Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-06-2021 23:02
Static task
static1
Behavioral task
behavioral1
Sample
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe
Resource
win10v20210408
General
-
Target
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe
-
Size
6.5MB
-
MD5
2ad5fadef0fb042d289ae31f95422b01
-
SHA1
a6785f060e178c97b67c1b270af402ef3af549ee
-
SHA256
ac525ea998dae61bdbf7bca8b942867a0fc05cb2a01e5fb0f714991c3bea51fa
-
SHA512
ba7ff8fd11d0807e2029482e1542225b33d6511fdd710bd87a01f6b9488b1dba17342c65195a3abbc3dfb45275494818e9d89ae13b85c65f9a1f7678759c0844
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
rutserv.exerutserv.exerutserv.exerutserv.exerfusclient.exerfusclient.exepid process 1616 rutserv.exe 1760 rutserv.exe 1744 rutserv.exe 2044 rutserv.exe 544 rfusclient.exe 1652 rfusclient.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exerutserv.exepid process 1496 cmd.exe 2044 rutserv.exe 2044 rutserv.exe -
Drops file in Windows directory 7 IoCs
Processes:
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exeattrib.exedescription ioc process File created C:\Windows\System64\vp8decoder.dll AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe File created C:\Windows\System64\regedit.reg AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe File created C:\Windows\System64\install.bat AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe File opened for modification C:\Windows\System64\install.bat attrib.exe File created C:\Windows\System64\rfusclient.exe AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe File created C:\Windows\System64\rutserv.exe AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe File created C:\Windows\System64\vp8encoder.dll AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1592 timeout.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1536 taskkill.exe 852 taskkill.exe 1016 taskkill.exe 540 taskkill.exe 1052 taskkill.exe 560 taskkill.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 512 regedit.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rutserv.exerutserv.exerutserv.exerutserv.exepid process 1616 rutserv.exe 1616 rutserv.exe 1616 rutserv.exe 1616 rutserv.exe 1760 rutserv.exe 1760 rutserv.exe 1744 rutserv.exe 1744 rutserv.exe 2044 rutserv.exe 2044 rutserv.exe 2044 rutserv.exe 2044 rutserv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exepid process 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exerutserv.exerutserv.exerutserv.exedescription pid process Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 560 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 852 taskkill.exe Token: SeDebugPrivilege 1016 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 1616 rutserv.exe Token: SeDebugPrivilege 1744 rutserv.exe Token: SeTakeOwnershipPrivilege 2044 rutserv.exe Token: SeTcbPrivilege 2044 rutserv.exe Token: SeTcbPrivilege 2044 rutserv.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exerutserv.exerutserv.exerutserv.exerutserv.exepid process 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe 1616 rutserv.exe 1760 rutserv.exe 1744 rutserv.exe 2044 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.execmd.exerutserv.exedescription pid process target process PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 452 wrote to memory of 1496 452 AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe cmd.exe PID 1496 wrote to memory of 1760 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 1760 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 1760 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 1760 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 1052 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1052 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1052 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1052 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 560 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 560 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 560 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 560 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1536 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1536 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1536 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1536 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 852 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 852 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 852 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 852 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1016 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1016 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1016 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1016 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 540 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 540 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 540 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 540 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 1784 1496 cmd.exe reg.exe PID 1496 wrote to memory of 1784 1496 cmd.exe reg.exe PID 1496 wrote to memory of 1784 1496 cmd.exe reg.exe PID 1496 wrote to memory of 1784 1496 cmd.exe reg.exe PID 1496 wrote to memory of 432 1496 cmd.exe reg.exe PID 1496 wrote to memory of 432 1496 cmd.exe reg.exe PID 1496 wrote to memory of 432 1496 cmd.exe reg.exe PID 1496 wrote to memory of 432 1496 cmd.exe reg.exe PID 1496 wrote to memory of 512 1496 cmd.exe regedit.exe PID 1496 wrote to memory of 512 1496 cmd.exe regedit.exe PID 1496 wrote to memory of 512 1496 cmd.exe regedit.exe PID 1496 wrote to memory of 512 1496 cmd.exe regedit.exe PID 1496 wrote to memory of 1592 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 1592 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 1592 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 1592 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 1616 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1616 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1616 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1616 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1760 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1760 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1760 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1760 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1744 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1744 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1744 1496 cmd.exe rutserv.exe PID 1496 wrote to memory of 1744 1496 cmd.exe rutserv.exe PID 2044 wrote to memory of 544 2044 rutserv.exe rfusclient.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe"C:\Users\Admin\AppData\Local\Temp\AC525EA998DAE61BDBF7BCA8B942867A0FC05CB2A01E5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\System64\install.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -r -a -s -h "C:\Windows\System64\install.bat" /S /D3⤵
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\System Corporation Update" /f3⤵
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"3⤵
- Runs .reg file with regedit
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
-
C:\Windows\System64\rutserv.exerutserv.exe /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System64\rutserv.exerutserv.exe /firewall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System64\rutserv.exerutserv.exe /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System64\rutserv.exeC:\Windows\System64\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System64\rfusclient.exeC:\Windows\System64\rfusclient.exe /tray2⤵
- Executes dropped EXE
-
C:\Windows\System64\rfusclient.exeC:\Windows\System64\rfusclient.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System64\install.batMD5
8dc5992eaab9776cdc9b0097c496fd0e
SHA1e240e584d5d54e580078626dce145b22576f3f26
SHA2565e85064c53edc3f877c4dcf31b5eca143ada879161070dec4f618c90d3167737
SHA5125985d65cb24f0d285782fa6c6b6eba87fab4f4094bdb577a61fb52a01e67f3bbe05b1553a4dbd5ca9e49a44b6b55c3c3e6ff72a6b26ff7a72fbe65739b64c58c
-
C:\Windows\System64\regedit.regMD5
c3e1ae3e5d9141ca80a8451ea3ec15d4
SHA1454e3bbc3e970e0a5d9824dbba039eea82375402
SHA2563379bac5475a048c38908f671813e67854e4fd8807adc612cd52b1d8ad5c30d2
SHA5123a064732cceaa95db057bce01cecd75c9d42cf0e659c8da99f1fd649af78f8ed826853ccc7aee81929caa9ccf5a92e2b73ea6ffe0a201a44834b7e1a5237d1cc
-
C:\Windows\System64\rfusclient.exeMD5
36a83be43ba5be7c718d59afd372f909
SHA1a57510a3bb6a8ca6a8842d12230e090e304ce2f9
SHA256ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb
SHA51258936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61
-
C:\Windows\System64\rfusclient.exeMD5
36a83be43ba5be7c718d59afd372f909
SHA1a57510a3bb6a8ca6a8842d12230e090e304ce2f9
SHA256ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb
SHA51258936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61
-
C:\Windows\System64\rfusclient.exeMD5
36a83be43ba5be7c718d59afd372f909
SHA1a57510a3bb6a8ca6a8842d12230e090e304ce2f9
SHA256ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb
SHA51258936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61
-
C:\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
C:\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
C:\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
C:\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
C:\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
C:\Windows\System64\vp8decoder.dllMD5
d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
C:\Windows\System64\vp8encoder.dllMD5
dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
\Windows\System64\rfusclient.exeMD5
36a83be43ba5be7c718d59afd372f909
SHA1a57510a3bb6a8ca6a8842d12230e090e304ce2f9
SHA256ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb
SHA51258936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61
-
\Windows\System64\rfusclient.exeMD5
36a83be43ba5be7c718d59afd372f909
SHA1a57510a3bb6a8ca6a8842d12230e090e304ce2f9
SHA256ef61278f0da1c711b306b4146c74d6a34fa7305bff17c5bf06f0d03d0d3e50fb
SHA51258936b68134b56a5a25f7f1ce83fc5e7833ccffdccefb217eb3445fffec6cd3205356ad788a8387bfb8373f59dce0aab14a4fc8ec29efc7d8d744f611565ed61
-
\Windows\System64\rutserv.exeMD5
8f6e38cc55206473121c8bf63fcbcf2d
SHA135504ce4bc1cea9e737a3be108cd428ab2251e1d
SHA256fa1d176073d43c82ffe25b20401efddb018317cdd468d160d90c950641cdad57
SHA512083e795d1668277428d5fa89fcc136a13f411483457403fdbba0df557b45360ea24d5ac7b45ae74b10f01adde22ad8ac2563d9c088f42c14b61e85a664815ab9
-
memory/432-72-0x0000000000000000-mapping.dmp
-
memory/452-60-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB
-
memory/452-65-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/512-73-0x0000000000000000-mapping.dmp
-
memory/540-70-0x0000000000000000-mapping.dmp
-
memory/544-98-0x0000000000000000-mapping.dmp
-
memory/560-66-0x0000000000000000-mapping.dmp
-
memory/852-68-0x0000000000000000-mapping.dmp
-
memory/1016-69-0x0000000000000000-mapping.dmp
-
memory/1052-64-0x0000000000000000-mapping.dmp
-
memory/1496-61-0x0000000000000000-mapping.dmp
-
memory/1536-67-0x0000000000000000-mapping.dmp
-
memory/1592-76-0x0000000000000000-mapping.dmp
-
memory/1616-79-0x0000000000000000-mapping.dmp
-
memory/1616-90-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1652-100-0x0000000000000000-mapping.dmp
-
memory/1652-105-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1744-92-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1744-85-0x0000000000000000-mapping.dmp
-
memory/1760-91-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1760-82-0x0000000000000000-mapping.dmp
-
memory/1760-63-0x0000000000000000-mapping.dmp
-
memory/1784-71-0x0000000000000000-mapping.dmp
-
memory/2044-93-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB