Analysis

  • max time kernel
    107s
  • max time network
    88s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-01-2025 12:41

General

  • Target

    250124-pr6r5szndk_pw_infected.zip

  • Size

    105KB

  • MD5

    b5f0291d97a3624403287d5d91c9b51f

  • SHA1

    7d257ddebbc9194eaaa836b6a22bf08dca13b5dc

  • SHA256

    c26f3cc9f4399c0950f5274abd97df89d3e7dfe70e94c2a668ed373bca42949c

  • SHA512

    37b516b4d1f8d6aab17f38c48dd112f6dbffa0ea0810d6cc295b03eb8411ddb4d1781edc36570a369dd0b8b44fab0e4d960eb2a531142b85afc83efc309ff291

  • SSDEEP

    3072:j5QqHuoOjW5ZeGTYNMrxkaVKkaC/AhwOn4Rt2s6:jvuoOjUZeeQkYTxs6

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\250124-pr6r5szndk_pw_infected.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1788
  • C:\Users\Admin\Desktop\re.exe
    "C:\Users\Admin\Desktop\re.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
        PID:128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 128 -s 236
          3⤵
          • Program crash
          PID:3988
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3464
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          3⤵
          • Modifies Internet Explorer settings
          PID:2356
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
          PID:4040
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 236
            3⤵
            • Program crash
            PID:1804
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            3⤵
            • Modifies Internet Explorer settings
            PID:2520
        • C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe
          "C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 128 -ip 128
        1⤵
          PID:4828
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /0
          1⤵
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3904
        • C:\Users\Admin\Desktop\re.exe
          "C:\Users\Admin\Desktop\re.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2396
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4040 -ip 4040
          1⤵
            PID:3412
          • C:\Users\Admin\Desktop\re.exe
            "C:\Users\Admin\Desktop\re.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
          • C:\Users\Admin\Desktop\re.exe
            "C:\Users\Admin\Desktop\re.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3352
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:4364
            • C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe
              "C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe"
              1⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4988
            • C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe
              "C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3060
            • C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe
              "C:\Users\Admin\AppData\Local\Temp\wibiancyhpjegiav.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4716

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\Desktop\re.exe

              Filesize

              148KB

              MD5

              2176529b30915c8261a84c1bc4b078cb

              SHA1

              295618139e70fa45697b5d874982522080d3a26d

              SHA256

              19fc976517e355b7a76a113c699f46c9836d2cf5e4ffcae7f74b9fc3ba8be169

              SHA512

              a4394a7fbec2d8cedc32d5980e003eae56c51dd75e86bb578c91c6fd798e514e154b2c4b4875c4ea6032d449d497522c6c98b338365eafee304ef767212971c9

            • memory/128-12-0x00000000005C0000-0x00000000005C1000-memory.dmp

              Filesize

              4KB

            • memory/128-13-0x00000000005A0000-0x00000000005A1000-memory.dmp

              Filesize

              4KB

            • memory/2076-8-0x00000000007B0000-0x00000000007B1000-memory.dmp

              Filesize

              4KB

            • memory/2076-14-0x0000000000400000-0x000000000043A000-memory.dmp

              Filesize

              232KB

            • memory/2076-10-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2076-9-0x0000000000900000-0x0000000000901000-memory.dmp

              Filesize

              4KB

            • memory/2076-11-0x0000000020010000-0x000000002001C000-memory.dmp

              Filesize

              48KB

            • memory/2076-6-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2076-5-0x0000000000400000-0x000000000043A000-memory.dmp

              Filesize

              232KB

            • memory/2076-3-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2076-15-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2076-41-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2076-51-0x0000000000400000-0x000000000043A000-memory.dmp

              Filesize

              232KB

            • memory/2076-50-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2268-37-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/2396-31-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/3060-65-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/3352-40-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/3904-29-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-24-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-23-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-26-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-27-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-28-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-25-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-18-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-19-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/3904-17-0x000001AF64110000-0x000001AF64111000-memory.dmp

              Filesize

              4KB

            • memory/4716-70-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/4988-60-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB

            • memory/5044-55-0x0000000000400000-0x0000000000439FE4-memory.dmp

              Filesize

              231KB