Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 01:59

General

  • Target

    abe499255bfe229639a85cc1dec863251c3489994f9445b9b3c3efea9e9c1016.dll

  • Size

    691KB

  • MD5

    b7e4578474a53fe33508f392c29fbc7b

  • SHA1

    3daa3c9b1d4a83b87de2f77e8a26760e35fde0ee

  • SHA256

    abe499255bfe229639a85cc1dec863251c3489994f9445b9b3c3efea9e9c1016

  • SHA512

    52aa6ac9c29533a37d75d7092f1ca9487159d2e4a29a9a92418b74946cf9867432105dd957286308774a1a17cab02cfe1cdb25bf5d60f910851c9775f5beb77b

  • SSDEEP

    12288:gh8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMN70Q6sihM0PNWjD:g8F+Pzr/Hfp4MIYwZckMQm70Q7WWf

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 10 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\abe499255bfe229639a85cc1dec863251c3489994f9445b9b3c3efea9e9c1016.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\abe499255bfe229639a85cc1dec863251c3489994f9445b9b3c3efea9e9c1016.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\rundll32mgrmgr.exe
          C:\Windows\SysWOW64\rundll32mgrmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:3096
          • C:\Program Files (x86)\Microsoft\WaterMark.exe
            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3076
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
                PID:5028
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 204
                  7⤵
                  • Program crash
                  PID:4616
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3528
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3528 CREDAT:17410 /prefetch:2
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2120
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:3104
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3104 CREDAT:17410 /prefetch:2
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:4820
          • C:\Program Files (x86)\Microsoft\WaterMark.exe
            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe
              "C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"
              5⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:4348
              • C:\Program Files (x86)\Microsoft\WaterMark.exe
                "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:4076
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\system32\svchost.exe
                  7⤵
                    PID:1264
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 204
                      8⤵
                      • Program crash
                      PID:1244
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    7⤵
                    • Modifies Internet Explorer settings
                    PID:2344
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    7⤵
                    • Modifies Internet Explorer settings
                    PID:3940
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\system32\svchost.exe
                5⤵
                  PID:2452
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 208
                    6⤵
                    • Program crash
                    PID:4940
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  PID:816
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1320
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:17410 /prefetch:2
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1264 -ip 1264
          1⤵
            PID:3320
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5028 -ip 5028
            1⤵
              PID:1208
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2452 -ip 2452
              1⤵
                PID:4252

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                febff5e5b64433316ee5f116c5c14309

                SHA1

                55a533777edeed0d18304f073d59d5ca1e5c7737

                SHA256

                888dd735b3cf97e714243c7ecf44064128c4a97452b90ebbc66e317a113ef9a4

                SHA512

                cbadeca5bbd2528b4af7ad6d053483adac27db83bfcd8b75312a5aa4b09302f729b67a04bbb9af840cb3abd78ec668b5a6c8746685ba0f15780b5e0ea3dd88d8

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                7eac9af692b1821a244b702765c52dd4

                SHA1

                c058bba6c0116540545994ed4833ac0eec3f77af

                SHA256

                c33e38838644e209566a55a1f8a8e36df76b6c2d5cadf5ab5c0ba07d411e3950

                SHA512

                ac166ce946002f199781875c7fd1213d36a735a88797d4018edd49df73f1ef8f9ab4411520aaa3bbbd98d408049be1a7edc64e97be17dcfe8e960706b13d1866

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                6a1ca02fb9d65627f7f967f65c48c24f

                SHA1

                e8ac8ff1a8b65ac9deecb2cc0bd7fdd48ec5c06f

                SHA256

                e58bef72ace7558abe1b25f82b15f22e79f2aecaa4affee225a9eba042523258

                SHA512

                0982617474b0bd05b3d97081b42eadc40e6c333b51de354ee64ae492030bd317ce090bf626ff20dd21b4abffc0b625685f743da0ab69d9f0346c94ebc582697e

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1ACFE1AB-C7E4-11EF-AF2A-FA9F886F8D04}.dat

                Filesize

                3KB

                MD5

                57bd9145b77b8bd143aa0424f039449c

                SHA1

                6b0d34b761378edd0e9054b4cb2f8cf9293729f7

                SHA256

                5206a566efcc3b864c9c1fb19b528f2a68afcbea31430fc57c0cbee78a835ebb

                SHA512

                e4dc8cc924d293ba790a3f8d913dd54447e3cdcb36802c419713663a45e47421a87d3d02020ad8a0a4ed4b0f06a5c995022b030e1d68390e0f9920de7b3edb32

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1AD2457E-C7E4-11EF-AF2A-FA9F886F8D04}.dat

                Filesize

                5KB

                MD5

                120b7dbbcd1eae1ec87a56c48f111ff9

                SHA1

                65267d246c70643c4602b333dc2de5970e60f9d5

                SHA256

                65ea10271f85dcae04c35dbf8c62b68e7dcde4c58c7ab07de26b0a546d74169f

                SHA512

                5118721442482c68457b792ec08808db78dfe1c49ec9fba61e2785d5735b7e0328dee10f2a7734424551252c9e03622da940182e25c442e64e2db48b5e7e9b19

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1AD26C8E-C7E4-11EF-AF2A-FA9F886F8D04}.dat

                Filesize

                5KB

                MD5

                736d79310e4160961e0526134a12ecd8

                SHA1

                bb6d52c4e6b2e303731ada3858be5d0d75bbf932

                SHA256

                2e02d8458fe28a62b44c6c1ca39b116cb438d61df6b2d1ab2bf2b2bd45822134

                SHA512

                9bc0faaf6a8efb11c95351a396682f1d81a4df55fbfa7d0347c61e728ba587c54a2b78a98e0acf920a08cd2cc53cc17a05b017113509a8c1637225a26f59e5b3

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

                Filesize

                15KB

                MD5

                1a545d0052b581fbb2ab4c52133846bc

                SHA1

                62f3266a9b9925cd6d98658b92adec673cbe3dd3

                SHA256

                557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                SHA512

                bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DQ67RYHS\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Windows\SysWOW64\rundll32mgr.exe

                Filesize

                255KB

                MD5

                6ea88d3eaa4dc3511a4bcc65fb8537a9

                SHA1

                79158ba5448805d6d1bef347b7c4838ae474e10e

                SHA256

                34d1d22466de36804d7e1a7313c0a6fd966675846eb59cc1f205d37d1db71093

                SHA512

                26dbb5b5caa158b70ae15090b0909938e658c6847ff207273d45eaa7b9f6196bbd40d73fabe76f5e26962f1784f1e39b0839b418b96c5f8d424148a12e8256ad

              • C:\Windows\SysWOW64\rundll32mgrmgr.exe

                Filesize

                126KB

                MD5

                036dca3575c999ae72229f418a5f0882

                SHA1

                cae8eae8bd130555eeed7d32fa93d074f134b0a6

                SHA256

                323c53cb996602a9a145e1e18fbe04320a465c96e3d5f2bea7ab70b3b00cad63

                SHA512

                3943d34e53ab2092927d08c91be2838ca59140c62d2b46a5cea960b14c080f2adc406150e8c9c0d7683b6b5f206e84eda6c219e25e9065080271caa7ecd417a6

              • memory/2008-0-0x0000000010000000-0x00000000100B2000-memory.dmp

                Filesize

                712KB

              • memory/2316-80-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2316-37-0x0000000000400000-0x000000000044D000-memory.dmp

                Filesize

                308KB

              • memory/2316-81-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2316-73-0x0000000000070000-0x0000000000071000-memory.dmp

                Filesize

                4KB

              • memory/2316-58-0x0000000000430000-0x0000000000431000-memory.dmp

                Filesize

                4KB

              • memory/3064-16-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/3064-12-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-5-0x0000000000400000-0x000000000044D000-memory.dmp

                Filesize

                308KB

              • memory/3064-11-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-10-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-24-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-15-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-21-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3064-22-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3076-52-0x0000000000190000-0x0000000000191000-memory.dmp

                Filesize

                4KB

              • memory/3076-79-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3096-14-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/3096-28-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/4076-69-0x0000000000400000-0x000000000044D000-memory.dmp

                Filesize

                308KB

              • memory/4348-49-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/4348-63-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB