Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    23-06-2021 23:02

General

  • Target

    AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe

  • Size

    6.5MB

  • MD5

    2ad5fadef0fb042d289ae31f95422b01

  • SHA1

    a6785f060e178c97b67c1b270af402ef3af549ee

  • SHA256

    ac525ea998dae61bdbf7bca8b942867a0fc05cb2a01e5fb0f714991c3bea51fa

  • SHA512

    ba7ff8fd11d0807e2029482e1542225b33d6511fdd710bd87a01f6b9488b1dba17342c65195a3abbc3dfb45275494818e9d89ae13b85c65f9a1f7678759c0844

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 6 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe
    "C:\Users\Admin\AppData\Local\Temp\AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows\System64\install.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -a -s -h "C:\Windows\System64\install.bat" /S /D
        3⤵
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:1760
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:560
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:852
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1016
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:540
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
        3⤵
          PID:1784
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKLM\SYSTEM\System Corporation Update" /f
          3⤵
            PID:432
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s "regedit.reg"
            3⤵
            • Runs .reg file with regedit
            PID:512
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            3⤵
            • Delays execution with timeout.exe
            PID:1592
          • C:\Windows\System64\rutserv.exe
            rutserv.exe /silentinstall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1616
          • C:\Windows\System64\rutserv.exe
            rutserv.exe /firewall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:1760
          • C:\Windows\System64\rutserv.exe
            rutserv.exe /start
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1744
      • C:\Windows\System64\rutserv.exe
        C:\Windows\System64\rutserv.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\System64\rfusclient.exe
          C:\Windows\System64\rfusclient.exe /tray
          2⤵
          • Executes dropped EXE
          PID:1652
        • C:\Windows\System64\rfusclient.exe
          C:\Windows\System64\rfusclient.exe
          2⤵
          • Executes dropped EXE
          PID:544

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Hidden Files and Directories

      1
      T1158

      Defense Evasion

      Hidden Files and Directories

      1
      T1158

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\System64\install.bat
        MD5

        8dc5992eaab9776cdc9b0097c496fd0e

        SHA1

        e240e584d5d54e580078626dce145b22576f3f26

        SHA256

        5e85064c53edc3f877c4dcf31b5eca143ada879161070dec4f618c90d3167737

        SHA512

        5985d65cb24f0d285782fa6c6b6eba87fab4f4094bdb577a61fb52a01e67f3bbe05b1553a4dbd5ca9e49a44b6b55c3c3e6ff72a6b26ff7a72fbe65739b64c58c

      • C:\Windows\System64\regedit.reg
        MD5

        c3e1ae3e5d9141ca80a8451ea3ec15d4

        SHA1

        454e3bbc3e970e0a5d9824dbba039eea82375402

        SHA256

        3379bac5475a048c38908f671813e67854e4fd8807adc612cd52b1d8ad5c30d2

        SHA512

        3a064732cceaa95db057bce01cecd75c9d42cf0e659c8da99f1fd649af78f8ed826853ccc7aee81929caa9ccf5a92e2b73ea6ffe0a201a44834b7e1a5237d1cc

      • C:\Windows\System64\rfusclient.exe
        MD5

        36a83be43ba5be7c718d59afd372f909

        SHA1

        a57510a3bb6a8ca6a8842d12230e090e304ce2f9

        SHA256

        ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb

        SHA512

        58936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61

      • C:\Windows\System64\rfusclient.exe
        MD5

        36a83be43ba5be7c718d59afd372f909

        SHA1

        a57510a3bb6a8ca6a8842d12230e090e304ce2f9

        SHA256

        ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb

        SHA512

        58936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61

      • C:\Windows\System64\rfusclient.exe
        MD5

        36a83be43ba5be7c718d59afd372f909

        SHA1

        a57510a3bb6a8ca6a8842d12230e090e304ce2f9

        SHA256

        ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb

        SHA512

        58936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61

      • C:\Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • C:\Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • C:\Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • C:\Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • C:\Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • C:\Windows\System64\vp8decoder.dll
        MD5

        d43fa82fab5337ce20ad14650085c5d9

        SHA1

        678aa092075ff65b6815ffc2d8fdc23af8425981

        SHA256

        c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b

        SHA512

        103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d

      • C:\Windows\System64\vp8encoder.dll
        MD5

        dab4646806dfca6d0e0b4d80fa9209d6

        SHA1

        8244dfe22ec2090eee89dad103e6b2002059d16a

        SHA256

        cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587

        SHA512

        aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7

      • \Windows\System64\rfusclient.exe
        MD5

        36a83be43ba5be7c718d59afd372f909

        SHA1

        a57510a3bb6a8ca6a8842d12230e090e304ce2f9

        SHA256

        ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb

        SHA512

        58936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61

      • \Windows\System64\rfusclient.exe
        MD5

        36a83be43ba5be7c718d59afd372f909

        SHA1

        a57510a3bb6a8ca6a8842d12230e090e304ce2f9

        SHA256

        ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb

        SHA512

        58936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61

      • \Windows\System64\rutserv.exe
        MD5

        8f6e38cc55206473121c8bf63fcbcf2d

        SHA1

        35504ce4bc1cea9e737a3be108cd428ab2251e1d

        SHA256

        fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57

        SHA512

        083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9

      • memory/432-72-0x0000000000000000-mapping.dmp
      • memory/452-60-0x00000000753E1000-0x00000000753E3000-memory.dmp
        Filesize

        8KB

      • memory/452-65-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/512-73-0x0000000000000000-mapping.dmp
      • memory/540-70-0x0000000000000000-mapping.dmp
      • memory/544-98-0x0000000000000000-mapping.dmp
      • memory/560-66-0x0000000000000000-mapping.dmp
      • memory/852-68-0x0000000000000000-mapping.dmp
      • memory/1016-69-0x0000000000000000-mapping.dmp
      • memory/1052-64-0x0000000000000000-mapping.dmp
      • memory/1496-61-0x0000000000000000-mapping.dmp
      • memory/1536-67-0x0000000000000000-mapping.dmp
      • memory/1592-76-0x0000000000000000-mapping.dmp
      • memory/1616-79-0x0000000000000000-mapping.dmp
      • memory/1616-90-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1652-100-0x0000000000000000-mapping.dmp
      • memory/1652-105-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1744-92-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1744-85-0x0000000000000000-mapping.dmp
      • memory/1760-91-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1760-82-0x0000000000000000-mapping.dmp
      • memory/1760-63-0x0000000000000000-mapping.dmp
      • memory/1784-71-0x0000000000000000-mapping.dmp
      • memory/2044-93-0x0000000000300000-0x0000000000301000-memory.dmp
        Filesize

        4KB