URL:

http://rakuten-card-protect.com/

Full analysis: https://app.any.run/tasks/a673f109-e39c-4828-8577-731fa9816be2
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: August 16, 2018, 02:19:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
ramnit
Indicators:
MD5:

86F1746FEB1B7CAF9A26AE1204697D7D

SHA1:

D9D533B13EB1B84FB8E2345BA1EEE6FD389C7EF7

SHA256:

B5E8B15695ED715F42C9C5DDE1F96C80472599158EE82DA06EF72F8AE691134A

SSDEEP:

3:N1KMQm8TRKKXt:CMQ/Kyt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 2380)
    • Changes internet zones settings

      • iexplore.exe (PID: 4056)
    • Application launched itself

      • iexplore.exe (PID: 4056)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2380)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2380)
    • Creates files in the user directory

      • iexplore.exe (PID: 2380)
    • Dropped object may contain URL's

      • iexplore.exe (PID: 4056)
      • iexplore.exe (PID: 2380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2380"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:4056 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4056"C:\Program Files\Internet Explorer\iexplore.exe" http://rakuten-card-protect.com/C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
478
Read events
412
Write events
64
Delete events
2

Modification events

(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000048000000010000000000000000000000000000000000000000000000B096B68868EBD301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000D8BFD602040000000000000000000000000000000000000000000000F4BFD602040000000000000000000000000000000000000000000000D8372A0000000000FFFFFFFF000000000000000000000000010000002E00000000000000000000000000000002000000C0A801640000000000000000D84ED505AC02000005000000010000000000000000000000010000000000000000000000BF060000000000000000000000000000000000001000000088C0D60204000000000000000000000000000000000000000000000000000000C8E40C00000000000C0000000000000000000000
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{D80ADC81-A0FA-11E8-ACE5-5254004AAD11}
Value:
0
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
10
(PID) Process:(4056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E207080004001000020013002F009F01
Executable files
0
Suspicious files
4
Text files
22
Unknown types
5

Dropped files

PID
Process
Filename
Type
4056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHUAAB7W\favicon[1].ico
MD5:
SHA256:
4056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab3FD8.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab3FE9.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar3FD9.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar3FEA.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MJG226QK\rakuten-card-protect_com[1].htmtxt
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:60272CBA5AD84466B761CCB17BC51037
SHA256:ED2A144C57AC894562DA29C3ED8DF7A741F5A07E4C053CD366417C3574EC4CAE
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab40B6.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar40B7.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
20
DNS requests
7
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2380
iexplore.exe
GET
302
172.82.228.20:80
http://rakuten.112.2o7.net/b/ss/rakutenkcdev/1/H.22.1/s27117097719439?AQB=1&ndh=1&t=16%2F7%2F2018%203%3A19%3A51%204%20-60&ce=UTF-8&ns=rakuten&cdp=3&g=http%3A%2F%2Frakuten-card-protect.com%2F&cc=JPY&server=rakuten-card-protect.com&v17=D%3DUser-Agent&c42=No%20Referrer%3A&c49=D%3Dg&c50=card&v51=No%20Referrer&v52=D%3DpageName&c61=PC&v61=D%3Dc61&c62=IE&v62=D%3Dc62&c63=D%3DUser-Agent&v63=D%3DUser-Agent&c69=0.031&c70=H.22.1-1.20120307&s=1280x720&c=32&j=1.5&v=Y&k=Y&bw=1280&bh=564&ct=lan&hp=N&AQE=1
US
suspicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/key_ac.png
TW
image
7.31 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/ninsyo_ac.png
TW
image
6.20 Kb
malicious
4056
iexplore.exe
GET
125.227.143.133:80
http://rakuten-card-protect.com/favicon.ico
TW
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/logo_horizontal_e-navi.png
TW
image
6.60 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/id_r_logo_input.png
TW
image
1.87 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/
TW
txt
236 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/common_login.css
TW
text
30.6 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/login_lower_back.gif
TW
image
1.96 Kb
malicious
2380
iexplore.exe
GET
200
125.227.143.133:80
http://rakuten-card-protect.com/index_files/s_code.js
TW
text
67.8 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2380
iexplore.exe
125.227.143.133:80
rakuten-card-protect.com
Data Communication Business Group
TW
suspicious
4056
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2380
iexplore.exe
104.108.51.247:443
jp.rakuten-static.com
Akamai Technologies, Inc.
NL
whitelisted
2380
iexplore.exe
133.237.48.235:443
image.card.jp.rakuten-static.com
Rakuten,Inc.
JP
unknown
2380
iexplore.exe
172.82.228.20:80
rakuten.112.2o7.net
Adobe Systems Inc.
US
whitelisted
4056
iexplore.exe
125.227.143.133:80
rakuten-card-protect.com
Data Communication Business Group
TW
suspicious
2380
iexplore.exe
13.107.4.50:80
www.download.windowsupdate.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
rakuten-card-protect.com
  • 125.227.143.133
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
image.card.jp.rakuten-static.com
  • 133.237.48.235
unknown
jp.rakuten-static.com
  • 104.108.51.247
unknown
rakuten.112.2o7.net
  • 172.82.228.20
suspicious
www.download.windowsupdate.com
  • 13.107.4.50
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET CURRENT_EVENTS DRIVEBY EXE Embeded in Page Likely Evil M1
A Network Trojan was detected
ET TROJAN RAMNIT.A M2
Executable code was detected
ET SHELLCODE Common 0a0a0a0a Heap Spray String
Executable code was detected
ET SHELLCODE Common 0a0a0a0a Heap Spray String
Executable code was detected
ET SHELLCODE Common 0a0a0a0a Heap Spray String
No debug info