Analysis
-
max time kernel
94s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 14:21
Static task
static1
Behavioral task
behavioral1
Sample
b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe
Resource
win7-20240903-en
General
-
Target
b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe
-
Size
640KB
-
MD5
7af5475085c991c01f9530134b5cec70
-
SHA1
3ad78b2805a69a5c3528a0213848e57b984eb759
-
SHA256
b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709
-
SHA512
ac8c8cf34ab6de910962b935bc1132467c3824ab5d7690ff2b51e9f2e7e28d0e42517bd74b8af6dedce59869a56c8daa9676e6ef06971db5c60f01a3235960f8
-
SSDEEP
12288:72f+zZvZ5kjAcUFc2yV7zIFDIyWOy6ba3yd4QCZUv5YYYkx:7ROQa3e4JZ8Yk
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3320 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe 5064 DesktopLayer.exe -
resource yara_rule behavioral2/memory/5064-14-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/5064-16-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/3320-8-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px788B.tmp b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31158470" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31158470" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444752688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0E6E2CFE-DCBA-11EF-9361-DA61A5E71E4E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3806257546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3808757180" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe 5064 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3220 iexplore.exe 3220 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3320 3156 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe 83 PID 3156 wrote to memory of 3320 3156 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe 83 PID 3156 wrote to memory of 3320 3156 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe 83 PID 3320 wrote to memory of 5064 3320 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe 84 PID 3320 wrote to memory of 5064 3320 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe 84 PID 3320 wrote to memory of 5064 3320 b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe 84 PID 5064 wrote to memory of 3220 5064 DesktopLayer.exe 85 PID 5064 wrote to memory of 3220 5064 DesktopLayer.exe 85 PID 3220 wrote to memory of 2352 3220 iexplore.exe 86 PID 3220 wrote to memory of 2352 3220 iexplore.exe 86 PID 3220 wrote to memory of 2352 3220 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe"C:\Users\Admin\AppData\Local\Temp\b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exeC:\Users\Admin\AppData\Local\Temp\b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3220 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD565ff4e1a660b03c192195dc09416d8a8
SHA1c8e9c1b5d0e74e2f581eaa06d77db42ddb2b24b9
SHA25625f890730498e80c6b85f0ca869917f45af6cadbb427695a615181eac3285dc2
SHA5123efa3c79d74861659b4e6e97b362fb4943eeae2e81425029bbf407fb2c4c914bc2d2b43bc8164e9ed050cdb24f411a8582e086eb3557227ad79ec2256c5a52ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5b2b12443eb4b7f1374e8d9a77ebfedb6
SHA1e02ccc949f407e6e9c4830bdd8232ef6ba6183f2
SHA25681421c1d40f9b4f73be612c295e8d0e457fa2c07107f4ac612ab079fcd863336
SHA5125b9c5781e120cd976da9dd43f6e117d5462cf403a889e112032c70c8ca9f8032e1390dde566dcc558b63da488a05d58c8901a330805d73c6dd0119f67295446c
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\b045358154f9358338c7055516982872ed6017b58ec396e0cc3344a843838709NSrv.exe
Filesize52KB
MD5ce99b549382dbfc4f41efe99b5dbcd54
SHA166905167920ece3a0bf65441d30da72ad25b7475
SHA256e26d8f6a9c98b949d1f58c97c2dbcf7d90d7a3c3d2f06eb9b6033465d493322d
SHA51254447bdddf475594a4e8f5ccda131190e3e858a02e0147aee7c7b04ae54812b18aefdbdf5e59fc3005686b06fe938b904b2099672063738898f4995fd4bab1bc