Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 10:42 UTC

General

  • Target

    f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe

  • Size

    48KB

  • MD5

    7d8056785948284e8f6b89004886c936

  • SHA1

    fb954f84b2c0afffb5e788b04029563685054dee

  • SHA256

    f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521

  • SHA512

    dc11f4669102af7fa6f5b44ead415e12317d65d2847f806a1ffc92a3b5a626a0c74d2c49592b7259f56a0299748a8599e5ab6983b7dec335a04106d44312aa06

  • SSDEEP

    768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ChPC:Ub1MsHz3JDwhyWr+N95OTga6R

Malware Config

Signatures

  • RunningRat

    RunningRat is a remote access trojan first seen in 2018.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Creates a Windows Service
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe
    "C:\Users\Admin\AppData\Local\Temp\f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3224
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 1
        3⤵
        • Runs ping.exe
        PID:2968
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "SRDSL"
    1⤵
      PID:1960
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "SRDSL"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\SysWOW64\SRDSL.exe
        C:\Windows\system32\SRDSL.exe "c:\users\admin\appdata\local\temp\240597656.dll",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1996

    Network

    • flag-us
      DNS
      g.bing.com
      Remote address:
      8.8.8.8:53
      Request
      g.bing.com
      IN A
      Response
      g.bing.com
      IN CNAME
      g-bing-com.dual-a-0034.a-msedge.net
      g-bing-com.dual-a-0034.a-msedge.net
      IN CNAME
      dual-a-0034.a-msedge.net
      dual-a-0034.a-msedge.net
      IN A
      204.79.197.237
      dual-a-0034.a-msedge.net
      IN A
      13.107.21.237
    • flag-us
      GET
      https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6
      Remote address:
      204.79.197.237:443
      Request
      GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6 HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      set-cookie: MUID=269CD1431E1A6C262613C5DC1FFA6DE2; domain=.bing.com; expires=Thu, 10-Jul-2025 10:42:19 GMT; path=/; SameSite=None; Secure; Priority=High;
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 4E595AA0096B4853A4CB499B146572DC Ref B: LON04EDGE1112 Ref C: 2024-06-15T10:42:19Z
      date: Sat, 15 Jun 2024 10:42:18 GMT
    • flag-us
      GET
      https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6
      Remote address:
      204.79.197.237:443
      Request
      GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6 HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=269CD1431E1A6C262613C5DC1FFA6DE2; _EDGE_S=SID=1AE65957242F6CC4104A4DC825676D22
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      set-cookie: MSPTC=lTRsgrkbsXriVCkC-bv4yH9omgGEdXZU0oIYb2cUUA0; domain=.bing.com; expires=Thu, 10-Jul-2025 10:42:19 GMT; path=/; Partitioned; secure; SameSite=None
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 65FA18691A2C40F18842ED944C651709 Ref B: LON04EDGE1112 Ref C: 2024-06-15T10:42:19Z
      date: Sat, 15 Jun 2024 10:42:19 GMT
    • flag-nl
      GET
      https://www.bing.com/aes/c.gif?RG=23aabe4e42e448339d9170699b77b19c&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T200043Z&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321
      Remote address:
      23.62.61.97:443
      Request
      GET /aes/c.gif?RG=23aabe4e42e448339d9170699b77b19c&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T200043Z&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321 HTTP/2.0
      host: www.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=269CD1431E1A6C262613C5DC1FFA6DE2
      Response
      HTTP/2.0 200
      cache-control: private,no-store
      pragma: no-cache
      vary: Origin
      p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 05A42D0CF4754FABADC15CB05417A72C Ref B: BRU30EDGE0906 Ref C: 2024-06-15T10:42:19Z
      content-length: 0
      date: Sat, 15 Jun 2024 10:42:19 GMT
      set-cookie: _EDGE_S=SID=1AE65957242F6CC4104A4DC825676D22; path=/; httponly; domain=bing.com
      set-cookie: MUIDB=269CD1431E1A6C262613C5DC1FFA6DE2; path=/; httponly; expires=Thu, 10-Jul-2025 10:42:19 GMT
      alt-svc: h3=":443"; ma=93600
      x-cdn-traceid: 0.5d3d3e17.1718448139.1123150
    • flag-us
      DNS
      23.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      23.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      237.197.79.204.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      237.197.79.204.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.197.17.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.197.17.2.in-addr.arpa
      IN PTR
      Response
      240.197.17.2.in-addr.arpa
      IN PTR
      a2-17-197-240deploystaticakamaitechnologiescom
    • flag-us
      DNS
      26.35.223.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      26.35.223.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.61.62.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.61.62.23.in-addr.arpa
      IN PTR
      Response
      97.61.62.23.in-addr.arpa
      IN PTR
      a23-62-61-97deploystaticakamaitechnologiescom
    • flag-us
      DNS
      103.169.127.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      103.169.127.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      35.15.31.184.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      35.15.31.184.in-addr.arpa
      IN PTR
      Response
      35.15.31.184.in-addr.arpa
      IN PTR
      a184-31-15-35deploystaticakamaitechnologiescom
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      30.243.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      30.243.111.52.in-addr.arpa
      IN PTR
      Response
    • 204.79.197.237:443
      https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6
      tls, http2
      2.4kB
      9.0kB
      19
      17

      HTTP Request

      GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6

      HTTP Response

      204

      HTTP Request

      GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8wHbQtjI8bYbnib1LQh6vpDVUCUzvhb_1vK9wPixYMF2AQH7KB-KwF8zzvVFp7qw45C0Vt_MxYv1VIAdQGt7ESRLHr4dSBjp3CII-8Sf9N1-vj4CPcwtktxrKuXYdYUkNxuZkWhM9_QpD81GuprpwnuR-vrOUoKZnfrgy7SVwJD7OugUI%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZm9uZWRyaXZlLmxpdmUuY29tJTJmJTNmb2NpZCUzZGNtbTA3YjdkbnU0%26rlid%3D870260f9d04317db35c106917c8e1071&TIME=20240611T200043Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321&muid=C1FAC51E94ABDC02D5235673D6AE25E6

      HTTP Response

      204
    • 23.62.61.97:443
      https://www.bing.com/aes/c.gif?RG=23aabe4e42e448339d9170699b77b19c&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T200043Z&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321
      tls, http2
      1.4kB
      5.3kB
      16
      11

      HTTP Request

      GET https://www.bing.com/aes/c.gif?RG=23aabe4e42e448339d9170699b77b19c&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T200043Z&adUnitId=11730597&localId=w:C1FAC51E-94AB-DC02-D523-5673D6AE25E6&deviceId=6896198597095321

      HTTP Response

      200
    • 8.138.116.47:8989
      SRDSL.exe
      260 B
      5
    • 8.138.116.47:8989
      SRDSL.exe
      260 B
      5
    • 8.138.116.47:8989
      SRDSL.exe
      260 B
      5
    • 8.138.116.47:8989
      SRDSL.exe
      260 B
      5
    • 8.138.116.47:8989
      SRDSL.exe
      208 B
      4
    • 8.8.8.8:53
      g.bing.com
      dns
      56 B
      151 B
      1
      1

      DNS Request

      g.bing.com

      DNS Response

      204.79.197.237
      13.107.21.237

    • 8.8.8.8:53
      237.197.79.204.in-addr.arpa
      dns
      73 B
      143 B
      1
      1

      DNS Request

      237.197.79.204.in-addr.arpa

    • 8.8.8.8:53
      23.159.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      23.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      240.197.17.2.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      240.197.17.2.in-addr.arpa

    • 8.8.8.8:53
      26.35.223.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      26.35.223.20.in-addr.arpa

    • 8.8.8.8:53
      97.61.62.23.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      97.61.62.23.in-addr.arpa

    • 8.8.8.8:53
      103.169.127.40.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      103.169.127.40.in-addr.arpa

    • 8.8.8.8:53
      35.15.31.184.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      35.15.31.184.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      30.243.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      30.243.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\240597656.dll

      Filesize

      25KB

      MD5

      6a7114eb7f0ab9a6406ef61947aed405

      SHA1

      b9b73a30867a32d84dd4586330b451fca611c90d

      SHA256

      45a684f6b92724df6d38f9e71b65013ca7d1c588dd5d85df5039e50d70993ff7

      SHA512

      6437a6e046b0746cae987d5b7f291bb510db378cab9796ce98d799c221bdb48aa3382197507792cdc38babdf7875dd9134bd7167c3a6f2acc85e1c91534dc8b8

    • C:\Windows\SysWOW64\SRDSL.exe

      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.