Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 21:14
Behavioral task
behavioral1
Sample
36f053514147667738bcfa6d3d48a910_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36f053514147667738bcfa6d3d48a910_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
36f053514147667738bcfa6d3d48a910_NEIKI.exe
-
Size
68KB
-
MD5
36f053514147667738bcfa6d3d48a910
-
SHA1
3924eb86882a70030ef22e9ac3e08dc01c181bb3
-
SHA256
bfb5b461d77189c56c95a3dc85d27ee4dfba10526be7d2295f7053dd83a9d206
-
SHA512
f58eceb42bcffb135322cc99277041982e89401e1798cf58df1548c7222eeffe896dfab1c949b8378fbe561fd354203aed56bd57b26fa02092db2cda880db6fe
-
SSDEEP
768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIDV:BHJaAoHoc2x7bZoYBAcQlwJdM7
Malware Config
Signatures
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 1 IoCs
resource yara_rule behavioral1/memory/2872-0-0x0000000010000000-0x000000001000F000-memory.dmp family_runningrat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Desktop Service\Parameters\ServiceDll = "C:\\Windows\\system32\\259399523.dll" 36f053514147667738bcfa6d3d48a910_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 Remote Desktop Service.exe -
Loads dropped DLL 7 IoCs
pid Process 2872 36f053514147667738bcfa6d3d48a910_NEIKI.exe 2124 svchost.exe 2124 svchost.exe 2512 Remote Desktop Service.exe 2512 Remote Desktop Service.exe 2512 Remote Desktop Service.exe 2512 Remote Desktop Service.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\259399523.dll 36f053514147667738bcfa6d3d48a910_NEIKI.exe File opened for modification C:\Windows\SysWOW64\ini.ini 36f053514147667738bcfa6d3d48a910_NEIKI.exe File created C:\Windows\SysWOW64\Remote Desktop Service.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Desktop Service.exe svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2512 2124 svchost.exe 30 PID 2124 wrote to memory of 2512 2124 svchost.exe 30 PID 2124 wrote to memory of 2512 2124 svchost.exe 30 PID 2124 wrote to memory of 2512 2124 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f053514147667738bcfa6d3d48a910_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\36f053514147667738bcfa6d3d48a910_NEIKI.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:2872
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Desktop Service"1⤵PID:3040
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Desktop Service"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Remote Desktop Service.exe"C:\Windows\system32\Remote Desktop Service.exe" "c:\windows\system32\259399523.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD563c34de15b5947ca8a499e63f5f9fc4e
SHA10719fe95a6f4979e44a571b5ba57a51406f535d2
SHA2563b6e89b8f85c465d288c0e74cb6dacedd4744167561acbd9ffc07a366a47fb7b
SHA5126235b9af1062c53416de62f7d95719ed348295ec3c0bc1f60e006e40704876f42b67eb4ef7100a91447eaf84eb1293dc1512bc5300c73f5e08ad6324e4eca146
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d