Ramnit.A_14 is a multicomponent malware that targets Microsoft Windows operating systems. It was first seen in January 2010. It steals sensitive information such as banking credentials and infects executables, HTML and Microsoft Office files. It opens a backdoor and communicates with the C&C server for updates. It propagates via removable drives. File Related Changes It drops the following file(s) on the system: - "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hyxgoclh.exe"
Process Related Changes It creates the following mutex(es): - "{545219A0-89E7-D5D6-94CC-53CFDB7D470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD379470A}"
- "{545219A0-89E7-D5D6-94CC-53CFCFFD470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD679470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD025470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD8C9470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCFFD470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCF7D470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD241470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD4E5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCFD1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD5ED470A}"
- "{545219A0-89E7-D5D6-94CC-53CFD8B5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD065470A}"
- "{545219A0-89E7-D5D6-94CC-53CFDCB1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD285470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD585470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCF91470A}"
- "{54521389-89E7-D5D6-94CC-53CFCEA1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD8B5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD85D470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD51D470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFDB29470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCEA5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD6AD470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD119470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFDB65470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD3C5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCFF1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD1F5470A}"
- "{545219A0-89E7-D5D6-94CC-53CFD379470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD349470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFDB75470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD735470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD00D470A}"
- "{545219A0-89E7-D5D6-94CC-53CFD421470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD339470A}"
- "{54520D92-89E7-D5D6-94CC-53CFCEA1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD1A5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFDCB1470A}"
- "{545219A0-89E7-D5D6-94CC-53CFDB65470A}"
- "{545219A0-89E7-D5D6-94CC-53CFD349470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD509470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD421470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD0D5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD485470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD05D470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD5C9470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCEA1470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD5A5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFCFF5470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD071470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD569470A}"
- "{54521ED3-89E7-D5D6-94CC-53CFD14D470A}"
- "{545219A0-89E7-D5D6-94CC-53CFD339470A}"
- "{545219A0-89E7-D5D6-94CC-53CFDB75470A}"
It creates the following process(es): - c:\Program Files\Internet Explorer\iexplore.exe [ \c:\Program Files\Internet Explorer\iexplore.exe ]
It injects malicious code into the following process(es): - "C:\Windows\system32\UI0Detect.exe"
- "C:\Windows\system32\Dwm.exe"
- "C:\Windows\system32\csrss.exe"
- "C:\Windows\system32\psxss.exe"
- "C:\Windows\System32\tcpsvcs.exe"
- "C:\Windows\system32\SearchFilterHost.exe"
- "c:\windows\system32\tlntsrv.exe"
- "C:\Windows\system32\wininit.exe"
- "C:\Windows\system32\SearchProtocolHost.exe"
- "C:\Windows\System32\spoolsv.exe"
- "C:\Windows\System32\mobsync.exe"
- "C:\Windows\system32\taskhost.exe"
- "C:\Windows\system32\nfsclnt.exe"
- "C:\Windows\system32\lsass.exe"
- "C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe"
- "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
- "C:\Windows\system32\SearchIndexer.exe"
- "C:\Windows\system32\inetsrv\inetinfo.exe"
- "C:\Windows\system32\lsm.exe"
Network Activity It attempts to connect to the following remote servers: - supnewdmn.com:447 (91.233.xxxxxx)
- tvrstrynyvwstrtve.com:447 (109.74.xxxxxx)
- google.com:80 (173.194xxxxxx)
We observed the following DNS query/queries: - supnewdmn.com
- tvrstrynyvwstrtve.com
|