Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 06:13
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
799KB
-
MD5
ad88f1455f3a22bf958b8c2934096007
-
SHA1
dd8e20e4bb6ee8fa198df78053da606248671587
-
SHA256
119118f174d90c3dcfec3e81ef99bb4497b285a3c00b80a5fb12091d9591ce04
-
SHA512
9106b195e9ce35d559cbf2e9154b2c8a355f8b1e0a5db8fa1bb59bc102c53ed5fc6b246a4a7124b0c776149bbd38c7323425e94a9c89f26e539f04ae416e5d6f
-
SSDEEP
12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9j26MMnj:2nsJ39LyjbJkQFMhmC+6GD9gQ
Malware Config
Signatures
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 12 IoCs
resource yara_rule behavioral2/files/0x0008000000022f89-138.dat family_runningrat behavioral2/files/0x0008000000022f89-192.dat family_runningrat behavioral2/files/0x0008000000022f89-193.dat family_runningrat behavioral2/files/0x000e00000001ef51-199.dat family_runningrat behavioral2/files/0x000e00000001ef51-263.dat family_runningrat behavioral2/files/0x000e00000001ef51-266.dat family_runningrat behavioral2/memory/4236-268-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat behavioral2/files/0x0008000000022cfd-328.dat family_runningrat behavioral2/files/0x0008000000022cfd-329.dat family_runningrat behavioral2/memory/832-348-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat behavioral2/memory/832-364-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat behavioral2/memory/832-387-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remocte4\Parameters\ServiceDll = "C:\\ProgramData\\Application Data\\240580750.dll" ._cache_tmp.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remocte4\Parameters\ServiceDll = "C:\\ProgramData\\Application Data\\240582031.dll" ._cache_Synaptics.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation ._cache_tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe -
Executes dropped EXE 4 IoCs
pid Process 4904 ._cache_tmp.exe 832 Synaptics.exe 1316 ._cache_Synaptics.exe 660 Remocte4.exe -
Loads dropped DLL 4 IoCs
pid Process 4904 ._cache_tmp.exe 3932 svchost.exe 1316 ._cache_Synaptics.exe 660 Remocte4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp.exe -
Creates a Windows Service
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Remocte4.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remocte4.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Remocte4.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Remocte4.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Remocte4.exe Key created \REGISTRY\USER\.DEFAULT\Software Remocte4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Remocte4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Remocte4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Remocte4.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1768 PING.EXE 2236 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3620 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4904 ._cache_tmp.exe 4904 ._cache_tmp.exe 1316 ._cache_Synaptics.exe 1316 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4904 ._cache_tmp.exe Token: SeIncBasePriorityPrivilege 1316 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4904 ._cache_tmp.exe 1316 ._cache_Synaptics.exe 3620 EXCEL.EXE 3620 EXCEL.EXE 3620 EXCEL.EXE 3620 EXCEL.EXE 3620 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4904 4236 tmp.exe 84 PID 4236 wrote to memory of 4904 4236 tmp.exe 84 PID 4236 wrote to memory of 4904 4236 tmp.exe 84 PID 4236 wrote to memory of 832 4236 tmp.exe 86 PID 4236 wrote to memory of 832 4236 tmp.exe 86 PID 4236 wrote to memory of 832 4236 tmp.exe 86 PID 4904 wrote to memory of 3996 4904 ._cache_tmp.exe 88 PID 4904 wrote to memory of 3996 4904 ._cache_tmp.exe 88 PID 4904 wrote to memory of 3996 4904 ._cache_tmp.exe 88 PID 3996 wrote to memory of 1768 3996 cmd.exe 90 PID 3996 wrote to memory of 1768 3996 cmd.exe 90 PID 3996 wrote to memory of 1768 3996 cmd.exe 90 PID 832 wrote to memory of 1316 832 Synaptics.exe 91 PID 832 wrote to memory of 1316 832 Synaptics.exe 91 PID 832 wrote to memory of 1316 832 Synaptics.exe 91 PID 1316 wrote to memory of 1640 1316 ._cache_Synaptics.exe 93 PID 1316 wrote to memory of 1640 1316 ._cache_Synaptics.exe 93 PID 1316 wrote to memory of 1640 1316 ._cache_Synaptics.exe 93 PID 1640 wrote to memory of 2236 1640 cmd.exe 95 PID 1640 wrote to memory of 2236 1640 cmd.exe 95 PID 1640 wrote to memory of 2236 1640 cmd.exe 95 PID 3932 wrote to memory of 660 3932 svchost.exe 96 PID 3932 wrote to memory of 660 3932 svchost.exe 96 PID 3932 wrote to memory of 660 3932 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"2⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 14⤵
- Runs ping.exe
PID:1768
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
PID:2236
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remocte4"1⤵PID:3384
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remocte4"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\Remocte4.exeC:\Windows\system32\Remocte4.exe "c:\programdata\application data\240580750.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:660
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601
-
Filesize
799KB
MD5ad88f1455f3a22bf958b8c2934096007
SHA1dd8e20e4bb6ee8fa198df78053da606248671587
SHA256119118f174d90c3dcfec3e81ef99bb4497b285a3c00b80a5fb12091d9591ce04
SHA5129106b195e9ce35d559cbf2e9154b2c8a355f8b1e0a5db8fa1bb59bc102c53ed5fc6b246a4a7124b0c776149bbd38c7323425e94a9c89f26e539f04ae416e5d6f
-
Filesize
799KB
MD5ad88f1455f3a22bf958b8c2934096007
SHA1dd8e20e4bb6ee8fa198df78053da606248671587
SHA256119118f174d90c3dcfec3e81ef99bb4497b285a3c00b80a5fb12091d9591ce04
SHA5129106b195e9ce35d559cbf2e9154b2c8a355f8b1e0a5db8fa1bb59bc102c53ed5fc6b246a4a7124b0c776149bbd38c7323425e94a9c89f26e539f04ae416e5d6f
-
Filesize
799KB
MD5ad88f1455f3a22bf958b8c2934096007
SHA1dd8e20e4bb6ee8fa198df78053da606248671587
SHA256119118f174d90c3dcfec3e81ef99bb4497b285a3c00b80a5fb12091d9591ce04
SHA5129106b195e9ce35d559cbf2e9154b2c8a355f8b1e0a5db8fa1bb59bc102c53ed5fc6b246a4a7124b0c776149bbd38c7323425e94a9c89f26e539f04ae416e5d6f
-
Filesize
48KB
MD55512a62bb078e6e8b4908951b79090f5
SHA176bee987a022872c88b96244e89a2a6b637b1c09
SHA256657888a3323013eb04837aee028799f82fba9247c11e4c9a3d572897a2b528b9
SHA51263f0603f8f41322da52ba47a1f66a1621c76f8b6c62a08d93429d19bc9a29238601b24b4d72d6522bbbb6490a4b1828ba2b754214d8224f7e3a54c16e8d32270
-
Filesize
48KB
MD55512a62bb078e6e8b4908951b79090f5
SHA176bee987a022872c88b96244e89a2a6b637b1c09
SHA256657888a3323013eb04837aee028799f82fba9247c11e4c9a3d572897a2b528b9
SHA51263f0603f8f41322da52ba47a1f66a1621c76f8b6c62a08d93429d19bc9a29238601b24b4d72d6522bbbb6490a4b1828ba2b754214d8224f7e3a54c16e8d32270
-
Filesize
48KB
MD55512a62bb078e6e8b4908951b79090f5
SHA176bee987a022872c88b96244e89a2a6b637b1c09
SHA256657888a3323013eb04837aee028799f82fba9247c11e4c9a3d572897a2b528b9
SHA51263f0603f8f41322da52ba47a1f66a1621c76f8b6c62a08d93429d19bc9a29238601b24b4d72d6522bbbb6490a4b1828ba2b754214d8224f7e3a54c16e8d32270
-
Filesize
48KB
MD55512a62bb078e6e8b4908951b79090f5
SHA176bee987a022872c88b96244e89a2a6b637b1c09
SHA256657888a3323013eb04837aee028799f82fba9247c11e4c9a3d572897a2b528b9
SHA51263f0603f8f41322da52ba47a1f66a1621c76f8b6c62a08d93429d19bc9a29238601b24b4d72d6522bbbb6490a4b1828ba2b754214d8224f7e3a54c16e8d32270
-
Filesize
48KB
MD55512a62bb078e6e8b4908951b79090f5
SHA176bee987a022872c88b96244e89a2a6b637b1c09
SHA256657888a3323013eb04837aee028799f82fba9247c11e4c9a3d572897a2b528b9
SHA51263f0603f8f41322da52ba47a1f66a1621c76f8b6c62a08d93429d19bc9a29238601b24b4d72d6522bbbb6490a4b1828ba2b754214d8224f7e3a54c16e8d32270
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
25KB
MD5a5361fd5f3b75216acb0e87432184b42
SHA15356d13c9f071a18a669d450de2334b698cac5a2
SHA2564a7c69595a4d62c6b24598aac05cf1e93fb521832faac0c49162ba68900ea8af
SHA512ef727b3113b297691bcac46a869fe04c8a7a00304ff9a86ecd66e205f0453fac8f3706afd8a99305043c00ae09de9dfe38810f261181df9f02a87ba9407e9601