Resubmissions

24/01/2025, 05:46

250124-ggm82strdr 3

24/01/2025, 05:31

250124-f7qlesslct 10

Analysis

  • max time kernel
    134s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 05:31

General

  • Target

    a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll

  • Size

    142KB

  • MD5

    751f6dc2dcfa872395b986b569ecb689

  • SHA1

    d84298500638597c3b57dcd9180d70c8e8f13372

  • SHA256

    a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd

  • SHA512

    fb61ce4f53d01b5b9b29b68dc825bbeb96ebe8dd2505d3b43d7d7e35cddb36186c48ab4a49cd1864e1fbe728c3c84bad962b682f34989dc307d5dc158ad3d0e4

  • SSDEEP

    1536:gdNnc17YONNIvz1JjEPYB894U3L7NceM54iMfoyV2um0uqcqh2SZN0H7o4eOC4V9:gSYxaYs37M54iMxeVhSzK7o43Cij

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7b3cd8a5313d56a5c934540d19b917b

    SHA1

    49196fa2277452b9702ad8ec9a83afb73cde362f

    SHA256

    54480b6796f9a3e31c07bf0d03c75ba78612c82e08fa8f09766827debac8b325

    SHA512

    c01ef3b27f161d26059e9626e73f66a26935cf9fd451e412067293bd4a1be5ad2a401470846ebd223ed5815d72aa4b6fa3e2bba50004189b4bac64715d4be54e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db0c1880009ad3d98d93804f94b4c0c7

    SHA1

    7132e7b656a61fb077ab8734021901b532c7cc1d

    SHA256

    49219b2fd4d8f835902fb6727b066f8e9dc29f5a3f0cfff8c5c1c7c0ce206df0

    SHA512

    f8ce8d223377dfd57c5902b0513ecdf6d1179e2ede9eca6320e399d8f57db1e755661e18e0e07597a0bfed547cb10ac61d0c283b4068d40f2455b9d98b905eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f594399a925f4839d6629d04327b4b7

    SHA1

    f33ef9e6d55c2ee2a6c2c84dbf9513ea9bcf7fa0

    SHA256

    c46af1356f898f07efa30b0be5b3571805046dd9894795f8566ad0d715e110ed

    SHA512

    6b207b2db0213f7be3593fc38c1786b38cbabc6ea5de07af1ff7eebd408d1a173ca005b451c95664776a981e613bf83f8b2dbb7bc937697e114d7c87952fa367

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0151d0a6922bc343cee68bdb3b179ca8

    SHA1

    6ffa8524eee0dd787264cd92315a7a24c7ea12d9

    SHA256

    bdcb3822364dc09be4926e103a5bcd9d118f8d36f58c3fe067b5f78bbf5ed315

    SHA512

    df96101adbae63d448abe53251ecb2303bf38fe89a0caa7f187edea13bdc983335249f47227a2a0a912ae2251ff0f4293e0066dd076c6bb82f0ccc5a5c3cd3ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    591e77ba0366f54ac70b0dc94aa8c13b

    SHA1

    1f5568c24deb7e845cac0104d2d2048088d55867

    SHA256

    71c08325d64c4aa3b699d6d129160ff230da3ae63a3934176876e8c0f81a67df

    SHA512

    b678a9c201b255f9d56c4e77559ed2f122506d76224e73a760e9e7a9da79048ae8117aa122a8af95399da0a75a08ae242c3549e4b7d67b720f3b5ffcd198fd4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9beaad236550898fa0681257ddc7690

    SHA1

    0067b4b1d9e502fe0ad28ad8ec061b4f0e2b9c28

    SHA256

    5ed5e0bfbe0a52c060f538ceabcfd288f9d909e968e39dbe02e52d464836f438

    SHA512

    9d05ce90d840a34140a2109f4917030ee80c2154ee9b7f4ddc2cc23ff8ec4ca2ef272029077b7a0a0a9eceecb0eb25dea6ccf51c3689bb23ebf15c1cfa14f042

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d31119baa51df059bc66f109c97cfb4

    SHA1

    a214399dcef944cf866c6d7076cee042d57bbd21

    SHA256

    453332659357daf90907b6cf2801a3b229bcc5e8ba52483938c84faa05978eda

    SHA512

    75f974431f30d574f713b652c456fed08fec15910949050839f914a513cfa5a126975cfa3158154eafb8e498dd0bf318a0955bb2bbb5a8beb46d2f64932bc1d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1814c3c0c9b1429abe5bc5232c48f9b7

    SHA1

    87672c681c77386fc9bf44bb9e75fbb009480fc4

    SHA256

    a1a47b61f97e39c2c7da51534e89f778302d7ec3876f4a86a3f140f37fbfe890

    SHA512

    271789785dfe6042d0d34e4ba84b4fedbeabd6b8b0a817dccab98f1fdb442b44b405ada0430c37b355bff5adfd00c8fbf07995500895dc2d1579ee7274e9b56b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a8b6bd0bdb09d003f02809a0bbfb4de

    SHA1

    0a1dd7437aeef4914a60d597312eaa0690510cc0

    SHA256

    fb2b3a6ab025c996bc0612d5b15c087e0cc5b3aad748498de2d528320cf6f281

    SHA512

    c5c39a8c054ada581ac853fb8c9dbc18dce15f2e965a91702cc4cc6bd4beeee33b98f267b7f6e027fc8e887d64e1269b62dfff8b17ebdd246ec6f7885d0d6154

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f769e4cf6d59304680d5df2b69a51161

    SHA1

    141c724c230b516201c2b44d25a2e30849849bf8

    SHA256

    bfb915dbe2d4ebbae6901ea01d89e84103ccb7518019009de8529cb438b6eec8

    SHA512

    9c6860d2c7f089d0c2a7e99a61e168e07a51bcb92dbfb9ca756971dba34db903cc52f96f27bac76996ac152599cb00e7d64ca3f3ce6dd8131bc94fbfce9b046a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21bd7ddd8bdd00b9dc7a29901df771c0

    SHA1

    8aaf6db57c6a808abcc0021d701ecf1f05e085d2

    SHA256

    d2f70b5afbba893662cf9a03e897ced9bb1daa197819f05294b4d6e12480dcf5

    SHA512

    d77f1e0af48e811bbc0bf54dfb02e56082d3665e6c4f82ab0097081b60ebd721669f5798f8f48204af91a81d8136dcef7d6949f83d65ee3a7639782aa3339752

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a254366a26ca932636400d6ff2938bf

    SHA1

    ff53f06c3938f10324a20d0de07848e32224e1c9

    SHA256

    1184c41ee913ebe8dd649192d89ae17eb5245b015c4cdd4466992a5b96744db1

    SHA512

    4174fc12dd0e790d45d641501c61eada4dcc0464df17b8011bd12d5d34e2d71bc205209de5471a02cc47e72142a52bd9d81da19318066eae540a4ffbd34e720c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff35210789e0b785505aed683761bcc4

    SHA1

    96f3f6f6f2907ad77676e1d8134308994b13592a

    SHA256

    e913e38655ce8b90e8da36f602ecc1687e58753719d4a9c097ac9519870d2a0e

    SHA512

    d62d64a93eb366f5f772b506fe0be47239f2692a72ab89df3892555023598dbe38da6a5fe662de6e17ba81c5654854661db719843302499d97428077df84a63d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ca16e60d2ac3153f7505901e1190562

    SHA1

    e52f87525644c126d5a19bd8450ab3e85c0d7acd

    SHA256

    a3a9a34814870f29a0a7f33f1dbc09b42449e92db168308818b6be82fb5a3f71

    SHA512

    f8f13f42b6fdb9309a8bb13bc117e0ee1405d20dd7b31717fe8ca80b37feb3dee5c49b321376b47f0adab22442d8f39b84b1a6f6fe844298bcab5fad29df28ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1a1d63f83ce60d73ff63698634422f7

    SHA1

    0f67a49e42016eb24c4a3b23899de5835d3037f6

    SHA256

    0c70869deef59551421a71f1223d2d49ca5de68d3923ce65449a08b3cac4179b

    SHA512

    3abb77002ca62e4dc98d68d12c1fc4ed75d65e17e7f339043176054bd12fe86e6639ed2c007f928227b323708f52d413b3d57ad4920c8ffb87f099a5e3854d0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e7080cb47d3fa40b1872233d4f10739

    SHA1

    b0ab1fcc543ac2f279454553c55ce4869ee2f606

    SHA256

    e99261c6e1ebc418b51998856d45502f528517a8efdd21b0a6aec793a4f47f97

    SHA512

    c9e1ac6c9470a67870d58bf4df01790fd436093459c7893e1218792f681755df3a3f52ad9c65e8d55191a83180264e7435d38d8a87e24a352f57a9101e6e4fb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    222e73c8ed376ab3721007bfdf998644

    SHA1

    5746d5f3915e8d6c3845f3c6d2cc1bbd6e17a9e8

    SHA256

    f98167d6c47f296b1b5e592de6f7637566773653a0d1e0902318206e06e96646

    SHA512

    e735ccc1853e5c6b6195409ca21bf367eab6942d38184028a55d0309d80b719b8acdc4c4843d3fc626d1ef02d4e4d9508964db640bc3a2db312072e8afe5256f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1be27ba208fe8ef1975c4c275bc49100

    SHA1

    f4bd3a7a75edf2bed505f7b8f8ab434da9158db4

    SHA256

    eea335b919fad160abe9dcc9a7e8b2b8b92d0770623952cfe6c881081f8d8cec

    SHA512

    2072e6f704870a2630db08b6acc034d0d5c9d1e1e4b91227d179c2f98ac3bcff4e15dedb103ca5d94cb61cceb263ab33f377dbcd97a547b272dae9f8106dba63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6cc43f65d5aec30069022efbfcf950b

    SHA1

    d3134892556cb5b18141f08ca3fc968a7a6305b7

    SHA256

    3aa05e0ca916b3dc352cc8f977bf1efdcd7d41a0a812e367dc22562855426d4c

    SHA512

    0cfdfc23c7140546a098485b4a6abbeaf2783547b5bd820112e9b5abb092322892b085b2635428e107188c12cb4477f8fb5193691982c35c028865d271d239d6

  • C:\Users\Admin\AppData\Local\Temp\CabC63F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC6DE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1600-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2548-2-0x0000000010000000-0x0000000010029000-memory.dmp

    Filesize

    164KB

  • memory/2548-3-0x0000000010000000-0x0000000010029000-memory.dmp

    Filesize

    164KB

  • memory/2548-0-0x0000000010000000-0x0000000010029000-memory.dmp

    Filesize

    164KB

  • memory/2548-9-0x00000000006A0000-0x00000000006CE000-memory.dmp

    Filesize

    184KB

  • memory/2880-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2880-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2880-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2880-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2880-21-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB