Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 06:34

General

  • Target

    59bbd82c34add475780f56d4d1fed516e6823317004896c78a95015beca80ef3.dll

  • Size

    200KB

  • MD5

    698982e27cd332ddcb47c5feb315ec4c

  • SHA1

    f221f173ff9153f9365bcccb1ecfb3a5f61b3246

  • SHA256

    59bbd82c34add475780f56d4d1fed516e6823317004896c78a95015beca80ef3

  • SHA512

    f78f4f247356b5694e565d0fe806211ceee27c81cc3e1abd1831dbe3e1e350236891e6af79222df168d58d557e936a7b18d64ddd446e449855d53b1f5a59db65

  • SSDEEP

    3072:K99hJpTNgztwKnqNb54gXoqaZrwJHiitiVPCIRHshUjGncd0OzSOg:K99lTNmtwvUCbcYUaneD+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\59bbd82c34add475780f56d4d1fed516e6823317004896c78a95015beca80ef3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\59bbd82c34add475780f56d4d1fed516e6823317004896c78a95015beca80ef3.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2884
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 232
        3⤵
        • Program crash
        PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c0f4b6a7a0bb322878c787baec20eb8

    SHA1

    17ddb1df8a917e15eb8245cc55bea02c5542700c

    SHA256

    d48395d6d24768afa541369d55175c135981facc263d6274ed7dfe231506842d

    SHA512

    8ff99d8f206e9cb731626721a8b5d19694208c11ff64f926b1d3de0956269b97f8df61576517e17e572a610760e458dff303d125276601cfbde350f7e36ed984

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a9e4cd1da0a1ff2e861740a5c3919c1

    SHA1

    c3653bfe1fc0183b8273a6549ca0de17c870fb09

    SHA256

    eefb0fb5ef2407c710975b4816e551dc72e9ea6c4265b5c4840295e5d5e9e6dc

    SHA512

    591ffa470e45ed4067d4ddf702f8910a665a20d2dc4b187bfe64e935d0320639e89ae60f3acf890c0b6dc719f66d7a985e799ddcb80d6d7bbdfaeaaf9fbe2766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d95d4ec8ed6e695e339ddcce81bfc2d5

    SHA1

    97ae3771a5a80154d851ba75688aa1d55e6f6108

    SHA256

    d9b8ba1f0be5d240150791e7e4f8f561610c7658d7dc3b44073cfc0f7e089697

    SHA512

    81f128aa92af7151c41a3b05c2a7aa9b0e36c258502f212b95f4617b76d75e65062b1c9187cfbbe66257e5bae0b02338a496e12ac305d8c09eea28cdaa5dbb27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28294391a4d2298a54e0deab7a4c5f15

    SHA1

    fbebcf00b81b5a3b161adb1c8a7f7a3bf2726d61

    SHA256

    c86718221142c729b7f886b803078379e62986c3f21f1efe0faf1da94be8c106

    SHA512

    8d23ee3026310db704d007d77f11989b2d817171b140a9b5dcbb6af63844a2ba703b6c24c0ea34bd568ada5a8716e190c4fe574a5580e74b7025dc5bbb5caf90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    763ef66542a48275d145d6b638c864af

    SHA1

    0268391ca542d5346d1a77237f4a110399564e49

    SHA256

    f2f16c94fbc88dacb52991157de2b1f84237ca1b305764832ac19053aaf679f4

    SHA512

    9f23ceb4d0b23d460e782b4c01f8920dc20dfb6e9810d26b7f3965900517227c8a25eacaaeda3383e1a18e3ec6667a7f5b71905ad2f5473cdfe8695738d832c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c875c65e3a572906bdb43f87cbd6ed49

    SHA1

    ea6006be1702d1249eed956dc79da9d670712ee9

    SHA256

    276d836b3b99878d43ea93977ee80f99661b54e718a741914ddd37ea6e953870

    SHA512

    f7818eee2b7cad43da0f47a3a624ac2876b37dcd903fd29756ec999a25a6bd5e4c4596f83217e44b1f0db899af39be5b8b70bb3306231f933154fd64ea41757f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79f7d26149fa84d09fe2667fd64f4fee

    SHA1

    2ee3a8c3af28dfcc3359dc385387c2d85d21e628

    SHA256

    cf62d07ac821ab3164470f835909b9bed41bfa8023e88d8d9797425a8b40f4f1

    SHA512

    d4894c25eeb29e1a77771251a693e84d39a9cacd85c6b087ad006e36bcfc25c8299f2a0d4c8ada7485958555c6d6e6f8bde5759479cc841b18edb961cc185fee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dcf4cbc2883549dfadf2b56a4a06fb7

    SHA1

    fccdb3127b6b76a6ec3cff0ef6148b60043df42d

    SHA256

    ed66bc3a4b3f71772549c2205cd02fe9a4539e6bdac797d4c4075efd281a66d2

    SHA512

    fc2d491ad3d708ecb2e8f71b0d8200b7b0fbc83bbd27050b9c2b732b7b0a2ae6556e6f1c2c9b2e757dff974257197e4cc74e6736919d33c8a55651aa4884992f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    550bd0bea8f8a048070e2eea254004cd

    SHA1

    e4bbd3972e3950e64564abd68da88be5c2467214

    SHA256

    852b4ddf4b1e245fc10ad58d1c44aa9057dec782f296fb83c4ec2fedb6bc1c56

    SHA512

    599285becafe14b81abfd7147a9abca22c61d9b9ca0817e0936ddb3f80680f30da7c27aefc975cf28dab28d06147dbbe002b5a404bdde75d8693ac7cf7be1637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9588387515f21813c5721ede95559868

    SHA1

    e95e78b74be601ee3c51a4498d36287fbdaa3327

    SHA256

    8387873ca6589c54fc333fb6a6aa8917ccc02b7cf8b220300ecc1dfcb0848206

    SHA512

    28fad658f6a2c50ab4d14f4776d89a8c627e6818f0a8a3fa26003de244260a1c75d0ea441def01e7b2737e198d0bb3acf23c736b9d933d921ade8d4a23a35572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c673d4f492df0072d57d4659eda9dbe7

    SHA1

    eb75e989051ee8c671167454b05b9c934f328d28

    SHA256

    b36828f239912727e65af1ab2f397fe66a7df3b7185aa91c9364c9740445d6e4

    SHA512

    1cd45ff8c701ee62cdd35e9cbd4d4b8da86c2d12f14c5f3e3335ced57d6b82babe82193e733cab97d47e167451643ad5f4cac34365f786de125ffe6227b584dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc7134b8f9366a4e597ea3aade7dbb56

    SHA1

    e77a9ae4c54bff36de86b9bd689077ee2c738f31

    SHA256

    9cb327db707c6ca7948e874db7930ad86052e659c2af7b1a2573bd661086493a

    SHA512

    f8e8d670a0f0bbbda6714f3b8d4d624bcf01f7a078078c8e1710f187cdeb2d3143920dc5a2e68cc0ad35c496d0b1034b30c6549837b14e587896f9686b24bd2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a18ca9c18c166ac69e310c47280e1969

    SHA1

    0ace8a1a53c0b0ea274e0649594a3758ff20d67f

    SHA256

    c72dc9c715863c745bd5fedd9fa2d81996fa2c090172ca7c7c27b988ab93d09a

    SHA512

    72eea2cf9c378e9e979a5e39d9b92637522bd0cbbe3c2bf35d55a0d95a480c33615d1a844215b55c5875eef560449870c22d72f7c7dc4fc9d60e9e04779af74d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c60f36e77e66a73e47b5f3199ffe6ea6

    SHA1

    c7be5074c6a7d0c15ec931a30fd809ea435f6a51

    SHA256

    a109265af0854d4a1b720ad9cefb3dfd07c4345955a49cf0f94e40bda57ac993

    SHA512

    36492d4e3e3297e420d29289700b7b94326bf70aa1a3e2012d3547019f96e73bf358714a9f1c18ffeca7379aa43699a8c0376cb498d46394e2351cf71f626123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cda771e03dfb2b862fe8cab9f8bc342

    SHA1

    c199dab9e35372d4d93a991de44e4a8e01715453

    SHA256

    ee449887dad9203c173fc3f486751cfe0ad2dc69f4e7e54a67af15a5a42963f6

    SHA512

    47994ced71b651b453be609072b08798dc7dc7e378ed4f48863fa6eeca8d6d2fc847a2cdadbe48df24772076ae8a15a5294310fbee83682d225d7c22c858d159

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eddb6cce0b2a8912a4ae10b98ecfccf

    SHA1

    63f6c58e6f8a3b3f910d18d2bf42353a284a2d8b

    SHA256

    82c6197c5e48f3f88aeb7d236252a4b177dc446b32554c448285033b8481126e

    SHA512

    e8e15367d6df6d8322aacd52e2893d691e66ec694bd07a18526cd03cd627f0a9b2bf21fffbca0a0e9aa5cff06953c023b119f686ed14f51ecdacc77453f221cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14e4d3d690b55055a96ead910244ee58

    SHA1

    8ab4d1e8ad393a54c5922cc20ef3d58618081f69

    SHA256

    913aef28c455a32402ca752991e9171a459dbf188481d28f06f69dfb6b8e4704

    SHA512

    edf6974070a4e1ce2cebb7e492f80a6da6a27274effff2a52288cb792e366de26c5f005e09f3e7a02c7ffeabdcddbfd1afe4aed2ec31b8d2db3e295bff3ec4fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    719f1ab03eedb94911587a99d561decb

    SHA1

    d1587901b100a58fbf1585c6c9dbfc5d90191bde

    SHA256

    0a782251b6af209923bd02f00fdd24958efecf42c416c3812a792f6d17ebb5ba

    SHA512

    e15a5b9dd3d5fefa019eeb348dd089c6520137fa2ce12b42e3ed2ae99d87be2c1f6e3bc6b7da3c531c348a4bfed93733391769a6b8e64c9156ac2dee065e0272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    924de41672743b902e8ef537fe2af8c7

    SHA1

    c46a34a5c16df86736723f57e8c467511dae625d

    SHA256

    b66a27c8fc33d80624b4090c664982dc973d1373ba1fe522ac103a6ec8052a48

    SHA512

    52aab3472c1f75f5094c46f66e77d332a4dacf85288bb5b844474c1bda2628109225f0aac98a5ef5c466560aef547b98b214469f93f10da1ea4e6721e3de4f1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d868117a543bb5af5c7e3fa59fc6e8cb

    SHA1

    d9235b4d01590616c4405e0215b78a6e833881cf

    SHA256

    f1283d26a380e44f0a98673b1d83d8c4759343dfab57cde96c35f2ee308f3081

    SHA512

    05c7d4069a5d934253013bda70ba785f5bb137b1db964a6ae110e59637930d580ed53d3ded66deefef017b4dfaade5a5921f01e6dfb7de93b372a4717c0a0f69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12b05cd3c09a55633257de2453d9c8c8

    SHA1

    4dfe9dc19a1e687fb4b431df58180c9eeebfc533

    SHA256

    89b8bf8cbf431ced55943c7f058c3b58a207c064aed5f06b4e3bafe1dceeb740

    SHA512

    07fa7db4ce9fca28e6be99414d64dbefa0568df101e3dc89c9f02ce6c388f503bba49f63330cc09dc6298b90889db5fae280d9a13837c50d91da485a1361e1e1

  • C:\Users\Admin\AppData\Local\Temp\Cab4673.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4762.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1660-8-0x0000000000160000-0x000000000018E000-memory.dmp

    Filesize

    184KB

  • memory/1660-4-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1660-0-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1660-3-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1660-1-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1660-24-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/2072-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2072-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2072-13-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2740-21-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2740-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB