Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25/02/2021, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe
Resource
win7v20201028
General
-
Target
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe
-
Size
4.0MB
-
MD5
f454674192c23053843a3b493b3d0e7f
-
SHA1
8cb0d3e35a58ddadfca4dbd87b075058b542092f
-
SHA256
76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c
-
SHA512
655040b6c3a7ad5a61a475db45c34520fdcc296e03b360427c495529a862edb8c74b2b4dcf4a3b590e679c42eab66bc976092d80318407ca4355a2322506336a
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000100000001ab99-22.dat acprotect behavioral2/files/0x000100000001ab9a-23.dat acprotect -
resource yara_rule behavioral2/files/0x000100000001ab98-9.dat aspack_v212_v242 behavioral2/files/0x000100000001ab98-10.dat aspack_v212_v242 behavioral2/files/0x000100000001ab98-18.dat aspack_v212_v242 behavioral2/files/0x000100000001ab98-19.dat aspack_v212_v242 behavioral2/files/0x000100000001ab97-24.dat aspack_v212_v242 behavioral2/files/0x000100000001ab97-28.dat aspack_v212_v242 behavioral2/files/0x000100000001ab97-29.dat aspack_v212_v242 behavioral2/files/0x000100000001ab97-35.dat aspack_v212_v242 -
Executes dropped EXE 6 IoCs
pid Process 3244 rutserv.exe 4084 rutserv.exe 1336 rutserv.exe 2136 rfusclient.exe 2032 rfusclient.exe 3796 rfusclient.exe -
resource yara_rule behavioral2/files/0x000100000001ab99-22.dat upx behavioral2/files/0x000100000001ab9a-23.dat upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8decoder.dll 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\Uninstall.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog attrib.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rfusclient.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\regedit.reg 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rutserv.exe 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8encoder.dll 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File created C:\Windows\SysWOW64\vipcatalog\Uninstall.ini 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\bt.bat 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 3168 taskkill.exe 2968 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 412 regedit.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3244 rutserv.exe 3244 rutserv.exe 3244 rutserv.exe 3244 rutserv.exe 3244 rutserv.exe 3244 rutserv.exe 4084 rutserv.exe 4084 rutserv.exe 1336 rutserv.exe 1336 rutserv.exe 1336 rutserv.exe 1336 rutserv.exe 1336 rutserv.exe 1336 rutserv.exe 2136 rfusclient.exe 2136 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 3796 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3168 taskkill.exe Token: SeDebugPrivilege 2968 taskkill.exe Token: SeDebugPrivilege 3244 rutserv.exe Token: SeDebugPrivilege 4084 rutserv.exe Token: SeTakeOwnershipPrivilege 1336 rutserv.exe Token: SeTcbPrivilege 1336 rutserv.exe Token: SeTcbPrivilege 1336 rutserv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3244 rutserv.exe 4084 rutserv.exe 1336 rutserv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 496 wrote to memory of 3364 496 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 75 PID 496 wrote to memory of 3364 496 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 75 PID 496 wrote to memory of 3364 496 76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe 75 PID 3364 wrote to memory of 3168 3364 cmd.exe 77 PID 3364 wrote to memory of 3168 3364 cmd.exe 77 PID 3364 wrote to memory of 3168 3364 cmd.exe 77 PID 3364 wrote to memory of 2968 3364 cmd.exe 78 PID 3364 wrote to memory of 2968 3364 cmd.exe 78 PID 3364 wrote to memory of 2968 3364 cmd.exe 78 PID 3364 wrote to memory of 212 3364 cmd.exe 79 PID 3364 wrote to memory of 212 3364 cmd.exe 79 PID 3364 wrote to memory of 212 3364 cmd.exe 79 PID 3364 wrote to memory of 196 3364 cmd.exe 80 PID 3364 wrote to memory of 196 3364 cmd.exe 80 PID 3364 wrote to memory of 196 3364 cmd.exe 80 PID 3364 wrote to memory of 3244 3364 cmd.exe 81 PID 3364 wrote to memory of 3244 3364 cmd.exe 81 PID 3364 wrote to memory of 3244 3364 cmd.exe 81 PID 3364 wrote to memory of 412 3364 cmd.exe 82 PID 3364 wrote to memory of 412 3364 cmd.exe 82 PID 3364 wrote to memory of 412 3364 cmd.exe 82 PID 3364 wrote to memory of 4084 3364 cmd.exe 83 PID 3364 wrote to memory of 4084 3364 cmd.exe 83 PID 3364 wrote to memory of 4084 3364 cmd.exe 83 PID 1336 wrote to memory of 2136 1336 rutserv.exe 86 PID 1336 wrote to memory of 2136 1336 rutserv.exe 86 PID 1336 wrote to memory of 2136 1336 rutserv.exe 86 PID 1336 wrote to memory of 2032 1336 rutserv.exe 85 PID 1336 wrote to memory of 2032 1336 rutserv.exe 85 PID 1336 wrote to memory of 2032 1336 rutserv.exe 85 PID 2136 wrote to memory of 3796 2136 rfusclient.exe 90 PID 2136 wrote to memory of 3796 2136 rfusclient.exe 90 PID 2136 wrote to memory of 3796 2136 rfusclient.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 196 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe"C:\Users\Admin\AppData\Local\Temp\76de9f8d6f0fcf8c5fb2bafc387c363e138af15cf751d2c2a230ad9cafd6271c.bin.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\vipcatalog\bt.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:212
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\System32\vipcatalog"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:196
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3244
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s regedit.reg3⤵
- Runs .reg file with regedit
PID:412
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exeC:\Windows\SysWOW64\vipcatalog\rutserv.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:2032
-
-
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:3796
-
-