Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
20-11-2021 00:02
Static task
static1
Behavioral task
behavioral1
Sample
56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe
Resource
win7-en-20211104
0 signatures
0 seconds
General
-
Target
56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe
-
Size
15.4MB
-
MD5
7825beab377e9a88cd97cf5d2ccbf81b
-
SHA1
fbaa432a4ce17068a6af7b79134d9004f569e162
-
SHA256
56cec810fc6f445e17a04306b653bb3296b55fe481b518c9aca4b1ef69824a3e
-
SHA512
592be3743297fdb76b05b4faaf7cff77c095ea816ea183a92e8e252ef9098aa34b232987f45b6ba37adcd78bb2e166cc57459bfd03ed1b189ca23e6c68b58bea
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 568 rfusclient.exe 856 rutserv.exe 1248 rutserv.exe 1716 rfusclient.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 524 56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe 568 rfusclient.exe 568 rfusclient.exe 568 rfusclient.exe 568 rfusclient.exe 856 rutserv.exe 856 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 568 rfusclient.exe 568 rfusclient.exe 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1716 rfusclient.exe 1716 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 856 rutserv.exe Token: SeTakeOwnershipPrivilege 1248 rutserv.exe Token: SeTcbPrivilege 1248 rutserv.exe Token: SeTcbPrivilege 1248 rutserv.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1716 rfusclient.exe 1716 rfusclient.exe 1716 rfusclient.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1716 rfusclient.exe 1716 rfusclient.exe 1716 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 856 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe 1248 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 524 wrote to memory of 568 524 56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe 28 PID 524 wrote to memory of 568 524 56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe 28 PID 524 wrote to memory of 568 524 56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe 28 PID 524 wrote to memory of 568 524 56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe 28 PID 568 wrote to memory of 856 568 rfusclient.exe 29 PID 568 wrote to memory of 856 568 rfusclient.exe 29 PID 568 wrote to memory of 856 568 rfusclient.exe 29 PID 568 wrote to memory of 856 568 rfusclient.exe 29 PID 1248 wrote to memory of 1716 1248 rutserv.exe 31 PID 1248 wrote to memory of 1716 1248 rutserv.exe 31 PID 1248 wrote to memory of 1716 1248 rutserv.exe 31 PID 1248 wrote to memory of 1716 1248 rutserv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe"C:\Users\Admin\AppData\Local\Temp\56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe" -run_agent3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1716
-
-
-
-