Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11/12/2020, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
agent.bin.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
agent.bin.exe
-
Size
10.9MB
-
MD5
921f0eb14ea4bb8ec85c307da29a66cd
-
SHA1
35b61e6d895627a10015dcd4c0d03c4423a02d0d
-
SHA256
3d0862aa6676aa428e26e0b1c813c090c410b759fa7e9cdf8b0eb9d313d3618c
-
SHA512
9125f936b12fc3c30be7a33a4d61bde1267f89bd8adee977664759bb410987c0055131187603e5007faaf80ffdd7cd79b46878471eb71fb73a13db81657660d7
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1748 rfusclient.exe 296 rutserv.exe 1128 rutserv.exe 1084 rfusclient.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 2024 agent.bin.exe 1748 rfusclient.exe 1748 rfusclient.exe 1748 rfusclient.exe 1748 rfusclient.exe 296 rutserv.exe 296 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral1/files/0x00030000000130ea-12.dat js behavioral1/files/0x00030000000130ea-13.dat js behavioral1/files/0x00030000000130ea-26.dat js -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 296 rutserv.exe Token: SeTakeOwnershipPrivilege 1128 rutserv.exe Token: SeTcbPrivilege 1128 rutserv.exe Token: SeTcbPrivilege 1128 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1084 rfusclient.exe 1084 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1084 rfusclient.exe 1084 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 296 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe 1128 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1748 2024 agent.bin.exe 27 PID 2024 wrote to memory of 1748 2024 agent.bin.exe 27 PID 2024 wrote to memory of 1748 2024 agent.bin.exe 27 PID 2024 wrote to memory of 1748 2024 agent.bin.exe 27 PID 1748 wrote to memory of 296 1748 rfusclient.exe 28 PID 1748 wrote to memory of 296 1748 rfusclient.exe 28 PID 1748 wrote to memory of 296 1748 rfusclient.exe 28 PID 1748 wrote to memory of 296 1748 rfusclient.exe 28 PID 1128 wrote to memory of 1084 1128 rutserv.exe 32 PID 1128 wrote to memory of 1084 1128 rutserv.exe 32 PID 1128 wrote to memory of 1084 1128 rutserv.exe 32 PID 1128 wrote to memory of 1084 1128 rutserv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\agent.bin.exe"C:\Users\Admin\AppData\Local\Temp\agent.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rutserv.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rutserv.exe" -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\7FBFFEC308\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1084
-
-
-
-