Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-09-2021 00:03

General

  • Target

    BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe

  • Size

    16.2MB

  • MD5

    9d8fd3044460f6a4b876755ab299c634

  • SHA1

    67e66edb8ec5fdbd4662541e57800ba4a5e6b229

  • SHA256

    bbc131fda4a9d5d10d774f609a121390bb56456f358420db95d35ef9760acad9

  • SHA512

    c642098a6affcffda92bb05813482228e5304e1975a75f98ba92f66522b2109dc0d95a988dfc3a4b8621ca86702af9b74288f0996b467b235fff8e4b6a87ab8c

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe
    "C:\Users\Admin\AppData\Local\Temp\BBC131FDA4A9D5D10D774F609A121390BB56456F35842.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe
      "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe" -run_agent
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe
        "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe" -run_agent
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1216
        • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rutserv.exe" -run_agent -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1916
          • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe
            "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2BF24577ED\rfusclient.exe" /tray /user
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/604-114-0x0000000004820000-0x0000000004821000-memory.dmp

    Filesize

    4KB

  • memory/868-119-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/1216-131-0x00000000050C0000-0x00000000050C1000-memory.dmp

    Filesize

    4KB

  • memory/1216-126-0x00000000018F0000-0x00000000018F1000-memory.dmp

    Filesize

    4KB

  • memory/1216-128-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/1916-147-0x0000000006170000-0x0000000006171000-memory.dmp

    Filesize

    4KB

  • memory/1916-152-0x00000000066C0000-0x00000000066C1000-memory.dmp

    Filesize

    4KB

  • memory/1916-142-0x0000000005520000-0x0000000005521000-memory.dmp

    Filesize

    4KB

  • memory/1916-141-0x00000000050A0000-0x00000000050A1000-memory.dmp

    Filesize

    4KB

  • memory/1916-140-0x0000000005090000-0x0000000005091000-memory.dmp

    Filesize

    4KB

  • memory/1916-146-0x0000000005630000-0x0000000005631000-memory.dmp

    Filesize

    4KB

  • memory/1916-132-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/1916-150-0x0000000006420000-0x0000000006421000-memory.dmp

    Filesize

    4KB

  • memory/1916-148-0x00000000062D0000-0x00000000062D1000-memory.dmp

    Filesize

    4KB

  • memory/1916-160-0x0000000008D10000-0x0000000008D11000-memory.dmp

    Filesize

    4KB

  • memory/1916-151-0x0000000006570000-0x0000000006571000-memory.dmp

    Filesize

    4KB

  • memory/1916-158-0x0000000006C80000-0x0000000006C81000-memory.dmp

    Filesize

    4KB

  • memory/1916-157-0x0000000006020000-0x0000000006021000-memory.dmp

    Filesize

    4KB

  • memory/1916-156-0x0000000006010000-0x0000000006011000-memory.dmp

    Filesize

    4KB

  • memory/3564-154-0x0000000004770000-0x0000000004771000-memory.dmp

    Filesize

    4KB

  • memory/3564-155-0x0000000004A20000-0x0000000004A21000-memory.dmp

    Filesize

    4KB

  • memory/3564-153-0x0000000001150000-0x0000000001151000-memory.dmp

    Filesize

    4KB

  • memory/3564-159-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

    Filesize

    4KB