Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 07:42

General

  • Target

    b10884a495070c2f9ee183bbbb6d1b8f7351fc75d094f4bb212c38c859a6e867.exe

  • Size

    68KB

  • MD5

    04485ee0f0313f990255aa4a06546abb

  • SHA1

    fa87b9a7b914c11fb75b775e391a3ad46d4eb432

  • SHA256

    b10884a495070c2f9ee183bbbb6d1b8f7351fc75d094f4bb212c38c859a6e867

  • SHA512

    d95011d0bbae4c63ab0acf26568d0759990f26ed87dbc60ed01fdb840477519adb931feff6a6029c0b32d4ba4623ef2951ca260fcfabc609b364f51f775f024b

  • SSDEEP

    768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMI4V:BHJaAoHoc2x7bZoYBAcQlwJdME

Malware Config

Extracted

Family

runningrat

Signatures

  • RunningRat

    RunningRat is a remote access trojan first seen in 2018.

  • RunningRat payload 1 IoCs
  • Runningrat family
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b10884a495070c2f9ee183bbbb6d1b8f7351fc75d094f4bb212c38c859a6e867.exe
    "C:\Users\Admin\AppData\Local\Temp\b10884a495070c2f9ee183bbbb6d1b8f7351fc75d094f4bb212c38c859a6e867.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1324
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "NETSYSDDL"
    1⤵
      PID:4388
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "NETSYSDDL"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SysWOW64\NETSYSDDL.exe
        C:\Windows\system32\NETSYSDDL.exe "c:\windows\system32\240646343.dll",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        PID:212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\240646343.dll

      Filesize

      37KB

      MD5

      1460638dc7159098d3a1a40631e79861

      SHA1

      527e958815e7873144d17fea5a1fbf5a2074847e

      SHA256

      bb4c52813ac3717a7deab472ff05c135f6ad2d218bee82dfd282b3505f5b3489

      SHA512

      f306c91a37fa911c43d1acf1b9187a511cb4a28d70b5d11cef0f4e51e8c19190ae3f09b2df0917efbcca40cddcbabf7aac7bd2f01bf1cccf6bad52aaa44e68d1

    • C:\Windows\SysWOW64\NETSYSDDL.exe

      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

    • C:\Windows\SysWOW64\ini.ini

      Filesize

      44B

      MD5

      4f9d2c1dd3e6c1d777b35ac36621b1a1

      SHA1

      05c4a3fd377bb404b9c61265875d7b74e3ad0b2f

      SHA256

      b4f2768f7328b866b136a018c441936f858b06bd0b744651adc18827a3f60d03

      SHA512

      ebc25c9d17bd08b3194df44cd3fe610d717d3b5ecbfe147cd4f68d5e7178bf91e2721ae8ef80838c1fa7f56819ca784e00e12a04298891265f691e141e2b1ee4

    • memory/1324-0-0x0000000010000000-0x000000001000F000-memory.dmp

      Filesize

      60KB

    • memory/1324-8-0x0000000002220000-0x000000000222D000-memory.dmp

      Filesize

      52KB