Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
25/02/2021, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe
Resource
win7v20201028
General
-
Target
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe
-
Size
4.0MB
-
MD5
f454674192c23053843a3b493b3d0e7f
-
SHA1
8cb0d3e35a58ddadfca4dbd87b075058b542092f
-
SHA256
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c
-
SHA512
655040b6c3a7ad5a61a475db45c34520fdcc296e03b360427c495529a862edb8c74b2b4dcf4a3b590e679c42eab66bc976092d80318407ca4355a2322506336a
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00030000000130e6-28.dat acprotect behavioral1/files/0x00030000000130e7-29.dat acprotect -
resource yara_rule behavioral1/files/0x00030000000130e5-9.dat aspack_v212_v242 behavioral1/files/0x00030000000130e5-10.dat aspack_v212_v242 behavioral1/files/0x00030000000130e5-12.dat aspack_v212_v242 behavioral1/files/0x00030000000130e5-21.dat aspack_v212_v242 behavioral1/files/0x00030000000130e5-23.dat aspack_v212_v242 behavioral1/files/0x00030000000130e5-26.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-30.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-31.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-32.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-36.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-39.dat aspack_v212_v242 behavioral1/files/0x00030000000130e4-46.dat aspack_v212_v242 -
Executes dropped EXE 6 IoCs
pid Process 1924 rutserv.exe 1068 rutserv.exe 1580 rutserv.exe 1960 rfusclient.exe 804 rfusclient.exe 1508 rfusclient.exe -
resource yara_rule behavioral1/files/0x00030000000130e6-28.dat upx behavioral1/files/0x00030000000130e7-29.dat upx -
Loads dropped DLL 4 IoCs
pid Process 1436 cmd.exe 1436 cmd.exe 1580 rutserv.exe 1580 rutserv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vipcatalog attrib.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\bt.bat 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8decoder.dll 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File created C:\Windows\SysWOW64\vipcatalog\Uninstall.ini 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8encoder.dll 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\Uninstall.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\regedit.reg 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rfusclient.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rutserv.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1960 taskkill.exe 1496 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1624 regedit.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1924 rutserv.exe 1924 rutserv.exe 1924 rutserv.exe 1924 rutserv.exe 1068 rutserv.exe 1068 rutserv.exe 1580 rutserv.exe 1580 rutserv.exe 1580 rutserv.exe 1580 rutserv.exe 1960 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1508 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1924 rutserv.exe Token: SeDebugPrivilege 1068 rutserv.exe Token: SeTakeOwnershipPrivilege 1580 rutserv.exe Token: SeTcbPrivilege 1580 rutserv.exe Token: SeTcbPrivilege 1580 rutserv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1924 rutserv.exe 1068 rutserv.exe 1580 rutserv.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1436 1888 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 26 PID 1888 wrote to memory of 1436 1888 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 26 PID 1888 wrote to memory of 1436 1888 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 26 PID 1888 wrote to memory of 1436 1888 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 26 PID 1436 wrote to memory of 1960 1436 cmd.exe 28 PID 1436 wrote to memory of 1960 1436 cmd.exe 28 PID 1436 wrote to memory of 1960 1436 cmd.exe 28 PID 1436 wrote to memory of 1960 1436 cmd.exe 28 PID 1436 wrote to memory of 1496 1436 cmd.exe 34 PID 1436 wrote to memory of 1496 1436 cmd.exe 34 PID 1436 wrote to memory of 1496 1436 cmd.exe 34 PID 1436 wrote to memory of 1496 1436 cmd.exe 34 PID 1436 wrote to memory of 888 1436 cmd.exe 35 PID 1436 wrote to memory of 888 1436 cmd.exe 35 PID 1436 wrote to memory of 888 1436 cmd.exe 35 PID 1436 wrote to memory of 888 1436 cmd.exe 35 PID 1436 wrote to memory of 1000 1436 cmd.exe 36 PID 1436 wrote to memory of 1000 1436 cmd.exe 36 PID 1436 wrote to memory of 1000 1436 cmd.exe 36 PID 1436 wrote to memory of 1000 1436 cmd.exe 36 PID 1436 wrote to memory of 1924 1436 cmd.exe 37 PID 1436 wrote to memory of 1924 1436 cmd.exe 37 PID 1436 wrote to memory of 1924 1436 cmd.exe 37 PID 1436 wrote to memory of 1924 1436 cmd.exe 37 PID 1436 wrote to memory of 1624 1436 cmd.exe 38 PID 1436 wrote to memory of 1624 1436 cmd.exe 38 PID 1436 wrote to memory of 1624 1436 cmd.exe 38 PID 1436 wrote to memory of 1624 1436 cmd.exe 38 PID 1436 wrote to memory of 1068 1436 cmd.exe 39 PID 1436 wrote to memory of 1068 1436 cmd.exe 39 PID 1436 wrote to memory of 1068 1436 cmd.exe 39 PID 1436 wrote to memory of 1068 1436 cmd.exe 39 PID 1580 wrote to memory of 1960 1580 rutserv.exe 41 PID 1580 wrote to memory of 1960 1580 rutserv.exe 41 PID 1580 wrote to memory of 1960 1580 rutserv.exe 41 PID 1580 wrote to memory of 1960 1580 rutserv.exe 41 PID 1580 wrote to memory of 804 1580 rutserv.exe 42 PID 1580 wrote to memory of 804 1580 rutserv.exe 42 PID 1580 wrote to memory of 804 1580 rutserv.exe 42 PID 1580 wrote to memory of 804 1580 rutserv.exe 42 PID 1960 wrote to memory of 1508 1960 rfusclient.exe 43 PID 1960 wrote to memory of 1508 1960 rfusclient.exe 43 PID 1960 wrote to memory of 1508 1960 rfusclient.exe 43 PID 1960 wrote to memory of 1508 1960 rfusclient.exe 43 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe"C:\Users\Admin\AppData\Local\Temp\76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\System32\vipcatalog\bt.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:888
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\System32\vipcatalog"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1000
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s regedit.reg3⤵
- Runs .reg file with regedit
PID:1624
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exeC:\Windows\SysWOW64\vipcatalog\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1508
-
-
-
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:804
-