Resubmissions

12/03/2025, 21:34

250312-1e88aatxgw 10

07/03/2025, 04:27

250307-e27gbatxgt 10

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 04:27

General

  • Target

    2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnit.exe

  • Size

    344KB

  • MD5

    cc38cc5de08e173674a77f2ab1cca762

  • SHA1

    315b4385d093d3201549a2f2def93b9cc6bc834f

  • SHA256

    9c66d4b810422250e3b6c8120a97d2c0f6c59838ea824f3bd2caffb7326189a3

  • SHA512

    17556ae1250ca3305753a58cbe46779c35daa71ab878414d0b8fd422d1a5ccbbaeb8727b4a5fdb6d9accad8cd233d4290d54f02f6b39c9cba27c24b6a1fbcce1

  • SSDEEP

    6144:b5FFvya+l8bhG88ULQ4BfbRlUVzIXeGbfUTpYDDmu/+3fbC:1bya+l8b/LlbUZG+pG/YC

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

64.88.202.250:80

212.51.142.238:8080

200.55.243.138:8080

104.236.246.93:8080

61.19.246.238:443

79.45.112.220:80

95.213.236.64:8080

169.239.182.217:8080

103.86.49.11:8080

87.106.139.101:8080

74.208.45.104:8080

113.160.130.116:8443

209.141.54.221:8080

203.153.216.189:7080

73.11.153.178:8080

186.208.123.210:443

37.187.72.193:8080

201.173.217.124:443

121.124.124.40:7080

24.1.189.87:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnit.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnit.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnitmgr.exe
      C:\Users\Admin\AppData\Local\Temp\2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnitmgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2860
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      71KB

      MD5

      83142242e97b8953c386f988aa694e4a

      SHA1

      833ed12fc15b356136dcdd27c61a50f59c5c7d50

      SHA256

      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

      SHA512

      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      77dfd33b8fbbb8f353f9c052563aa17c

      SHA1

      e904efaa5b3a3e96e30f31aa1f90970c7ad9be3f

      SHA256

      0536273e6400bc4d0054160bc6a56273d4fbb93246da368f23c371e16c1c8939

      SHA512

      2ae704d8ad9ca54269b9bca8f882c437f8aae6c2721ced9120b6bc70336fc88cef873ee5bedb70c16064df3882b04500df69b423b117443e9d36ba2eb2e3d84c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4dcc8c0a533413c2d993878ddc0c2f5d

      SHA1

      64894425035f09409c8c59b7ba46642dc58bf92f

      SHA256

      10bae81324b04e70c7f3ed496b705f95e83072cc3fcf6655ab1f7615e08610ac

      SHA512

      9ad7171c042a1b2b534b3a7322eb811a0845d08de5f74c9f6c02c4882f5aac318820fd089eee9ea0fd9f37cbf6a3dbf3b4d593eb3fe2b50748b1c633fb3ca4b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      38aafe79a4c5c37ca66d1d981e22d1fa

      SHA1

      d10b98580949c0c7397a3e7dbdfa662a787cd4da

      SHA256

      6cba2fb13b68ad32f84f037b7d491850a4b064380bb0e1bf134e6915ff16bbfd

      SHA512

      3bbef344d4bb3b90bc1f137f55f9128e7a9cce89473623802399a73a392dbeb9d5bdba0121bf00cd6a2052d5aaee48537b784d0526cb5eb05415665f5dab0bc1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c4484a935214c0e576b9c2cf5507d8e9

      SHA1

      a829d5d60040a95ca56805d19f4ad517e605b7b2

      SHA256

      e354e97abf916353e6029e3efad2fc53d018d436f49870f821cbe31eda86f5d6

      SHA512

      ef5ad7e433c30c5c0396a981c4d41eecdb4bd96e3e615887628892bb02279e7457efa5feed68d55e3a8214751a8d3d89401a641e74d64af7c7d0aa3b7e8a62bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      49eacf6a66e3f931530a838530bc4043

      SHA1

      d8689ebccb0a0388427e302a634a52019830f06a

      SHA256

      e761aa9e21cf72985cc611ee902dd4eb213f42660a1602c402472188ef915e6e

      SHA512

      4c31338dd789c28395937bef8ce84ad5f3613942423f36a629c8cba7c4263f87b627451c21ce7ca8d568cb095fddbcec0dd7137a7e1120dfbfe62468f106455d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3134b4c4d72ef9024dbbd2529ad9c7df

      SHA1

      893479bfecddd9ce3e1d25f655199a766ab28ca9

      SHA256

      42af93e9a28c2d6db92ee000c9a9f8d50108517a603bdb2f87a17d938045660a

      SHA512

      b3a840281dfbf7d207af65105cf24bbd931d1d4f5796a578d1f580b82f2515b015614cbcc98390ccd0527d676212d274779f842bc6955ca36d7c61a05a53c94a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a15edb0875aae10921a4f7959a5b41f1

      SHA1

      e95a429f836c0deb14f0f3c24f4200d558d221d1

      SHA256

      5e2c46ebd407a1151c66fc74063a5531fc7f17347d2a4b2af727e70fa3994d96

      SHA512

      09c10752f77fd23e86dc1ef2519e1d5503a0cde0577fad10cd2807369a43d422b3a88738d65364fcd2e3bc6e2b71baac21355839cb9a4e091b5adcbeb9dee217

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      561c7c58f127059a7a6b9c85f8381113

      SHA1

      3bf73607073acaa82a0efc6097708da486b14a28

      SHA256

      1fefbc4137f615e2215054d4bea40a4ca6de6246fc9f24c049a5680fd5807f22

      SHA512

      4aaf3eb356ed38f9a7190a7b68d32124f1d10ac53f62f0239e2aa53dacd1fe8c2c833fa271e51131a8fb2fd435a447d8aa815b8112c937b673ad4c64ff1580b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1ed2ff8f2b248066b33729113de59212

      SHA1

      17905be952b8e747f1914885d883e85741911671

      SHA256

      e184d5a55b4c3fa1c97d6c93aa7906396463731938c5116989ab3d8bbe5ebf02

      SHA512

      0d510e8920a80ee77268740d7d258f4978c3368f3159840392c55b2e2c5977ce77f16072217d63f167d2170baf021b3aed414efcad3b4b23b804d8d08555130b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d6c38a7dc36d146fe3e9f064c432dddd

      SHA1

      2ff3512123943d76b05aa962a79b36d847771e6c

      SHA256

      a1e5348e7005bf477e9c7ff79072d538e5febf5139cdb957d35cc7d61a19ad0b

      SHA512

      585c3babcc2e6c73df4a05f57ef52849f34a0811ec75e9b358c4bfe0f5f2229df7238a2cfceda25488a4ec38d9988b81955ed6f4c62279ced102400b04c338b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      23261fbec6133b2a653ef99d10ab85ec

      SHA1

      0a26822c39cfc481debc420ace69dfe0726810dc

      SHA256

      8f1e839963518ad38391f44968f3784d597bef596aaa7ef2e245754e6d90b07e

      SHA512

      08080fd6e37ba5ecdb3508a4ec8d31835a78ff10879c480efce0733d7f17522e615c09858f3b72374e94ada2549794aa969bc4052cf7abc4fbe4ad99001bd0ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      262bb6074c70368cfdb119665a9dbba3

      SHA1

      01387f91b2d7db27f5696e5c3d51a4f2d6dc42e8

      SHA256

      03dba464eb30d3dbbc9efb11fb9d1383278855a6e90b13214219e156fcc79a5a

      SHA512

      d67f5d8b44359f6b0794727136cc285498db7f9304a9750ab97d64778a4296d1b1ee592ab570a3c5a454987955a13895c8e3a33201daff5f54b05ae1f9968c99

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      996e56008e1b38bc8081f1e6f37f4e1a

      SHA1

      b4fc6eab26f79fd588648b674e7ec374a63eb4bb

      SHA256

      9d55faf5bf1d98a7a8041c6f8117c01df54cbe21cff1e4773c779167a73766c3

      SHA512

      2ec1b3bff0a47323f37043ef9f18dd3e8a4e440dd98a2798359a007b0e2cc7b449006ea05da678632cfb3e4a994a2875ed084e48720e4e9e952b15fe691cffa1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ea8274c4833c3a096584a7810a6af10d

      SHA1

      1ac75f8a1a90e3ca51d0238b26256184d36417d1

      SHA256

      1c4eaf2cded583faf4488a295d4e68bdb408fab023e72198f48f4fa934f31f6e

      SHA512

      81e91796930317ee333e91358941cae1d8614fc710dfd6fff0701c43e25f1bc6dcbd91c88108688593266129e7e98f58d38351c09fd9a8761f182a713a990989

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c9a67313641e77f7b8f92a01c0c6ca87

      SHA1

      a1b568f6b1829f0b0f3a957497061babfb25c51d

      SHA256

      e9c3204adede6a031e2f3b33b17c0c3470bd024bba54ccb880b1cb6bd367470d

      SHA512

      bb57e7c3f429eecab549a7d4c999cad79a999f7774a87d192b2d8549fefde74f748c244877b56427f66170b441f5eca3ee35c6a0c46d250ecb9e2b1cb0451e50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e41939dea46f2f8a8024f19f81a60754

      SHA1

      c1b5d0a6cd94e92a91a2d85446e8808270469c13

      SHA256

      7c45a48e95696652f2f94d6cd1e43a83f2dc82b06a72a6accfd0d06dd0880cb1

      SHA512

      5d018e7e1d725bf071f115eead94ad78f926c6d8a08a41816e7ec5f48baa4c21a8470fb87db6119601b9583e4e334ec6b105ffcf6abe47c3119f58163b39afee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4faa1e76353a18af6601969bf5abcff4

      SHA1

      0aa99ecbc328aa1c3a5cfe36c714505c84b322fe

      SHA256

      449eedc0fd8e21478399023b1db35b3997bffb0d42e7538c059f69b74998af94

      SHA512

      32d9263b63325f25dfe20e569a7365628e661b539d9e26779141b0a06a1f2a4d9668bcc3f6c625d76ebb288285bb60bf9026610df4ef5cc9d6d32bdd3eabef92

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1411eec255ae21e5a4f270297342e80b

      SHA1

      bec68ac596a9fc0a2db245c1a453f15243ef7506

      SHA256

      e9428f5ae03bfad9cdec64bcc08e109e3a731dbf47c740bd2db839f475b703df

      SHA512

      3652dabaa5087fc1c21f790b5af6ed6b382bdb848bda65507a4739d4a82859021dd8be7f33834c36f20dc498109694961113b6c980369f8244d75cbe99ffed9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7303471a62751cc012de4b1d21860349

      SHA1

      f8d14cf65c175857a4aa637ee33714b90724bb31

      SHA256

      3dcf8bf72eebfc61835b704771b08fe03a2a3ed3cdd798aacc10480aba2aa629

      SHA512

      9cef1321b498ea5867efbbb9944c1138c88e6a255a4248b82a1bb163c256f64db92b5976309208c92b9f7ffcafec620ff363e3d35e8f47f77fef6a21e8c16526

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8ee55ef1e213f9a19fe80724d81f2c2f

      SHA1

      477e08408c7eb670459653f115f3c336403e3c74

      SHA256

      7a6feb4824a89047ad059ca6cec7e5b2ce747057d6d444b71870d467a48508c5

      SHA512

      6af5f9e0c385bd4a0240a42cfabc14bb967dadd0b23b8888b85cc505b6beaac03268329d4dce4eb440b842a565d8c14f7bc3c261e3f02829567f0f8c2f19229e

    • C:\Users\Admin\AppData\Local\Temp\Cab9A8D.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9B21.tmp

      Filesize

      183KB

      MD5

      109cab5505f5e065b63d01361467a83b

      SHA1

      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

      SHA256

      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

      SHA512

      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

    • \Users\Admin\AppData\Local\Temp\2025-03-07_cc38cc5de08e173674a77f2ab1cca762_icedid_ramnitmgr.exe

      Filesize

      105KB

      MD5

      d5ca6e1f080abc64bbb11e098acbeabb

      SHA1

      1849634bf5a65e1baddddd4452c99dfa003e2647

      SHA256

      30193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae

      SHA512

      aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161

    • memory/2660-12-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2660-15-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/2660-16-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/2660-14-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/2660-13-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/2660-26-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/2660-11-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/3040-0-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3040-24-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3040-21-0x0000000001D40000-0x0000000001D4C000-memory.dmp

      Filesize

      48KB

    • memory/3040-17-0x0000000001D30000-0x0000000001D3E000-memory.dmp

      Filesize

      56KB

    • memory/3040-9-0x0000000000460000-0x00000000004BD000-memory.dmp

      Filesize

      372KB

    • memory/3040-8-0x0000000000460000-0x00000000004BD000-memory.dmp

      Filesize

      372KB