Analysis
-
max time kernel
147s -
max time network
181s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15/07/2021, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
b56b445af056b621aeed9626cad47d42.exe
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
b56b445af056b621aeed9626cad47d42.exe
-
Size
11.0MB
-
MD5
b56b445af056b621aeed9626cad47d42
-
SHA1
9ba5c968ff30ffdbd23fc589ea42f4659c532bc3
-
SHA256
d101d0dd2bce548291c5d839fd4b047a2e1739ebef3725d2e2923fd44564a41b
-
SHA512
87c21adea1dfc96968c5b687136465db0a632cb6a3d6bf272f7a440ddcbdea5eddf4e61ccfea858d2935d21bc3c725f157772c1ab7a236256980c795daa53633
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1196 rfusclient.exe 592 rutserv.exe 640 rutserv.exe 1720 rfusclient.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 1816 b56b445af056b621aeed9626cad47d42.exe 1196 rfusclient.exe 1196 rfusclient.exe 1196 rfusclient.exe 1196 rfusclient.exe 592 rutserv.exe 592 rutserv.exe 640 rutserv.exe 640 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 592 rutserv.exe Token: SeTakeOwnershipPrivilege 640 rutserv.exe Token: SeTcbPrivilege 640 rutserv.exe Token: SeTcbPrivilege 640 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1720 rfusclient.exe 1720 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1720 rfusclient.exe 1720 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 592 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe 640 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1196 1816 b56b445af056b621aeed9626cad47d42.exe 29 PID 1816 wrote to memory of 1196 1816 b56b445af056b621aeed9626cad47d42.exe 29 PID 1816 wrote to memory of 1196 1816 b56b445af056b621aeed9626cad47d42.exe 29 PID 1816 wrote to memory of 1196 1816 b56b445af056b621aeed9626cad47d42.exe 29 PID 1196 wrote to memory of 592 1196 rfusclient.exe 30 PID 1196 wrote to memory of 592 1196 rfusclient.exe 30 PID 1196 wrote to memory of 592 1196 rfusclient.exe 30 PID 1196 wrote to memory of 592 1196 rfusclient.exe 30 PID 640 wrote to memory of 1720 640 rutserv.exe 32 PID 640 wrote to memory of 1720 640 rutserv.exe 32 PID 640 wrote to memory of 1720 640 rutserv.exe 32 PID 640 wrote to memory of 1720 640 rutserv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b56b445af056b621aeed9626cad47d42.exe"C:\Users\Admin\AppData\Local\Temp\b56b445af056b621aeed9626cad47d42.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rutserv.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rutserv.exe" -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\69110\B4AA54E60E\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1720
-
-
-
-