Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 12:26
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
68KB
-
MD5
644fe0acc5058cf374c8a55640beaf41
-
SHA1
7cddf73833a860356065f9244f94b0b4fec68b1d
-
SHA256
f9691a01efaeedd7d3f54e187feaaa6bc9274b3b5dd7ced1a278b64bf5c70051
-
SHA512
af22dee14664e7966f354612a9d34fce64d5bda6699812c88c5f5685933e451c29e61613c83706a504e1c5452c2d9845a213860313cb5ac2943026fa495646ab
-
SSDEEP
768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIRV:BHJaAoHoc2x7bZoYBAcQlwJdMt
Malware Config
Signatures
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 1 IoCs
resource yara_rule behavioral2/memory/760-132-0x0000000010000000-0x000000001000F000-memory.dmp family_runningrat -
Executes dropped EXE 1 IoCs
pid Process 1492 SRDSL.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRDSL\Parameters\ServiceDll = "C:\\Windows\\system32\\240542062.dll" tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 760 tmp.exe 760 tmp.exe 3456 svchost.exe 1492 SRDSL.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ini.ini tmp.exe File created C:\Windows\SysWOW64\SRDSL.exe svchost.exe File opened for modification C:\Windows\SysWOW64\SRDSL.exe svchost.exe File created C:\Windows\SysWOW64\240542062.dll tmp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 1492 3456 svchost.exe 86 PID 3456 wrote to memory of 1492 3456 svchost.exe 86 PID 3456 wrote to memory of 1492 3456 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:760
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SRDSL"1⤵PID:4240
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SRDSL"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\SRDSL.exeC:\Windows\system32\SRDSL.exe "c:\windows\system32\240542062.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5c83b9c15efcd8fd9360539854badfe6d
SHA108d8af0fd365296ac5b7e7049a7162aa224007f1
SHA25614e9345ca0ffd967166f8f1937797a34db19e6b436a129e3fbf267ddc79fc7db
SHA512c785c3c58910322abb9491b8b31e6b67d261b92f1264740583808ab50f6be3571a140eae9359903ca071401dd69af84470153dac80da53164e7a859b165ecbc3
-
Filesize
37KB
MD5c83b9c15efcd8fd9360539854badfe6d
SHA108d8af0fd365296ac5b7e7049a7162aa224007f1
SHA25614e9345ca0ffd967166f8f1937797a34db19e6b436a129e3fbf267ddc79fc7db
SHA512c785c3c58910322abb9491b8b31e6b67d261b92f1264740583808ab50f6be3571a140eae9359903ca071401dd69af84470153dac80da53164e7a859b165ecbc3
-
Filesize
37KB
MD5c83b9c15efcd8fd9360539854badfe6d
SHA108d8af0fd365296ac5b7e7049a7162aa224007f1
SHA25614e9345ca0ffd967166f8f1937797a34db19e6b436a129e3fbf267ddc79fc7db
SHA512c785c3c58910322abb9491b8b31e6b67d261b92f1264740583808ab50f6be3571a140eae9359903ca071401dd69af84470153dac80da53164e7a859b165ecbc3
-
Filesize
37KB
MD5c83b9c15efcd8fd9360539854badfe6d
SHA108d8af0fd365296ac5b7e7049a7162aa224007f1
SHA25614e9345ca0ffd967166f8f1937797a34db19e6b436a129e3fbf267ddc79fc7db
SHA512c785c3c58910322abb9491b8b31e6b67d261b92f1264740583808ab50f6be3571a140eae9359903ca071401dd69af84470153dac80da53164e7a859b165ecbc3
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
37KB
MD5c83b9c15efcd8fd9360539854badfe6d
SHA108d8af0fd365296ac5b7e7049a7162aa224007f1
SHA25614e9345ca0ffd967166f8f1937797a34db19e6b436a129e3fbf267ddc79fc7db
SHA512c785c3c58910322abb9491b8b31e6b67d261b92f1264740583808ab50f6be3571a140eae9359903ca071401dd69af84470153dac80da53164e7a859b165ecbc3