Analysis

  • max time kernel
    601s
  • max time network
    598s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    07-09-2021 17:15

General

  • Target

    FSOC/vmtools.exe

  • Size

    15.8MB

  • MD5

    2d1106c13af8afc6fff279a41e4893c4

  • SHA1

    d076af3cded5a3b9593bdb8613c5c5145063acb3

  • SHA256

    2555e7cf32b7cbf8431f5cad37ae9733d208460a96e8b9d890366544c3bb17c5

  • SHA512

    d7ae08ca1bfe63d73f78d724a03bd879dc79a117c851d32530c911ba37ba066e8d27dd3195fecb70c53477657f3b27c66c283a9e1ab5960c9b0a5e084c6a7846

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe
    "C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe
      C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe -run_agent -second
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exe
        C:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exe /tray /user
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1216-77-0x0000000005020000-0x0000000005021000-memory.dmp

    Filesize

    4KB

  • memory/1216-76-0x0000000002B10000-0x0000000002B11000-memory.dmp

    Filesize

    4KB

  • memory/1216-75-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/1216-72-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1572-60-0x0000000005AE0000-0x0000000005AE1000-memory.dmp

    Filesize

    4KB

  • memory/1572-70-0x00000000062E0000-0x00000000062E1000-memory.dmp

    Filesize

    4KB

  • memory/1572-61-0x0000000005810000-0x0000000005811000-memory.dmp

    Filesize

    4KB

  • memory/1572-63-0x0000000005C90000-0x0000000005C91000-memory.dmp

    Filesize

    4KB

  • memory/1572-59-0x0000000005990000-0x0000000005991000-memory.dmp

    Filesize

    4KB

  • memory/1572-64-0x0000000006F50000-0x0000000007A98000-memory.dmp

    Filesize

    11.3MB

  • memory/1572-66-0x0000000006020000-0x0000000006021000-memory.dmp

    Filesize

    4KB

  • memory/1572-67-0x00000000060F0000-0x00000000060F1000-memory.dmp

    Filesize

    4KB

  • memory/1572-69-0x00000000062D0000-0x00000000062D1000-memory.dmp

    Filesize

    4KB

  • memory/1572-78-0x00000000045C0000-0x00000000045C1000-memory.dmp

    Filesize

    4KB

  • memory/1572-68-0x0000000006280000-0x0000000006281000-memory.dmp

    Filesize

    4KB

  • memory/1572-71-0x0000000006F50000-0x0000000007A98000-memory.dmp

    Filesize

    11.3MB

  • memory/1572-73-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

    Filesize

    4KB

  • memory/1572-58-0x00000000014D0000-0x00000000014D1000-memory.dmp

    Filesize

    4KB

  • memory/1572-74-0x00000000045B0000-0x00000000045B1000-memory.dmp

    Filesize

    4KB

  • memory/1696-56-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/1696-55-0x00000000048B0000-0x00000000048B1000-memory.dmp

    Filesize

    4KB

  • memory/1696-54-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1696-53-0x0000000075641000-0x0000000075643000-memory.dmp

    Filesize

    8KB