| File name: | Neshta Ramnit.7z |
| Full analysis: | https://app.any.run/tasks/966edfe2-1967-464a-8122-d4d0b54c9b21 |
| Verdict: | Malicious activity |
| Threats: | Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud. |
| Analysis date: | August 18, 2021, 16:07:00 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 207760DEA1A3B48B3BD79465DC017CE9 |
| SHA1: | 627EEA291560284A26F60C951BB3E30D784E5A93 |
| SHA256: | 785AD0E8D224280B8A2A1282B1C671CC5C008353F13A711AD4BA47AD3A3B5889 |
| SSDEEP: | 196608:Nz6l1xJ0RV0MkBr9tDRz4X/s66WzIXbPAjG4zcV44mzH43zti1ZzFOo:56l1ERevZt4XV6WQbPch46Hwi5Oo |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,6317281003166757808,15949580386602241053,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3252 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 340 | "C:\Users\admin\Desktop\JRuler.exe" | C:\Users\admin\Desktop\JRuler.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 360 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1052,6317281003166757808,15949580386602241053,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 384 | "C:\Users\admin\AppData\Local\Temp\3582-490\JRuler.exe" | C:\Users\admin\AppData\Local\Temp\3582-490\JRuler.exe | — | JRuler.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 384 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1052,6317281003166757808,15949580386602241053,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 432 | taskeng.exe {E7C81B1A-34CA-46B5-933E-02C92A917A9F} | C:\Windows\system32\taskeng.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Engine Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 560 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1052,6317281003166757808,15949580386602241053,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1328 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 564 | "C:\Users\admin\AppData\Local\Temp\3582-490\Ramnit - (2).exe" | C:\Users\admin\AppData\Local\Temp\3582-490\Ramnit - (2).exe | — | Ramnit - (2).exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 568 | "C:\Program Files\WinRAR\uninstall.exe" /setup | C:\Program Files\WinRAR\uninstall.exe | — | wrar602.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: HIGH Description: Uninstall WinRAR Exit code: 0 Version: 6.2.0 Modules
| |||||||||||||||
| 568 | "C:\Users\admin\AppData\Local\Temp\3582-490\JRuler.exe" | C:\Users\admin\AppData\Local\Temp\3582-490\JRuler.exe | — | JRuler.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\171\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Neshta Ramnit.7z | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (688) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1724) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.7z\OpenWithList |
| Operation: | write | Name: | a |
Value: WinRAR.exe | |||
| (PID) Process: | (1724) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.7z\OpenWithList |
| Operation: | write | Name: | MRUList |
Value: a | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (10).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (11).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (13).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (6).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (12).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (2).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (1).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (3).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (4).exe | executable | |
MD5:— | SHA256:— | |||
| 688 | WinRAR.exe | C:\Users\admin\Desktop\Fileinfectors\Neshta - (9).exe | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4060 | iexplore.exe | GET | 200 | 172.217.16.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/freedesktoptimerlike.html | DE | html | 6.01 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/images/menubackgroundside2.jpg | DE | image | 1.35 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/slider/slider.js | DE | text | 3.00 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/images/bodybackground.png | DE | image | 11.6 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/button.css | DE | text | 2.71 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/slider/slider.css | DE | text | 6.40 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 78.46.117.95:80 | http://freedesktopsoft.com/images/menubackground2.jpg | DE | image | 16.4 Kb | suspicious |
4060 | iexplore.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8dead6c8fdcc44a6 | US | compressed | 4.70 Kb | whitelisted |
4060 | iexplore.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?68f1314e50399902 | US | compressed | 4.70 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3220 | svchost.exe | 63.251.235.76:443 | jugapqqyejdhysgdymv.com | Voxel Dot Net, Inc. | US | malicious |
3760 | iexplore.exe | 52.16.225.15:447 | tvrstrynyvwstrtve.com | Amazon.com, Inc. | IE | whitelisted |
3760 | iexplore.exe | 18.235.92.123:447 | wqerveybrstyhcerveantbe.com | — | US | malicious |
3760 | iexplore.exe | 45.55.36.236:447 | rtvwerjyuver.com | Digital Ocean, Inc. | US | malicious |
4060 | iexplore.exe | 78.46.117.95:80 | freedesktopsoft.com | Hetzner Online GmbH | DE | suspicious |
4060 | iexplore.exe | 172.217.22.206:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
4060 | iexplore.exe | 142.250.185.98:443 | pagead2.googlesyndication.com | Google Inc. | US | shared |
3248 | Neshta - (6).exe | 205.185.216.42:80 | ctldl.windowsupdate.com | Highwinds Network Group, Inc. | US | whitelisted |
3560 | Ramnit - (1).exe | 42.51.7.143:2014 | — | Henan Telcom Union Technology Co., LTD | CN | unknown |
3220 | svchost.exe | 142.250.184.238:80 | google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
ctldl.windowsupdate.com |
| whitelisted |
google.com |
| malicious |
supnewdmn.com |
| malicious |
revivalresumed.com |
| malicious |
uhhoatxt.com |
| malicious |
yijlxkulyqfcgfecneu.com |
| malicious |
vxasusphxwkdktm.com |
| malicious |
yractfrwrctboagip.com |
| unknown |
hvkteatvnctsgrie.com |
| malicious |
rkwqxdlhwsbpsoiipkl.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3220 | svchost.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
— | — | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a Suspicious *.myftp.biz Domain |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
960 | iexplore.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
3220 | svchost.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
960 | iexplore.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
3760 | iexplore.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
3760 | iexplore.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
3220 | svchost.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
3220 | svchost.exe | A Network Trojan was detected | ET TROJAN Win32/Ramnit Checkin |
Process | Message |
|---|---|
alawsixx.exe | CheckBypassed ok |