Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 00:21

General

  • Target

    50dd8c0c390ee21b08b7c5af4bd2ad3a9815c2c316114ba637c4414da65732f7.dll

  • Size

    3.2MB

  • MD5

    82d6a89fd6bbdde24fc4139798be7079

  • SHA1

    b56e39bbef84793d85d2dc130162eef73a5900ad

  • SHA256

    50dd8c0c390ee21b08b7c5af4bd2ad3a9815c2c316114ba637c4414da65732f7

  • SHA512

    065c2eba3d8ffee79a95acf8ff00cec8a7deb7a172e5819d9dcdb33afd61fa2abc28479f29d2f8f9ba17ed3f486f81228c72f337ae45485457a30b6c2451a81e

  • SSDEEP

    98304:E1eQbeWJ3cJSyWnYA0md6J4BrvrXRBySX6Z:E1e+KxWnY/grBySX

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\50dd8c0c390ee21b08b7c5af4bd2ad3a9815c2c316114ba637c4414da65732f7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\50dd8c0c390ee21b08b7c5af4bd2ad3a9815c2c316114ba637c4414da65732f7.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15738a282ff52b38944ffbd8a097b898

    SHA1

    744c51df7ba7c65b6bac9c10772b483f157e015e

    SHA256

    e66d75130ac58b9f7528f030a8880ccf66dfc8efa6300b7d45e9a9e4c9f75400

    SHA512

    d78df9267975da65421e6b2544b7fe927734c4a37b855f0ab4fca23e9d51d4d754ba7e74cd73ee6730cdd93e3d13a9392dbb67557c5cbea35653ac12de8fe96a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    204e4489fabc1e78b345210a4a746927

    SHA1

    1b40d337556b834a1a431996b81f5ab0fb136854

    SHA256

    2633afb82a34e4bea8962797537b3b93bccbe8273d3e0ac6ccbd64d2439e1467

    SHA512

    c74f11d2ec8785656be9468b531247978d9337404f74aa88f563bb5daaed34fa4e7998a1326c1f52c7d03b5a45e656b60e6f776203d9d76827e8375742b096b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1275e0e852dcd229398f0eb1149aa1e9

    SHA1

    fbeac9ddb3945efd38d40969d6240c5a59210a3e

    SHA256

    67aad3053bfc9e79ef2aef473cc99ed907eec33da85ed7560995df8814837621

    SHA512

    8b7c086bfbcdee8dff74e5d264bef2dfb4dd67a4e12b701671f490d75503e58d03e39352bdd8ae3531ac9bf402189e1354511c15d856a907438a2498d2fba201

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0c20378a2f688733bfef5d846f2a5d7

    SHA1

    cf740b57e21bb676fafeadf4c6d464ba5792dbdb

    SHA256

    86694951ed5b957018b8204731c1acb078b6f562a8b42146aac04e1278dfda93

    SHA512

    460d1dd6914ba5cda504004c7b40ad33e076ac3b82f9df23f2cafaf17817b638fc18fc35de3dc3a3fb096d0c57fc6521a7569790c3a9745f21f472db7f9fe1d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f29c2f9cb2c6b87144b7b36793399002

    SHA1

    91aae4a278c6eca341f471567dd64d5642523da2

    SHA256

    4cb7deee4f1ea74b74c0f7cd3c147489043eaaad006fffbde74ce557c6f04cbb

    SHA512

    caeb9d6c7414589c1273f57f5a37fca75d5c9859463febdfc9d94dc01c9b0c1c7e567ba0f3be014cabe77d28a083de841333efd2efba0a5f292fdd888e07ebbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8120bdb30cc578ee6015c2219eeb4e0

    SHA1

    f37c1196468e3c960ec02909b8930f60caa9e067

    SHA256

    8f152615987a646dcec4626af0bfd3049afeb158a11aad11a8ffaa108ec1650a

    SHA512

    03908a1680c6ae45601e061332e6514f5b0f1a222c3fbf54bce1d3178c93d2fe82c44be6ff4b52bfb92632c478a60a6e08a1f2b64109581ea9f74448d9b6d4dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e5e9a587378b7b2d9d4decc9c55fed3

    SHA1

    c0dc25d24579b90d59b0263d13466cd544c4aaa4

    SHA256

    540722c91c673bdc88a8dcd3af43d6cd5671aee00d8a509ea1f35d76f1226f6e

    SHA512

    83dbf61e9a4f3775c6e174947a1cc8d792d51a69371805390b5959abbd7d0d62792b1c78b7f6c57f62b800b524d380cfb882d42a5d8d0937698f6f7abecd2689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0c9d1e6462be3e9c7d3cb196547a9de

    SHA1

    4a8f2570749c083d4af757acf22cbb8066c36746

    SHA256

    9a3b24e25026005bcf0c182d318a35b0b8fd5471ad43082362a43764a9d48de4

    SHA512

    7131813f62dfa80aa6aadc7d68c790b2f1c4301035538f29f23fd3161217d71b7a7d6db2857a655c00fbdd833040207b5400e6b056619047f9cac2b1062a70b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47ad131b7e6a363cf23b692787249b6c

    SHA1

    d1309d94ffe40e5643816cb3a2217523f9a4d20e

    SHA256

    2b235a2c9171861d1e5d7b6cab35b918fae659d3f7babb70c960b80a83e7c3b6

    SHA512

    0cbf945e964a7e2d50cd03b52746d4546e066015e57b2333a7f30f3d18e2b5e5f73150e018bad9a69d8b73c025a106814771bd89143229e395a7092d4d4249bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2db35914d464e846c051f8ff0f41478

    SHA1

    8d26fc6925e6145166bc8763ea03085f1d473816

    SHA256

    fb61a7a4d786e578917083d5b98436f580ca61277cfc70df7466c2a99ffeef9c

    SHA512

    3d250351eede38eadef98111af6fc4edf3ca4a21cf490a93508dde9514d6d10f13144b41b89e3f5f83116c54c34648cd78b3ed7db2f7da93e665f928931c9483

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a0ca21204e76c7e65c1de3cbea7c99

    SHA1

    f6989d7cbb03f7491af9a98d04378254ec49fe59

    SHA256

    f77383b2591d2407bde2b39cf440f6a02db5d965faf6e92a1ebca44ac66a7964

    SHA512

    fd529cb1d3e3d9737c271458c2ed614fcf7dcdde14f1c2ad9d045ba5d0e17790df0954756d5eb42ea965dbfaa298b234c46f100eb3334605eb6c9d4daae9d078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7e82727d5b52da02cd59031587f2c6c

    SHA1

    f8415150613092c39ea120625806b754cf924f10

    SHA256

    f06c270eac06ce42da6083a25380591777ec7781526b81de510bc3af91a1b117

    SHA512

    bf73d463ef26ca9bbce1abf500fb77636d573ce4a239b65c58cd967a454b9a31e26fb5d0ec75621aefd1d4dae0ed5b9d6ea8896781ccd407f321521da82afd9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aa869380713b566274d294f2c0595c0

    SHA1

    3552f061b9853ac24316440402f3c1a32dde13de

    SHA256

    e88e7980ceeaad04b92c643591311c63e305075faf03150ad8b996baae9ecbfe

    SHA512

    bd5d5e48ab559c35f947e06e8715c54d9378e1d2c1a84d4687d79240d995704472cf2c251bd3fb5c874fd0ff23bc005320a688281edd3461f550f4014d4901d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b73902a377ca01084d7c9f6c2fb47143

    SHA1

    b0ed01afa70c0ade48b0dc0ed283d5dc56831b6b

    SHA256

    27e0ec009a98ebe552bc03ea47b520c824727269f0f1da1217bd19a053de523e

    SHA512

    35a1ae4f81dcab2c7a17fcbb6c56dea13f9a2be1cbfe949a6f2ff0b1215bffa9fa71ab1a636ec2f73fd521eabfcddaba04fa274e0ffcaf548d398019a2233664

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40b90ae2ebf414e29455c56d56d42f2e

    SHA1

    5f414d177fb415b304011e6e869278a6ff181184

    SHA256

    502ed51a5497a8b93c6c102874d4cce3a000891b238fbfd8b889b267b9d74f94

    SHA512

    9dc5316f92bd4b80f12eea31f2ab7dee6c869e84398b8cce3fe16460052e2ae2316a003d43014ef256ce452eea169baf795733456925f1bd4a945d23b8d3b980

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a2eedc85fe860f57f7879c29f64da48

    SHA1

    2713be062429245c3447bb58a339a0e576b128c9

    SHA256

    b88a5482b7c34cf09cc30c46c5f80219b1f6d8ba97aff182644de4324a4ff017

    SHA512

    77fdd7e0fc02390d2b761518ddb61bec02646600add1ca9d562f97fcbaf8038d906ababa250c13efb5ce00f58e70047610268261e85aa8d93e121e0bfb1676ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    201601cbcc7965cf027f13ae862e0e23

    SHA1

    bb982f2609ec4c9e2bbf348a19697852c72ab85b

    SHA256

    abafa4e824512479fb927d4c3398ec39b0bb0c8484774de197f693e623c71d93

    SHA512

    e98794fbdc862bca79ba0dc01cab2aacebee4c389a531b0338d5f2a7c83316b617416e57eb51d6199dc552a0507beef1f2a11e08ba83a6c9371e3be20c369524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3213737b4daa2af836868efd05d73338

    SHA1

    1184ba4d588971026cffea20f5eadc70b215427d

    SHA256

    403d1f638cdf99fa5a883bc8b336ef392b27cfeb153faf6901bed03636b7162e

    SHA512

    7a4a1d2f9cfb38248e5049ece958704279f7ea2eba716220777fc23605a51e4489d744ff709c663744b0bc936f5ff55de24432cbfd913b91e373ae667147d80f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88324964daa32cf53e055a3d84f66a5c

    SHA1

    6f7b8a20ee6486441e839acaf836b8939ce539e4

    SHA256

    f27089b9881fe216f9ae9288ede5a16d180f33502dad017e40ef618c0c5c7e7c

    SHA512

    3dbc9ce47568f900fa3094b6d9df09fbae8871142ec55a442619eaa12b73651ee4aee0f46916346c435c24931590353b9ba7ab5aa47636bcedb9b1ac9b1e7e6d

  • C:\Users\Admin\AppData\Local\Temp\Cab81E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar87F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2684-15-0x0000000071DD0000-0x0000000073A4C000-memory.dmp

    Filesize

    28.5MB

  • memory/2704-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2788-13-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2788-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB