Analysis
-
max time kernel
160s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 17:36
Behavioral task
behavioral1
Sample
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe
-
Size
801KB
-
MD5
eb49928c6e5be7f6c2dcfe158df9dda8
-
SHA1
7334ef0afa8ecdf497716c1309a43406138155f1
-
SHA256
1db552b3054965e79fe9b4766d9daefb69a72fceb2e5a31186a9235c5fca7ad9
-
SHA512
72ddae4db2855f7da04698a1cd811edad985c5eaeade9d91f09aaac115390b4036b2621873f8a3b877ab717b9ee3c77f0359f2710a987db80e919b55b3ab0a8f
-
SSDEEP
12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9zl6MMNj:GnsJ39LyjbJkQFMhmC+6GD996
Malware Config
Signatures
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 12 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe family_runningrat behavioral2/memory/3088-51-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe family_runningrat C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe family_runningrat C:\ProgramData\Synaptics\Synaptics.exe family_runningrat C:\ProgramData\Synaptics\Synaptics.exe family_runningrat behavioral2/memory/3088-136-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat C:\ProgramData\Synaptics\Synaptics.exe family_runningrat C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe family_runningrat C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe family_runningrat behavioral2/memory/1340-206-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat behavioral2/memory/1340-229-0x0000000000400000-0x00000000004CE000-memory.dmp family_runningrat -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_Synaptics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\OERSDs\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\240660875.dll" ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\OERSDs\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\240661734.dll" ._cache_Synaptics.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Synaptics.exe._cache_Synaptics.exeNEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe -
Executes dropped EXE 4 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exeSynaptics.exe._cache_Synaptics.exeOERSDs.exepid process 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe 1340 Synaptics.exe 2108 ._cache_Synaptics.exe 3704 OERSDs.exe -
Loads dropped DLL 4 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exesvchost.exe._cache_Synaptics.exeOERSDs.exepid process 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe 1616 svchost.exe 2108 ._cache_Synaptics.exe 3704 OERSDs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe -
Creates a Windows Service
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\OERSDs.exe svchost.exe File opened for modification C:\Windows\SysWOW64\OERSDs.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
OERSDs.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OERSDs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OERSDs.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
OERSDs.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft OERSDs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie OERSDs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" OERSDs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum OERSDs.exe Key created \REGISTRY\USER\.DEFAULT\Software OERSDs.exe -
Modifies registry class 2 IoCs
Processes:
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_Synaptics.exepid process 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe 2108 ._cache_Synaptics.exe 2108 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_Synaptics.exedescription pid process Token: SeIncBasePriorityPrivilege 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Token: SeIncBasePriorityPrivilege 2108 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_Synaptics.exepid process 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe 2108 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.execmd.exeSynaptics.exe._cache_Synaptics.execmd.exesvchost.exedescription pid process target process PID 3088 wrote to memory of 2392 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe PID 3088 wrote to memory of 2392 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe PID 3088 wrote to memory of 2392 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe PID 3088 wrote to memory of 1340 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Synaptics.exe PID 3088 wrote to memory of 1340 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Synaptics.exe PID 3088 wrote to memory of 1340 3088 NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe Synaptics.exe PID 2392 wrote to memory of 5008 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe cmd.exe PID 2392 wrote to memory of 5008 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe cmd.exe PID 2392 wrote to memory of 5008 2392 ._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe cmd.exe PID 5008 wrote to memory of 4360 5008 cmd.exe PING.EXE PID 5008 wrote to memory of 4360 5008 cmd.exe PING.EXE PID 5008 wrote to memory of 4360 5008 cmd.exe PING.EXE PID 1340 wrote to memory of 2108 1340 Synaptics.exe ._cache_Synaptics.exe PID 1340 wrote to memory of 2108 1340 Synaptics.exe ._cache_Synaptics.exe PID 1340 wrote to memory of 2108 1340 Synaptics.exe ._cache_Synaptics.exe PID 2108 wrote to memory of 4524 2108 ._cache_Synaptics.exe cmd.exe PID 2108 wrote to memory of 4524 2108 ._cache_Synaptics.exe cmd.exe PID 2108 wrote to memory of 4524 2108 ._cache_Synaptics.exe cmd.exe PID 4524 wrote to memory of 1512 4524 cmd.exe PING.EXE PID 4524 wrote to memory of 1512 4524 cmd.exe PING.EXE PID 4524 wrote to memory of 1512 4524 cmd.exe PING.EXE PID 1616 wrote to memory of 3704 1616 svchost.exe OERSDs.exe PID 1616 wrote to memory of 3704 1616 svchost.exe OERSDs.exe PID 1616 wrote to memory of 3704 1616 svchost.exe OERSDs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe"C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe"2⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.eb49928c6e5be7f6c2dcfe158df9dda8.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 14⤵
- Runs ping.exe
PID:4360
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
PID:1512
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "OERSDs"1⤵PID:3156
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "OERSDs"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\OERSDs.exeC:\Windows\system32\OERSDs.exe "c:\users\admin\appdata\local\temp\240660875.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD5eb49928c6e5be7f6c2dcfe158df9dda8
SHA17334ef0afa8ecdf497716c1309a43406138155f1
SHA2561db552b3054965e79fe9b4766d9daefb69a72fceb2e5a31186a9235c5fca7ad9
SHA51272ddae4db2855f7da04698a1cd811edad985c5eaeade9d91f09aaac115390b4036b2621873f8a3b877ab717b9ee3c77f0359f2710a987db80e919b55b3ab0a8f
-
Filesize
801KB
MD5eb49928c6e5be7f6c2dcfe158df9dda8
SHA17334ef0afa8ecdf497716c1309a43406138155f1
SHA2561db552b3054965e79fe9b4766d9daefb69a72fceb2e5a31186a9235c5fca7ad9
SHA51272ddae4db2855f7da04698a1cd811edad985c5eaeade9d91f09aaac115390b4036b2621873f8a3b877ab717b9ee3c77f0359f2710a987db80e919b55b3ab0a8f
-
Filesize
801KB
MD5eb49928c6e5be7f6c2dcfe158df9dda8
SHA17334ef0afa8ecdf497716c1309a43406138155f1
SHA2561db552b3054965e79fe9b4766d9daefb69a72fceb2e5a31186a9235c5fca7ad9
SHA51272ddae4db2855f7da04698a1cd811edad985c5eaeade9d91f09aaac115390b4036b2621873f8a3b877ab717b9ee3c77f0359f2710a987db80e919b55b3ab0a8f
-
Filesize
48KB
MD5baaa08a9723edf38c38fca9f245e06d3
SHA1bd8c6db41444c29b5380ce8e819cad0cff1b87a6
SHA256bbc91d159de0dcc389c6005ca1be5e776593800ed8aec81cadffce9d9e5e4797
SHA5120d2d57b7d0400d6e34ec35f11872a8a6b57085485a0a4de253ee13a570b6805905d026e4d1f248d98e62c1dc1217548f8bb9bfc1c923ceb2b50cacd743d02d55
-
Filesize
48KB
MD5baaa08a9723edf38c38fca9f245e06d3
SHA1bd8c6db41444c29b5380ce8e819cad0cff1b87a6
SHA256bbc91d159de0dcc389c6005ca1be5e776593800ed8aec81cadffce9d9e5e4797
SHA5120d2d57b7d0400d6e34ec35f11872a8a6b57085485a0a4de253ee13a570b6805905d026e4d1f248d98e62c1dc1217548f8bb9bfc1c923ceb2b50cacd743d02d55
-
Filesize
48KB
MD5baaa08a9723edf38c38fca9f245e06d3
SHA1bd8c6db41444c29b5380ce8e819cad0cff1b87a6
SHA256bbc91d159de0dcc389c6005ca1be5e776593800ed8aec81cadffce9d9e5e4797
SHA5120d2d57b7d0400d6e34ec35f11872a8a6b57085485a0a4de253ee13a570b6805905d026e4d1f248d98e62c1dc1217548f8bb9bfc1c923ceb2b50cacd743d02d55
-
Filesize
48KB
MD5baaa08a9723edf38c38fca9f245e06d3
SHA1bd8c6db41444c29b5380ce8e819cad0cff1b87a6
SHA256bbc91d159de0dcc389c6005ca1be5e776593800ed8aec81cadffce9d9e5e4797
SHA5120d2d57b7d0400d6e34ec35f11872a8a6b57085485a0a4de253ee13a570b6805905d026e4d1f248d98e62c1dc1217548f8bb9bfc1c923ceb2b50cacd743d02d55
-
Filesize
48KB
MD5baaa08a9723edf38c38fca9f245e06d3
SHA1bd8c6db41444c29b5380ce8e819cad0cff1b87a6
SHA256bbc91d159de0dcc389c6005ca1be5e776593800ed8aec81cadffce9d9e5e4797
SHA5120d2d57b7d0400d6e34ec35f11872a8a6b57085485a0a4de253ee13a570b6805905d026e4d1f248d98e62c1dc1217548f8bb9bfc1c923ceb2b50cacd743d02d55
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
25KB
MD5e454c59b2616686f92b20d733ab0db1f
SHA1af744f4d209466878b045f879e2e6d2e85624839
SHA25601b0d61c344961370ad3aee1bcc75f22f6eaa9c0cd7735fd1b2ea6610eeb5fbc
SHA512b733efd33dc05c4a36d37c4e0f69e2a7c89f75b2b1e0e9127af6977698ea76c0818423d2fb6eed2ee8be6c8ca00a4b6fa3ed25ce3d99f88d796a798d80699d95