| File name: | Server.exe |
| Full analysis: | https://app.any.run/tasks/70331b1f-f810-43af-86d1-ebcf2cdb913b |
| Verdict: | Malicious activity |
| Threats: | Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud. |
| Analysis date: | June 27, 2024, 09:23:15 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 00E730A33105E73C59C240343E2ADFA2 |
| SHA1: | ED4235C12A193B7C38EFA494AB2D983E958102BA |
| SHA256: | 1BE4AA618EFB8733ED07B08E2678AA1C235C5503FB06EF92DB7D05809410594B |
| SSDEEP: | 24576:H+H+aysD/caXY31Bcth2T+bF5pc3UqzlDmNNMd/9Ux/Y440099Vp:H+H+ayg/caXMithc+bF5pc3UelDmNedD |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:03:13 21:45:02+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | - |
| InitializedDataSize: | 404992 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x65000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1044 | C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\admin\Desktop\Server.exe > nul | C:\Windows\System32\cmd.exe | — | Server.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1504 | C:\Windows\System32\Skcsk.exe -auto | C:\Windows\System32\Skcsk.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 2108 | "C:\Program Files\Microsoft\DesktopLayer.exe" | C:\Program Files\Microsoft\DesktopLayer.exe | — | ServerSrv.exe | |||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: HIGH Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 2440 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | SkcskSrv.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 2752 | C:\Users\admin\Desktop\ServerSrv.exe | C:\Users\admin\Desktop\ServerSrv.exe | Server.exe | ||||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: HIGH Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 2840 | C:\Windows\System32\Skcsk.exe -acsi | C:\Windows\System32\Skcsk.exe | Skcsk.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Modules
| |||||||||||||||
| 2864 | ping -n 2 127.0.0.1 | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2952 | C:\Windows\System32\SkcskSrv.exe | C:\Windows\System32\SkcskSrv.exe | — | Skcsk.exe | |||||||||||
User: SYSTEM Company: SOFTWIN S.R.L. Integrity Level: SYSTEM Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 3100 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | DesktopLayer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3192 | "C:\Users\admin\Desktop\Server.exe" | C:\Users\admin\Desktop\Server.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3192) Server.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\Select |
| Operation: | write | Name: | MarkTime |
Value: 2024-06-27 10:23 | |||
| (PID) Process: | (3100) iexplore.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Userinit |
Value: c:\windows\system32\userinit.exe,,c:\program files\microsoft\desktoplayer.exe | |||
| (PID) Process: | (2440) iexplore.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Userinit |
Value: c:\windows\system32\userinit.exe,,c:\program files\microsoft\desktoplayer.exe,c:\windows\system32\skcsksrv.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3192 | Server.exe | C:\Windows\System32\Skcsk.exe | executable | |
MD5:00E730A33105E73C59C240343E2ADFA2 | SHA256:1BE4AA618EFB8733ED07B08E2678AA1C235C5503FB06EF92DB7D05809410594B | |||
| 2440 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\OFFICE14\1036\LISEZMOI.HTM | html | |
MD5:F18D2BD46522DB287132341611DE198B | SHA256:048CD0AA60DC6557CB0E4D9B644AF2F6CF204E520472CCD2DEB8A182191F65ED | |||
| 3100 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\OFFICE14\1033\README.HTM | html | |
MD5:BCC365B40332AA4C1A0EA3432B718E09 | SHA256:BE74FA8CE509F37CFB186061E5A7DB2E4874B9E153FF56BD03BBBB38CAF21F23 | |||
| 1504 | Skcsk.exe | C:\Windows\System32\SkcskSrv.exe | executable | |
MD5:FF5E1F27193CE51EEC318714EF038BEF | SHA256:FD6C69C345F1E32924F0A5BB7393E191B393A78D58E2C6413B03CED7482F2320 | |||
| 3100 | iexplore.exe | C:\Program Files\Adobe\Acrobat Reader DC\ReadMe.htm | html | |
MD5:73228CB50996251594A1D0C8AA7416ED | SHA256:94CCBE91489635345BA6CB4012C43E5D5E9337CC8CA774E6F8BB8F14D9947593 | |||
| 2440 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\OFFICE14\1042\README.HTM | html | |
MD5:37CBE8504941D7ECBCC738D38C7E3483 | SHA256:99796D729504DED87F51328CB58E0223B75FCA7FE90457081A1CD0A92258D404 | |||
| 3100 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\OFFICE14\1040\README.HTM | html | |
MD5:60DAF33810ED0E73A07079920975385E | SHA256:5A869DED04DE1C5E60AA7C26C0344A0AACE0209EEF49B31ADD8B84E94F6F553F | |||
| 3100 | iexplore.exe | C:\Program Files\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.html | html | |
MD5:A0AAB44EBA2F0AD61CA7A7B72CDA4932 | SHA256:E284BF88F5AFD72C7ADFEF90607659B19F3EEEF34718D4138D83A0D15B9892B6 | |||
| 2440 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\Smart Tag\1031\MCABOUT.HTM | html | |
MD5:8FA1FC7AE03C811BF9F71D85E984DF66 | SHA256:DF63FBD838A106025A337EFAE5920E9750CFE0A911A1E399F2077401EFC50755 | |||
| 2440 | iexplore.exe | C:\Program Files\Common Files\microsoft shared\OFFICE14\1041\README.HTM | html | |
MD5:17C93BC718F896DA3616E380820A869E | SHA256:48A8963B249D4EFEC7CF5C84AE4FCF7825688DC5282EAA227320C222BAF08956 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1372 | svchost.exe | GET | 304 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | unknown |
1060 | svchost.exe | GET | 304 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?11acddbe1ebd82b3 | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1372 | svchost.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3100 | iexplore.exe | 172.217.18.110:80 | — | GOOGLE | US | whitelisted |
3100 | iexplore.exe | 34.253.216.9:443 | fget-career.com | AMAZON-02 | IE | unknown |
2440 | iexplore.exe | 34.253.216.9:443 | fget-career.com | AMAZON-02 | IE | unknown |
2440 | iexplore.exe | 172.217.18.110:80 | — | GOOGLE | US | whitelisted |
2840 | Skcsk.exe | 49.13.77.253:2021 | yk.8bao.vip | Hetzner Online GmbH | DE | unknown |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2840 | Skcsk.exe | 47.76.175.95:14996 | ref.tbfull.com | — | US | unknown |
Domain | IP | Reputation |
|---|---|---|
fget-career.com |
| malicious |
ref.tbfull.com |
| unknown |
yk.8bao.vip |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3100 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |
2440 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |
3100 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |
2440 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |
Process | Message |
|---|---|
Skcsk.exe | ref.tbfull.com |
Skcsk.exe | yk.8bao.vip |
Skcsk.exe | yk.8bao.vip |
Skcsk.exe | ref.tbfull.com |
Skcsk.exe | yk.8bao.vip |
Skcsk.exe | ref.tbfull.com |
Skcsk.exe | yk.8bao.vip |
Skcsk.exe | ref.tbfull.com |
Skcsk.exe | yk.8bao.vip |
Skcsk.exe | ref.tbfull.com |