Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
27-09-2021 00:03
Static task
static1
Behavioral task
behavioral1
Sample
BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe
-
Size
16.2MB
-
MD5
9d8fd3044460f6a4b876755ab299c634
-
SHA1
67e66edb8ec5fdbd4662541e57800ba4a5e6b229
-
SHA256
bbc131fda4a9d5d10d774f609a121390bb56456f358420db95d35ef9760acad9
-
SHA512
c642098a6affcffda92bb05813482228e5304e1975a75f98ba92f66522b2109dc0d95a988dfc3a4b8621ca86702af9b74288f0996b467b235fff8e4b6a87ab8c
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1656 rfusclient.exe 1768 rutserv.exe 676 rutserv.exe 432 rfusclient.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 1116 BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe 1656 rfusclient.exe 1656 rfusclient.exe 1656 rfusclient.exe 1656 rfusclient.exe 1768 rutserv.exe 1768 rutserv.exe 676 rutserv.exe 676 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1656 rfusclient.exe 1656 rfusclient.exe 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe 432 rfusclient.exe 432 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1768 rutserv.exe Token: SeTakeOwnershipPrivilege 676 rutserv.exe Token: SeTcbPrivilege 676 rutserv.exe Token: SeTcbPrivilege 676 rutserv.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 432 rfusclient.exe 432 rfusclient.exe 432 rfusclient.exe 432 rfusclient.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 432 rfusclient.exe 432 rfusclient.exe 432 rfusclient.exe 432 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 1768 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe 676 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1656 1116 BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe 27 PID 1116 wrote to memory of 1656 1116 BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe 27 PID 1116 wrote to memory of 1656 1116 BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe 27 PID 1116 wrote to memory of 1656 1116 BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe 27 PID 1656 wrote to memory of 1768 1656 rfusclient.exe 28 PID 1656 wrote to memory of 1768 1656 rfusclient.exe 28 PID 1656 wrote to memory of 1768 1656 rfusclient.exe 28 PID 1656 wrote to memory of 1768 1656 rfusclient.exe 28 PID 676 wrote to memory of 432 676 rutserv.exe 30 PID 676 wrote to memory of 432 676 rutserv.exe 30 PID 676 wrote to memory of 432 676 rutserv.exe 30 PID 676 wrote to memory of 432 676 rutserv.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe"C:\Users\Admin\AppData\Local\Temp\BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe" -run_agent3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:432
-
-
-
-