Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 23:55

General

  • Target

    4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll

  • Size

    732KB

  • MD5

    b404a3a28c2b06a9aac361193aa23b40

  • SHA1

    a7690f6d786fe123414831548942220d6ee00251

  • SHA256

    4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06

  • SHA512

    8d98800d083733f62c3b87488016b7f2dcd79ee4bf7c2e72d441a72d81e43a651a9cc466e18fc118d22cf69489e7abeb1c52bbdbe0086a915548581f95d01553

  • SSDEEP

    12288:SiLpl6Xh0e255QhoE4RLbtEpVUqw5O3brIbn:SiLpl6XhE56oE4RL5Ep+qw5O3br

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    847950212efa03217f50a02e00ae9cd5

    SHA1

    636014d999f4b2a626ae004e2fe0c01620bc48ac

    SHA256

    0f5535d5b12f1eb8e0e8539c0cda8fb7121dca66c3951c90214c5651d3a9368f

    SHA512

    a5b760401223e505a0a090c713952288386c0777934a2af6a30812712f6a13d9d650b4ecb66c87806075ad89aca3857b214bed1cf90e4cf646b56ef59d6800f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d736661e3350ddf03d1cfc136c0a98f

    SHA1

    190eb2e26b2e3f6b3b332771fc8256cc5bb07bd5

    SHA256

    f90dda589c00a769f49820eab0deffd7c93ba1d1d15ffd1d6ca831fc910e50c6

    SHA512

    f948c788fbb930cb7e0e24492a0d785b9856a0e3c4d4c448d0666815344882e61e058ae224aa6028e82a2ba61ba495ea713919cb27f006348ab8d5596724489e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12480108a0ed73a00d836c3dc6bd93f6

    SHA1

    ba4adb90873b902f9be5191ad3152cffdd7060ff

    SHA256

    dbea5cd8eb9f7a6f8d9eeda6480120a61623aee3862ef7283d50869a70cd0ff0

    SHA512

    09b28c133caef4cd1223af86aed343bd5a0d4dde37004dfbcf650eec87efd2de8f526c881a52281e932e745f6c1fe8efad0969f7b5113b6181ed1dd829b9f05a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afc9175cbd7aaad0bbac865317b1b393

    SHA1

    2e12f5dabd929e108844004a82b6888881c983ae

    SHA256

    9abaac305f155a1f58c8e5777cfb2c57e9c41f1ec4e74742922d0b27c452f40f

    SHA512

    8510e9d1032379aad89b92bf50d0d22098666b1652067699ea1e9e86411bdd76ea7a949922aff78f40402ccd72e763756c69c582d5ae260a73fb0ddbf4dda10b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e604acdf86f990f856d38fa1faad098d

    SHA1

    0b863f266e0d2c4b2f846c324f6eb2da56efe679

    SHA256

    050997141b9e8f0a78356fca30d6d93370469364d17bf7c95b157b34565774bf

    SHA512

    ad6809acc351cae00727d4e53772fc52e4189cd287fd755d26c56d75357b0c2056e0a51c5c94dbe7d56ad1836ff59bae255838756ee13ee53cb8b7a9e4752d67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4da44341dca3e4180f05db6d945acd6

    SHA1

    48398b3f2069f81dfe169ce4cfbf8b8eb7f4cc36

    SHA256

    2acea71fcc0a5d85c3264e517ecfabb49d0a071fbc41448ac73a57b8b8235b22

    SHA512

    15737fd913ce79b876d17790446e9ce93175fa267553411c9534627a018e719a44aa53a5e46cd93ac6d7cb9833756625df75dfaa5c05b5236b3eef219c6e8b1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    303d14f903a53ded4870782bbd987d1d

    SHA1

    9ebf5826b166ce0073a507e32ceb5d2331d933f3

    SHA256

    67f32d6aee60266f896485e02c7f6edee03e63314a20e0aaa5b8dd145e4d94f9

    SHA512

    082f5fa40643e5d3a2794f5e7947cc5a3a8057301bb224fdcd500341561179ca646c2131468f4d5a99412a56e954e443c5922930e2851dbec60b85e6f41ef540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d3eb576d018226f0bf260f25b62ab09

    SHA1

    a03f3ca9aa84a52920ec9c26f7fb9330746120bd

    SHA256

    85d4bd30e231201eb727d2113d7d0ca48ffcb227a181972ed032ff3786f3b1fd

    SHA512

    e2014d01c37a14451f1a04fe7ec5acc5d6e230749140a430f7cf4484f6af5bad1f74c552ae45e0f478c52e3cb1eaec70b790a0b13d81da7e3bbcbb009b01cd56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fe7734f0ffec0d865bb07850da6072e

    SHA1

    80f7cc2e6c7a1e85644b04551f8ca70bf8c40654

    SHA256

    221a304323573d0694687b6407d88d0b41729adf84f2a2d808f9c69d6f7833ef

    SHA512

    b9e6cce3ddcbcade6a005bec4f3e9b8e719243a4faea3d7ff36b7ddcfe08c66b9dbc209dd69219b2e7b3ca3c836bc5999397b880fb3dceb7389091e4fd5e5577

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a193e1497d86b2af680b87d41b982a42

    SHA1

    2ca6ea2f76d0dc10215a141dfdf8ce451a0ec84f

    SHA256

    144716e86d132b6ecd8f1896dae2ffea787b3fae506de65d3fd2068239809ae2

    SHA512

    803fab6dd0e69d47d3b48b9ab8cd6b0764c8c11e3c221fa18f05842188fb327181c10a49ecb05e224edd6a006ec5fa7ae47bdcdaeab75636d59293460b61fc1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06bae78348ddfd371574e96c4a14c947

    SHA1

    fd0ae1f7a9b4c617f1dab85a953f84ddcf7c3e07

    SHA256

    f71a1ef61f3724fcb61bc1c5f68b51e0330819ae5cf8454ddc7abcc8c6bcac93

    SHA512

    c0623a7c919b28a036ade53d2aaf206c4b0c645e3031e33b02fe189f4fe4633c0bc35419899f21bade1c0aad7d77ed3e856cbd5136992038f0ae8d5d8b665b47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f5b520e4749f8fd7772051cbf218a20

    SHA1

    ca3630c24cbb7170e7b3d5b207c4c102702cfdc8

    SHA256

    0dd2c711c07add3e94cd2db15d3aff1c2fc9691b2f85c8a4a64686866fc5dea6

    SHA512

    0b9553dd978c81a2f2881042027d0a6d8e7e3fcc4ef82e3077bf2ece22254a4b4233a71f8fe3f021c4414122937b6e0d961c0ced30e2e273acde8ccaa19ee481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ee296ddf0a00d56297880c7189c3442

    SHA1

    a51a9718ea6826e5d409df904dcfde9fe72904ee

    SHA256

    ec6408a12e38c07c926c02cf471f6dd53e1a1c081f1b165bb6c09e6d3443d7c6

    SHA512

    9ea2c3c50dc347463dc73b8afdbc05b580de24f93f10976f9ec88dc8d680edb96f29db1c8b5f441996c6a2a39193b7059f9f44c9374d52c345d93110a7a8a40a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    462c181a343c787c4616cac102c09f88

    SHA1

    9232836f746289a977f6a79f627614480e522d64

    SHA256

    2477356d8c21b960eab56c7dfd725eec742f67b578f1d8c074e4a4b4cdf74ed3

    SHA512

    61ebfe6a620b600cf5dfade09ccecce6c100942721f53470bc92917866fd0d0d96a09142b58ea63528d8807b88dd7784b69af306311612ad0d0e4ba65c2b9585

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f71bad21c38eb29fd3365bbb30106fa

    SHA1

    4693d8db49bec594787bc81b3ff1a3a39e277c14

    SHA256

    d34dc8616f9de65b9a291622bbe53d0b2470dc27bef73c266cff6bc318822d41

    SHA512

    d8d1551438cd4f11e4157bb3f88d5e50f96d0ef63de2905976313be208fe1ce1a651031a6813028965ec211d84daf6d9cce45276ddedd1bc093d36df3109e6ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caf5b1e1f98028292c585ad562a7ab0b

    SHA1

    c0e6773eb90554b99efc19d625045fc83631e62a

    SHA256

    2a5268e21b582a6ed9f96590d713b08e444f8b1997582acab10439058e58edee

    SHA512

    0b0fc4857c9cd90a5816bb41a27532c7da4f61e90c0fee44b5b2ab8f1323d008caad4cb8a16717c4119628581917f935eab9bdb7ca81b6bc96c9cc51f982b8c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d19ab502f79a756ce3ce77e35a10ae2b

    SHA1

    00ce706668f8f8152b7c6c7fdb45aca0bb4886e8

    SHA256

    193950abece7a9d88e9fa7a033ab8c6358940492491dcc98266c00f3654c1c00

    SHA512

    2225d24e70ac72ce17b942905237812a818e54da863abcd8f80c03946a53c2406923f3d318a37e76643c923c697a92cdb3440133863d31878b762779fbbf9d12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46e2c32cd6d14ccbab3c4ae99cae74ed

    SHA1

    00e226ed0893115a81450f19294610519b18224d

    SHA256

    c8bfcbf591ecc5d822b90da040f6afc6f2837f68bd4d2d253a5e11fe1a6e36c8

    SHA512

    912888cd605da039e56ab03ca4e6190cef5309b2027dfd346a85e6ae4cece83fe03c4eea9aeb4459e21e2c1eda863dc6c40b00c430da9fc9c79655be98c2124b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2cfe3f1ee9e3d2a2ef97517bccf4a09

    SHA1

    89df3160db2b2a338b1fefcc697e444dd0a39e0a

    SHA256

    42e868754c9aaf924b3e3002b44715aa7a0a4289723f9590cce61554c2f5458e

    SHA512

    0b9a270dbf6e40d44d1baea732469029705dc3ca99acf0c4caeb7182fc5d37da1fb90e5953268bc289a92b22334c6d83851d707cc092e3406e809d9d37791c44

  • C:\Users\Admin\AppData\Local\Temp\CabDC5D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDD3B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2136-23-0x0000000010000000-0x00000000100BA000-memory.dmp

    Filesize

    744KB

  • memory/2136-5-0x00000000001E0000-0x000000000020E000-memory.dmp

    Filesize

    184KB

  • memory/2136-2-0x0000000010000000-0x00000000100BA000-memory.dmp

    Filesize

    744KB

  • memory/2136-1-0x0000000010000000-0x00000000100BA000-memory.dmp

    Filesize

    744KB

  • memory/2576-14-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/2576-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2576-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2580-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2580-20-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2580-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB