File name:

86e3e7dc9cafd72776d32eb551e0c4ee69414037480024a2667843d621860502.zip

Full analysis: https://app.any.run/tasks/4022ee84-73ca-4e03-b574-009a43f85a38
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: March 02, 2024, 03:20:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ramnit
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

D522A6E245325D9CB40BE28EBE239102

SHA1:

FC3A3C307947F8DC2701046D75893021B194304F

SHA256:

72D8CAEF6849A37A1CB90703AE79F63ED5DF5AD3259C31959C17DC96C5D0DA3B

SSDEEP:

3072:V9+HOXJdkJvQ5gjs8c5vLj9vKa7jy87SSMG9PFequo:VGOXkJfjsNl5F7jy8eSMOPFeqN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2472)
    • Create files in the Startup directory

      • iexplore.exe (PID: 3500)
    • Application was injected by another process

      • csrss.exe (PID: 388)
      • winlogon.exe (PID: 428)
      • taskeng.exe (PID: 300)
      • svchost.exe (PID: 756)
      • lsass.exe (PID: 488)
      • explorer.exe (PID: 1164)
      • dwm.exe (PID: 612)
      • ctfmon.exe (PID: 1564)
      • svchost.exe (PID: 1908)
      • smss.exe (PID: 260)
      • svchost.exe (PID: 1080)
      • csrss.exe (PID: 344)
      • wininit.exe (PID: 380)
      • svchost.exe (PID: 1252)
      • svchost.exe (PID: 3196)
      • svchost.exe (PID: 828)
      • svchost.exe (PID: 972)
      • svchost.exe (PID: 672)
      • IMEDICTUPDATE.EXE (PID: 1440)
      • services.exe (PID: 472)
      • dllhost.exe (PID: 2328)
      • SearchFilterHost.exe (PID: 3852)
      • SearchProtocolHost.exe (PID: 3320)
      • dllhost.exe (PID: 1876)
      • svchost.exe (PID: 1360)
      • lsm.exe (PID: 496)
      • svchost.exe (PID: 596)
      • msiexec.exe (PID: 2676)
      • spoolsv.exe (PID: 1224)
      • svchost.exe (PID: 800)
      • SearchIndexer.exe (PID: 2216)
      • svchost.exe (PID: 856)
    • Connects to the CnC server

      • iexplore.exe (PID: 3500)
    • RAMNIT has been detected (SURICATA)

      • iexplore.exe (PID: 3500)
    • Actions looks like stealing of personal data

      • SearchIndexer.exe (PID: 2216)
    • Runs injected code in another process

      • iexplore.exe (PID: 2120)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • iexplore.exe (PID: 3500)
  • INFO

    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 1164)
    • Checks supported languages

      • labmgr.exe (PID: 2340)
    • Manual execution by a user

      • labmgr.exe (PID: 2340)
    • Reads the Internet Settings

      • explorer.exe (PID: 1164)
    • Reads the computer name

      • labmgr.exe (PID: 2340)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2472)
      • iexplore.exe (PID: 3500)
    • Creates files in the program directory

      • iexplore.exe (PID: 3500)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3500)
    • Connects to unusual port

      • iexplore.exe (PID: 3500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Unknown (99)
ZipModifyDate: 2024:03:02 03:19:56
ZipCRC: 0x22fa70b0
ZipCompressedSize: 87522
ZipUncompressedSize: 136704
ZipFileName: labmgr.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
36
Malicious processes
28
Suspicious processes
7

Behavior graph

Click at the process to see the details
start winrar.exe Profile Notification Host Profile Notification Host labmgr.exe #RAMNIT iexplore.exe iexplore.exe no specs smss.exe taskeng.exe csrss.exe wininit.exe csrss.exe winlogon.exe services.exe lsass.exe lsm.exe svchost.exe dwm.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe explorer.exe spoolsv.exe svchost.exe svchost.exe imedictupdate.exe ctfmon.exe svchost.exe searchindexer.exe msiexec.exe svchost.exe searchprotocolhost.exe searchfilterhost.exe

Process information

PID
CMD
Path
Indicators
Parent process
260\SystemRoot\System32\smss.exeC:\Windows\System32\smss.exe
System
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Session Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
\systemroot\system32\smss.exe
c:\windows\system32\ntdll.dll
300taskeng.exe {CE1452CD-5E82-4DCD-B0CC-498574D17563}C:\Windows\System32\taskeng.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Engine
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskeng.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
344%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
380wininit.exeC:\Windows\System32\wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Start-Up Application
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
388%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
428winlogon.exeC:\Windows\System32\winlogon.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Logon Application
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winsta.dll
472C:\Windows\system32\services.exeC:\Windows\System32\services.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Services and Controller app
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\services.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
488C:\Windows\system32\lsass.exeC:\Windows\System32\lsass.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Local Security Authority Process
Exit code:
0
Version:
6.1.7601.24545 (win7sp1_ldr_escrow.200102-1707)
Modules
Images
c:\windows\system32\lsass.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspisrv.dll
c:\windows\system32\lsasrv.dll
c:\windows\system32\sechost.dll
c:\windows\system32\sspicli.dll
496C:\Windows\system32\lsm.exeC:\Windows\System32\lsm.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Local Session Manager Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\lsm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sysntfy.dll
c:\windows\system32\wmsgapi.dll
c:\windows\system32\cryptbase.dll
596C:\Windows\system32\svchost.exe -k DcomLaunchC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpnpmgr.dll
c:\windows\system32\spinf.dll
c:\windows\system32\user32.dll
Total events
8 849
Read events
8 754
Write events
95
Delete events
0

Modification events

(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
525400363EFF
(PID) Process:(1164) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2472) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\86e3e7dc9cafd72776d32eb551e0c4ee69414037480024a2667843d621860502.zip
(PID) Process:(2472) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
Executable files
14
Suspicious files
3
Text files
37
Unknown types
2

Dropped files

PID
Process
Filename
Type
1164explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msbinary
MD5:FAC88B744FD87167481C3A0E5D621B17
SHA256:058D8D1DF5B29B55108CE578DBF77234FEF3B1975A57AA2A801CEFCF0362ACAD
1164explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msbinary
MD5:07C67FFAADEF219B1EB802673776C634
SHA256:C74EEB851FCD36552B8AB40EB375FD9162887E54EE7EFB60C58A4D91D36E6DB5
3500iexplore.exeC:\Program Files\Internet Explorer\dmlconf.datbinary
MD5:503C04DF96279D417C2442A8C42CA661
SHA256:C22A8942A12DD1F63DC73A8D0A26C44E9797F6E1B45BDFCA3FCE9A7F530CD386
3500iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\Reader\WebResources\Resource1\index.htmlhtml
MD5:64F083882D0D5BBF314688C6328E8728
SHA256:2A40DFED4750C45F0C75EE1C5B67AE4DB1ADD370E7656A2C1D849350EFC50C15
3500iexplore.exeC:\Program Files\Common Files\microsoft shared\OFFICE14\1040\README.HTMhtml
MD5:ED91CB39FC5D5798D1FD9E14C3975314
SHA256:12615EF51AFA9949E48327EAEC4EE4ED480D2C970EE487F03F222BA76A5A3495
3500iexplore.exeC:\Program Files\Common Files\microsoft shared\OFFICE14\1031\README.HTMhtml
MD5:1E6A9019E91CFA5F78AD3B078E9CFEFE
SHA256:D6909ABFB629B472E04DA7A5812D631F94C3B17DF8FBAF23C098B204042B488F
3500iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\ReadMe.htmhtml
MD5:5BE1BCEC682FF9F0EBAEB8FDE82367CE
SHA256:E4C5197E53BF15E8B07853D7114EE4AC627FFBC1804AAE1CF839B5C78E630E08
3500iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\Reader\ngl_resources\resources\ui\index.htmlhtml
MD5:13EBE9A7C4BD666770C76B821CFF8DBE
SHA256:E0CC28FAE9502AEAC25ED762EA4192FA3C87C829823B71DE339D2BD671A153D7
3500iexplore.exeC:\Program Files\Common Files\microsoft shared\OFFICE14\1036\LISEZMOI.HTMhtml
MD5:E6576A9B9B0701F8B2F8BA6B81AD640C
SHA256:932979D224A81A930EC787012AECDB8E21BB5E875807D5D6E651DDE3F88A615D
3500iexplore.exeC:\Program Files\Common Files\microsoft shared\OFFICE14\1033\README.HTMhtml
MD5:C48BFBFDDC16EB72AAA8DE0D1A1468E7
SHA256:B2FD2878A6CDFE10317252185E918CA91FCF008D1AE7AA9340894008E14A3E04
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
17
DNS requests
13
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3500
iexplore.exe
142.250.185.110:80
GOOGLE
US
whitelisted
3500
iexplore.exe
82.112.184.197:447
supnewdmn.com
Vysokie tehnologii Limited Liability Company
RU
unknown
3500
iexplore.exe
193.166.255.171:447
rtvwerjyuver.com
Tieteen tietotekniikan keskus Oy
FI
unknown
3500
iexplore.exe
49.13.77.253:447
wqerveybrstyhcerveantbe.com
Hetzner Online GmbH
DE
unknown
3500
iexplore.exe
172.217.16.142:80
google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
supnewdmn.com
  • 82.112.184.197
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
tvrstrynyvwstrtve.com
unknown
rtvwerjyuver.com
  • 193.166.255.171
whitelisted
wqerveybrstyhcerveantbe.com
  • 49.13.77.253
malicious
google.com
  • 172.217.16.142
whitelisted

Threats

PID
Process
Class
Message
3500
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
Process
Message
svchost.exe
base\diagnosis\diagtrack\matchengine\asimovuploader.cpp(1592)\diagtrack.dll!710F7440: (caller: 710D8A3A) ReturnHr[PreRelease](26) tid(5c4) 80070510 The requested file operation failed because the storage policy blocks that type of file. For more information, contact your system administrator.
svchost.exe
base\diagnosis\diagtrack\engine\heartbeat.cpp(199)\diagtrack.dll!710D8A53: (caller: 710D8504) ReturnHr[PreRelease](27) tid(5c4) 80070510 The requested file operation failed because the storage policy blocks that type of file. For more information, contact your system administrator.