800

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fef3012379ae1acc0b572577b17597b

    SHA1

    8d171169e74cfedd0249024d5e8304955d3a7811

    SHA256

    92838887e9499c04f3e82cae94256a6f609de8d0617374f03097af09c4d0a029

    SHA512

    29e81c4403d9d0be4d30ae09596c4995c36c26190d9bc2cc17a925366ccbb30fde65aba7b1966e0531f6a32c29dcced4157f457f5100736b57195d39dd842d16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c71c699b84e27ad45daee4f237b3162e

    SHA1

    f74262e97c821e1028fa9839cd59a3de053a4574

    SHA256

    7faf190fb623cc17ff360b726505ad5f012b4b2e9b44598ba47d9fe5a410018d

    SHA512

    07b3df011c10885ca6bfb6f8bbc777cf586d84b64bd3b1426df67d483bda0648989d34dd0e6fbf69f287a9fa2add1dfcd8970b04643ba4b3617cadecf19456b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ee7bf65b8723c4cce04c3413a38a188

    SHA1

    05456b1bdef5ecf2cb6bb3f4008d6a823c04e39f

    SHA256

    4bbd6b5c560cd1925206438e2e3c7ccbcede2b4573dfdb88fcc2b748479dd9b8

    SHA512

    e0e01f18d2aa2a1dd4865637a189f2870b6096d40735fc76f162c7235e31cb5072139f98533440c77ce7597f8c34142b8fcf567d444b8671dda9095b6497974b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f0d7e6c3626bab9d5c0a8ee3519dbc6

    SHA1

    90aa981b93bc5f39cf22c454346f48432e4bac26

    SHA256

    5bff630e876930cbc127f8c23a58cccd53fe817a8510fdcd368f805976b76b35

    SHA512

    68c1fb5b9570fd1bd2ce4de272016f99ab6c679006bd3fc94b58d9592c04745290845329d5392df0b396503ccc04bba2ed668ae1269afe5a828c0bc882cb3fcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b7ec44d893ef065402b04c962abf228

    SHA1

    54add5ddf1c5bcc6c0e9ea4dbcdac7676a6f769a

    SHA256

    cf6ed4b08cd77ffe1a79ec020d6909df3d3769a7fb932764f1568e206f0fba37

    SHA512

    61255b4a4aabe500aba97930a2c99ef2907e38958fd50d7c78f5ab3edb8717d8869db0638f5d131a84a26f4b94ea74f351e274aeaed3045284872d820841a29c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8afb998399807329b91c7efb73762c49

    SHA1

    ec49603641655dce21e9c8e775865a8ee624d604

    SHA256

    c7aa0867c3286b2b9d7e63a84e4785cef00d03aac18dfeb37eafe54994aa9ef6

    SHA512

    b7a7bbe560aaba4fdb838a37aaa79d5776565d53878e3284cdbf713cf2ac2b0638ac754ddc9d1f791b6b34a405bda75faa3a0fb5a33c6a8b659fac4dde6af15b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1cbf34823742e7e7782c570ff4f1dee

    SHA1

    64f138ea34e6467e16fba378e4f3b6871a2035a4

    SHA256

    3b5a8f12df4e25a2c774fa8638e0c5623f87d9002ab5a1acd110a88f8f27375b

    SHA512

    d680e703628d14ca3de4e7803b683d1044f25af435e52647692219836483c2f24c0a299d60348d38cb86c33aed1b1a28d8dceae0419d6791ba25ab22a26b4fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b059d095c4489cf2890b5d9a283b9a10

    SHA1

    2d9ccfdb693fb62d551821ff1e14a034ee97c153

    SHA256

    3b62138ba44f2d78ca21a680b93fb0beea184bb7fa7188ca41b2b8399f0572aa

    SHA512

    1a7c43d72a594eb66f8ef315457f5f18fa77814a125dd9e8410da75947c71a1510d1bb1db2d7f2ac95f80f8092791256e44aad1b800b44cd0a504fa072e6b9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8fcf165039850e5aebcd1a19eda0186

    SHA1

    aadbcd224c21a4e4fb85376e516e6d83a3d8ff75

    SHA256

    446d5ddfcfaac5f9dc3560b79f401b8154bd4a975251fd23fb8e16a69a9276a2

    SHA512

    dd9dd910fc79a77f499839a999ddcf5daa3ddcb256e080e8cc8cb366d372a141bbed98aad521e3508f6450c049e230d64e54c16339ecbf5d12dc98e07219f27d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abd172116bcb5e053a47098972f86eee

    SHA1

    a6c25dd349779de8770215fc3e4d4c2e26a0751b

    SHA256

    edde26787866334dd2d4f235fd0b98a7b194c847caa314eedb0dcf9ab2495f1e

    SHA512

    0f816b754c9c780403b5c126560eaa5761b579d1e872fc72c5dc2715930977a1a47c6f3eaa23ab13f7801f459bb5ae2d87f5ca4b4e59721f326c3ee22123d3ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2a748f5f90176c7c41619c9a0abd689

    SHA1

    b5e4f81f08ab452513bd1368480311ef1be16ac8

    SHA256

    86e72d9cca103bef8473abef57657758e8b81c18bfa6d29473de04461d378148

    SHA512

    715569d717cedba7adc1cf394dfa2806b8350830771de2d65de3a94da5ee490e6b798046be69882f20853395250476c10b0fc71ad343582f9aa70fafc84dbc00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f47a1b658893b2be3b27bf1b58abe6e

    SHA1

    7d6f6a3aefc53b12614061d0fb5787f5e72c1359

    SHA256

    8f984bc79ad979e462ad770a543926f7192d9f836b883dfd2e72c5dae40e3095

    SHA512

    64b60e4c0d0410d3b1913dc1a05658aac605e7bee578cd40c39989185fa06947507c7f809da3bc63c9e62a2934dc37f470679cdbcd4279c7a20a7e21b59882e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94108b2d2a707861930ef9bed02dc87f

    SHA1

    5a6b673c354cb2655fb9e2035fc67bb0dbd48191

    SHA256

    b907430392b90601d2d466308572cc5e69affc1afd55ce9a83804fcd924ef408

    SHA512

    9ae7a3d9ac8d2c3d2962977bc012243df01008689d6b45fc9f40740d682c57b6628c2ff70791c9ef6aab6da5cb500899690502f18f6b7033a0e39c3ed288d947

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5f994ec24cefd628589144774788d55

    SHA1

    2fa960234445f7f194367f19579f9a3ad619c778

    SHA256

    f1e8ad0e6f2ae4e4dac7e4d8f234ff3cc46c3d5da28b490dd3124c9a921b3cb8

    SHA512

    a3aa84d81b973f397538a206a95c63ac84bb9b877c67fdde5919eef4032bfeac8b5522ec5718000a1e4e7b84246827bda91a727f63604233da56a4b8020f634a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9567382afec5b39f1c1c2a2ee886af

    SHA1

    a94d42d1fe78df9ba4d7b7a93535967395d87e65

    SHA256

    fbf909b579cd7ed81d8740b84cdda13394210a3e9a586049240f510bae03c122

    SHA512

    c1a0312057a573806c03e75a6559f6f82d7f49e18b3d9dc3fb683272c69dd5cfb40d3774ca37e5e7b278042e9774476f3f4132cfe4524ce657d47fc31edbcdaf

  • C:\Users\Admin\AppData\Local\Temp\Cab532.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar600.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    87KB

    MD5

    1e55a2d7a5b3b8f2970c134145d54ab4

    SHA1

    3113838605f4c4a84656a7dea5b1b0effb89d015

    SHA256

    49a9fb163b538f1d32f5bd492b1089388b6ed9293ff7c6dd2756100e34f87c4c

    SHA512

    9b47379aaf3e71d6a4ee3b0508768a42eb247dde4a0b8135e1af6119e26fcb47af9f45bfe3f4f0ac453e19317bf121d7b71d0d152987d6d40ae5a8781beec8aa

  • memory/2228-14-0x0000000010000000-0x0000000010360000-memory.dmp

    Filesize

    3.4MB

  • memory/2228-8-0x0000000010000000-0x0000000010360000-memory.dmp

    Filesize

    3.4MB

  • memory/2228-2-0x0000000010000000-0x0000000010360000-memory.dmp

    Filesize

    3.4MB

  • memory/2228-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-10-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-16-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2628-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-22-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2628-23-0x0000000076F0F000-0x0000000076F10000-memory.dmp

    Filesize

    4KB

  • memory/2628-25-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2628-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB