Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 20:17

General

  • Target

    12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll

  • Size

    112KB

  • MD5

    c44d74cd5f55241ad2faaeb8d78b2468

  • SHA1

    09f12dcbb401e37ec2a5c788fca38650b5af227c

  • SHA256

    12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea

  • SHA512

    20fc1c909d626d7db46b9d58ebc459f92326f2bc73b8424c7ef47c85824ab5b81c756a95871f7844256c7ca3dfa37238f6ff9b069d8dce80fab892a376b7ee32

  • SSDEEP

    1536:ileniGoqPB7yMaDMfKHiLinL6nDBBvoyV2um0uqcqh2SZN0H7o4eOC4VdtRj:8fGBPDffE6nDBTeVhSzK7o43Cij

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2140
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c512f86873a6e27cfd92b6ee84380915

    SHA1

    492e836a375b37963833fa4271faafe26c95f23b

    SHA256

    5848f18be168930314e214f2787b48e85b65e2a2ca61ad34bca5c56c6fd788cb

    SHA512

    a3eae0111d2238b7eab2e32047492d75ef00f00759dfb1f9b447eb55c4b1ea817b6fb4431bd75c42a6152fe0c3cb4af419b1a13428bdc1d8704078419d71705c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    754fdd52bacb3d27a9933d6d8559a520

    SHA1

    40bca9531fdb8fb84898758e1a486f9eaa2ddf8c

    SHA256

    32547c731764bbb03c6c1c6f80948c68c2a125aab42e8a13b058a09d315f015c

    SHA512

    e105b760b98be922f1c2d6c36caf7b967a36ac867bf15b1bb15e44756e32d5aee9069c9e4e6f85d7ff16008f200af3e714604bc3b0dfd2b8a756e8319b68fbfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    429a5d01ef8b5ded7a1c9b84765a49f3

    SHA1

    95a7c59127a4c3263a4b0d52f24fbd60eb5e0952

    SHA256

    48251482b4bf3a4b5a030886ecdea61476a8cfceb2c2e1314c6d49acad8f1127

    SHA512

    174d6b5cca295eee086548362cd37d5e57685c488984905bbdc599c72324b8b1e819bf45f4e5f9dde3e71e9e7a0fce67386a8881b5fbbcd08189970a93545737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9be939908618a148d7311049f81cdfaa

    SHA1

    23a8725d1dbf674dc4076bc95f9e21248fa1e118

    SHA256

    4a36159046bb7c44b589c4e4cd13100005f2b8bd7eca5a6ed5ba51f18d16c951

    SHA512

    b1587d01c67ec3b888aa8b398cf6597fdf364f1cc68aac9c8ddb7e94e5a73d76dadbdd7f963cc56f163b5e44fb449ad7b522e82937960495f4e6303f211175f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81fd2806d137855317e6417face68c3e

    SHA1

    b726682a233c5e4effe3d0a200ea477525ee1f17

    SHA256

    dc6b654dcb560b61317a6812d7f29bad054efdc14de7232b03905424db347fa8

    SHA512

    33df493bcde4a213298bb21c146985ff9327f47906770e1d426272e8b2362a91f6c716d4490356ddcf122a86afc742014c13e64198f38ba006ee7755c0f32ecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fe0766041f305dfce391caa82a73db2

    SHA1

    3fad913b2ac6d8254eadbd71b6f4dc939370aa23

    SHA256

    dbc05307f1d0009cb3d9e9714e9744bf18c45e8e97e53e661d1dbf52b9b37007

    SHA512

    30cd31c4bd71a9adf9a2b51439af0ebb470d3254356dde060e3ae1e58577555ce128aa045de0ae4ff00dc614ae11c26725f5f979f6d690f2f4c82341a0e8bac0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f9ca822d973bc9eca56816844d6d530

    SHA1

    a022f4499beb260ccca441d9f333877a61d7a5b6

    SHA256

    e74aa31935b317bde9a812e315dacd3ff3a0558c4c0f20fa55afb445b65ec0c7

    SHA512

    77a2c4ce27f7387147ac6aa22b18863e1908f7f9f9ddeafcd0994769dad22a6b5b34bbab98050ef8e9df95fb554dc2e5d4830282097a8b275b2cbbe2d0ebe3f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fcdabdbd01348fd62f41b8cc755d21d

    SHA1

    d545c83473c60556e806df8deb1906775dcf8f10

    SHA256

    03ff50ddb29cec9dab88a4fd3235d17ae20824f09aa65a1ec3ee4bff7e9331fd

    SHA512

    450283d52fbfe715b51701625785c0d6f070b77e3f79537b3edf341cd6af9d62b431c4245624e22bf3cc3ba64cd2c982fc996ea7d3d60719afaa1d009d399527

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24f724c270fd987eb32700faa88a30f2

    SHA1

    7249b96e096740d328e4d9968c3a4a98d38fe89b

    SHA256

    b492f07bfe0faf57bf62b31633918eccd7b157eab0cb14a4322cffbb9eac9fc8

    SHA512

    550160add467526192ea7f8119c8a2cf2fb39c76572268d5dc0271fc6ecc8f8b594abea37f39b82e13317f35d145dd48e566aea9171c5e29be142e1c85f18dae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    121e74c41be73d5328bd78b2346e900a

    SHA1

    008c9a0885708cddea6147ec6f4f2ed5d18a88ea

    SHA256

    068bdcb88da8a006f2b71963f3d02694a3e02a9ce67ceb59095f1cd411c45cba

    SHA512

    17019b9ccb73b42078c96025f027d874f97962455b5dec58799f2aa5de8e4cc2cba5d7f21856f5c1c504c1a0423620044a4747343385a28b7641b6b5eaa00142

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    252fd60e16b6c4d804de17ff666f32e6

    SHA1

    e21bbe605e2f0574567d03fa1ef2d14ab78db4da

    SHA256

    a7bced43f1d93905a948dcf8e58d735cbf116348a437eaec89fe116825f8929b

    SHA512

    77719f088ef41abff2691abc6e72238a67e626c97f4320171dfa4a54a6188076945e7fecc5820a7efdff5b2a1aea6a8f9e487fe64e6f63e91f4a2ad14e387443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e00e743b80d684dc9f1b843ed39de759

    SHA1

    f4c0d8326b466afb70e55072a082342bffd83098

    SHA256

    87c91476b141fd965b263b19b41320787977a5db8c33dc31116fad1126dd8ca8

    SHA512

    4571c104215ddb3867acce9d4911f50b24fc00930b7f738a95aaf28a922b9cde9e9efa423ac7e5ed7297c56cc38464923674fe1250cc88056c0a4549e9788969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7347f8621ead1fe22f9c6d9879e83d1

    SHA1

    a56b5848a962d2cc8baf00ad6bbf5d679756d609

    SHA256

    f32b9418776d45d433fcccba90d9c9caeea73f465a5a76d60248be492fb133fb

    SHA512

    c1f65034618bdf6b62a19b451b8941ebef75a840759bd0649c4b83c85534d1a4fe8afde34ce7504a0bc6506cb825654279c98fadcb9288d12d2366225ee03b86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21de52a6ef825b3856c049331d2e9601

    SHA1

    6a55751656534d94f5229a85cd12d2277a0b3b49

    SHA256

    1692737bd769db78c38f5c004893375d10020bcf70639daec62dde901ff93f8a

    SHA512

    7edd66945766e3aa8786b434b4d90c9fbb27ef0f1f78531f45de63deda01e7d20667e3441678122fd5496337e01767d04b7ad849f40f772b48f6872be05ea7dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38cf0ed2ab26b12c94110629bc40ef29

    SHA1

    d3af4153a2f5e52efcc692dc0de48acc91e51d2d

    SHA256

    bb50a95869de540756d8594f717667a1dc8309929b3ea439e0e3e25a69882b30

    SHA512

    34701b883cd5c5ae836e8690970b22297e06d786d94f16d51c7d74db7149e646e798f4e8c2c4365ca78b7e73b82052d9983a6d8479f5c69ec23853815d21f821

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94ed80992e7f91b8bfaee7ebfd3db5b7

    SHA1

    588f17f5609e30450246b5878569f37fe88bdeb3

    SHA256

    94ef2e5e765a05e4ffe090a2ea8ae64ac6ee437a4d528e0fa3accab62ab7e08f

    SHA512

    f93abfb3ef897b77385a7eac39af8156dcd9e4fb085d79d8e1b0923cf2d861e51e11fc71f0b24f96f96048d74f2aeb19c8bfb7ce4ef9eaa699485179a4f94f1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cbdaeb368cc682b3c57d06671d7ab17

    SHA1

    87045d69604fb3125a5a040b81e81fe1e16a1ab8

    SHA256

    8ce4e26a795870b15b9f793250b444077f2cdb1b3c77f0a1faec141fabc85e16

    SHA512

    5a33e4c08686c339456b25808e60cb8bf9704894ba7959e99c531160df89a879b4a156728e3518c280af22501ddc0fba5e7eed6a71070792a4ff68ba50a6411c

  • C:\Users\Admin\AppData\Local\Temp\Cab1E7C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1F4A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1764-0-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/1764-1-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/1764-3-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/1764-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1888-23-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1888-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1888-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1888-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2532-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2532-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2532-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2532-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2532-18-0x00000000002E0000-0x000000000030E000-memory.dmp

    Filesize

    184KB