Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 23:40

General

  • Target

    657ae232b7ed24fae1e419f865e16ba74890fbab7ced881a23706a451374642d.dll

  • Size

    116KB

  • MD5

    c32dc8abdcb5be1433f999ea27b4c2d0

  • SHA1

    58eb8b7cd1a0c8ecb0bee6e09638afcae69c9f7d

  • SHA256

    657ae232b7ed24fae1e419f865e16ba74890fbab7ced881a23706a451374642d

  • SHA512

    2608b7efbd6bf6e8a01810f24596f49a68c4b46feefb70a6be16c8fea856e0bbf3b147d0a77e3e337bc9b2c2e7cc484958e209ccabda58133070e1bc5275b34b

  • SSDEEP

    3072:SBiT7AOMi4+Buktfbp2yKkftMpmdvKJYT+GGZm:+iy3ydHyypS

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\657ae232b7ed24fae1e419f865e16ba74890fbab7ced881a23706a451374642d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\657ae232b7ed24fae1e419f865e16ba74890fbab7ced881a23706a451374642d.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cafe64cd7db62a224d0ca77bd3dcac4c

    SHA1

    72a8a16e6eb57b2159f5bf6472ca9ab798d5ebd1

    SHA256

    b3bc6f94e852fdf467e11e615fc4a7f7fb230dba9a525baddec2015ac97a2ab6

    SHA512

    6e0d735cefbf2cd23c694572b71504dac17ae4e59fbaa0fbc8eb53b0029015b154c3fc13e6ed4f17bbb120963a9172345fa28e7ac985d71ce13f64fbafddd793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed71cc3ffc2a05eab50a067f46798f81

    SHA1

    bb2d37de8f85b4629aa593b9f91d44cf9191ace5

    SHA256

    985026ea37af2f13b7319c60affb875ef4e962b3496c9d4e81248362b2cc0219

    SHA512

    da3f74d2d6513e2b2c010ddf1ff75584ea4f5442d12a4d98957a97cca2ecee008c8a2e85c87c1b38a420600b00f190346e9068e8e1e51435ab6722c4695ee67c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d84da54d1d4fc46fd9d2d0358cf0dd2

    SHA1

    2beba4a8b14127c4586afee8dd923fef667d7a62

    SHA256

    4c067ac63f6d8cb14e3ff593b6e1e577bdd69cfb720ed54cc4deeb0cf4471f63

    SHA512

    45f4f22b5e855686f549953a227d2fe1d7c5b5a964b4ab77052f0c862f0898a0ee4f62a61ef2b8d4ea1a93b5f0c114e54558f9a2ae90fb7f73a45726863dc02f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af3377553cadc3e288106b4092b8dd41

    SHA1

    5daa057f592dd6d3d499f80b349ee120aeb363b8

    SHA256

    b731daf088c626b3e7f1b9aada13128f10669251a5685c693f5a1373120f6c90

    SHA512

    90039993b9b4e2a24eeb0b3a23472971a84156206c5cb3c2a1d0429e4faf13a267d7fde5a86bfb7d37a950dc62ff76bdd87f3bafe06c2aabe1de16a1b480966d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b411d434d1141785be11d75462c11ce2

    SHA1

    faa2dd94aa5b07a96aac6525ae9d586790110bf4

    SHA256

    e5c203552addb7ae7e37c27437b81f5f122f4788fc161171c4ee7fa7365748a0

    SHA512

    cc69f96b2bcd9fd5031ad21e9df35f1704594522ecc0233a282530548dde85c9b604c0958fdad2453c9bd1e787022e1d4a7827f3a408f5903b3e72c7700e75df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68aba43319b2cbc95e1f92f5dea80576

    SHA1

    648eef7f17f2cd27f3acc5461585579d4eabd7e4

    SHA256

    27f5d1733da423d25d579b300415dd88152d39d248d14123b5bd1422f467d168

    SHA512

    ab1d13ba73d09caf795920945163510946dd0405d68a9842a2aa0fb50841dd392303bc0cb24acdf041abcdfa553d50c119f806c40a0d813a7ab63ab43344628b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eedb3c52c4cf88d77ddecab8f349ac6f

    SHA1

    d795cc33090f47254d50b3b0c808ab76a1cf498c

    SHA256

    e4a21024c306cdd88ac0d50059a5401c5ecd16f56dc9fda1a395b4adee33adbb

    SHA512

    096127cd59b995d714bd2201c4c953d78b27519482ae2109470308160b9c025a528cf96587b5a42df9d6fcb2dd66932c345604946a2994da30dd428955f24b56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11d391cbf5d3b7f890df14e58383020f

    SHA1

    64ee25547a2a8c91baeefd2134a2ca690cea70b9

    SHA256

    790639f475788f6db80aa7d5bcbc52317f4e9c2ee27ae31b4b3486c13110cc70

    SHA512

    817049a8414b6d1af3b71becce3b2fc272b288e733c020248fd739b05cef56a29f294a0482aec99805a79e00cdddcda55367d5dfc260f1e92945358e79afca25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3be6116f4fdb2cee75713c8bf6e2a382

    SHA1

    242f1eb72861883f19699ad31f765807f387c1bf

    SHA256

    f8d1abd76baba15509b2e20174deb46d67fcfa6d2642c9da494c8ddc6ee97ccf

    SHA512

    ca709da919b712d8bc29d7ae19feac193a54de5c1289d17ec50b5fee2eb9221898fc80bc1df46c8af64752207144f7a4ab3e0a3ed7ae2ab7e4bcea70d1789740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a25a58b46572da793a1a383aa1bba611

    SHA1

    886c52f6d20ec24757e3e3e1db217bea4e450a99

    SHA256

    57c73819f7628e32f229032708122219b833638ddedc443d493d981c5a2a6b67

    SHA512

    64b8030eebf348e7c350a91e2115f93b7bef0a7f9738935efef01c145de863e6d33b015afda3faea15755248f9828cce48415d54c8e8b718742ad9fe73158612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a950915a837f857db1622d7c241df284

    SHA1

    687f373e33acc9f96431d3dd7f3b52299775b758

    SHA256

    874623fbe1ddff83195e125e026ff5cff72da56415bb2924debe71456b0aedbd

    SHA512

    e5d63e391661206a2221e9651a28d71dfd00a30d7f693a6030987a9bdb76b4164c6abaec578919be3d297fd5f230df02d9ecb45daf8a4ec50a3eb9a3c7b2d513

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc7e2ffd19d7a091da0a9cab88c2d31a

    SHA1

    a0216cac289274c7d569360fa75bfc6a0e1202e0

    SHA256

    1749cad0a5157eff6aad1372ac855fe6b0f24e5fe94015a918394198e11afc6d

    SHA512

    8a7102c3f0a424224ac423203c0f172ef16393a18198142c32c9e0a75d6fa2a8e64f9df18c5a0967df6387fceb9d915bd069faa1c40615dc44735a7d6b777e70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a410f87452b3f078fbfefbb0de52ddf6

    SHA1

    360932558c12837b3dfebd29aa2d237f942aad7d

    SHA256

    ac54cf75846b849bbc95b16e67b62e962dda58d1485c7c6d1d21611b8bc2b08c

    SHA512

    759758b3e09f913e8633cffc706ff25f9c22be82f60c38a0c0c3f589f2726bcf33c001a935712e7fa7299cf390e7680f149f287de9a72fb015d25e1fd0ef23cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e52c22017443a6aff4477e793796963c

    SHA1

    427f83fa4f9ead00b68afbf344f1069e14bff6f6

    SHA256

    b790f987561332dce8346390138eb7227a35abb4a08d36c529f1ad0b964e260d

    SHA512

    52aad70e51fb784936bae6aba1143bd3ad73a300b788467b33df39fef0105013cf6610a69f4cc55d41b2724af6a37d5620deaa822132d21379550f8e5553aea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c613e0a49652eed5d9fe5b91d383aca8

    SHA1

    d4cf7034b632665a2226a9004521c80d390c19c4

    SHA256

    b3a6182f744b8309a3d69a1c1adf7fdf868d053b83e1a6c5fbac42558f62a20a

    SHA512

    d1c12bbdbc1895d05f1c01b0f84023087ba397dfbd9d82aaae5392ecb2bc95ab7a5934cee5a44a744cd5f2bbe9e5887c6d8de99601257144441f0d8fe405c3df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d44d1ac1ff40ea527f23e147ff217c37

    SHA1

    7247347d9c277a6492088ec95d091b61513107d7

    SHA256

    acfb529fdd179617c4d6fb4c6f8845fd7103d23155d3f84c3225a5b960b576e8

    SHA512

    a05c852de076fd7fc2577e337a32a7ec7b77a7352eb0620d406764d823d53faa953fbd69ceec264c53020a33e1ba0abfde8fecfab2707b843ee6ecb1e76bbfc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a640875e3dd8e6fe8fe306b6bb82eca1

    SHA1

    188e46e85add1d4449db38b6fea62634cee730e2

    SHA256

    e3ec00bb24c0c67036ae574930011ef69fb16e521c045afcbb02101054e70b9d

    SHA512

    2959733d8a4cb852c314b2ab50c8f60ce4ff67135671005008d6e8476e1aaf34233659c305aae0b37b186eb5d9489be00267750b48882fd2271ba8f4b214ae6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ea108d03107dba9476e48c2f7e029e5

    SHA1

    09ebc431d40e23d8dfbd8091455f7a550b6c7996

    SHA256

    ad3a9ca03090273a61948d10266beafa5ca52b28087c80d458edb0779add8922

    SHA512

    ea1f3606e547e4e2a09eb74cf77ed7d2a52875c09332ce9f4ab403efe314e9810701a1f8f23d00709688549bf0b87b304dc05c33e2fac188aece1adacb4767ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    976114515bc562aa7ba89b7b28c7dc1d

    SHA1

    ba6fbe63dc77ecc05922dbba236100732d045a86

    SHA256

    ccee923575bf656896a7df605b185831bcc655861a3ab132a0fc4428ea0bdb57

    SHA512

    9e5496cddbb811baaa870d1b564cc205057642e0ca356cbf31a348e4861d1d2dbf1034fe2d43f4ee9d88ea8c2c63f12130d395e07facf893ffb5a4d8060874d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bedcef898a349fa6e73ba5f0ac6b47db

    SHA1

    673ee5c617c9924bf93cd3af89106161e222df95

    SHA256

    d4819d85b35a9b2ed97aa8ff1cdda1b822862df8fb5d66e13cb89d77db54af85

    SHA512

    61691ad46788027c6cf3b51d08ce710c50869e6418cb4e589fc620304e9ece55201ae83eaafcdd2d34b3e7f19261a8a7377b51762be35f93ed28a9bc9c08848f

  • C:\Users\Admin\AppData\Local\Temp\CabD588.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE5A5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2260-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2432-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2432-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2432-19-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2432-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3064-1-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/3064-0-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/3064-343-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/3064-344-0x0000000000150000-0x0000000000152000-memory.dmp

    Filesize

    8KB

  • memory/3064-4-0x0000000000150000-0x000000000017E000-memory.dmp

    Filesize

    184KB

  • memory/3064-22-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB