Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22/06/2021, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
rutserv.exe
Resource
win7v20210408
0 signatures
0 seconds
General
-
Target
rutserv.exe
-
Size
6.2MB
-
MD5
90e027b39d2786d5b465a9dc53bf040e
-
SHA1
5a9d6b1fcdaf4b2818a6eeca4f1c16a5c24dd9cf
-
SHA256
99de2f7653107a227a79993aeb03b1bb443b66376c49ec590cf3a91d6cf184c8
-
SHA512
097264ae7a20e90aaacda0546082c466aa90922c9242044cdb08d81953022164cda439c7fa9cbd989f73beafbd4d58b54fc1db6afa66f8ad4d446d06c17fc779
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 728 created 3956 728 svchost.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rutserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rutserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rutserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rutserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rutserv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3956 rutserv.exe 3956 rutserv.exe 3956 rutserv.exe 3956 rutserv.exe 1176 rutserv.exe 1176 rutserv.exe 3848 rutserv.exe 3848 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3956 rutserv.exe Token: SeTcbPrivilege 728 svchost.exe Token: SeTcbPrivilege 728 svchost.exe Token: SeTakeOwnershipPrivilege 1176 rutserv.exe Token: SeTcbPrivilege 1176 rutserv.exe Token: SeTcbPrivilege 1176 rutserv.exe Token: SeTakeOwnershipPrivilege 3848 rutserv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3956 rutserv.exe 1176 rutserv.exe 3848 rutserv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 728 wrote to memory of 1176 728 svchost.exe 75 PID 728 wrote to memory of 1176 728 svchost.exe 75 PID 728 wrote to memory of 1176 728 svchost.exe 75 PID 1176 wrote to memory of 3848 1176 rutserv.exe 81 PID 1176 wrote to memory of 3848 1176 rutserv.exe 81 PID 1176 wrote to memory of 3848 1176 rutserv.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\rutserv.exeC:\Users\Admin\AppData\Local\Temp\rutserv.exe -second2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe" /config /user3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3848
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:728