Analysis

  • max time kernel
    152s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    20-11-2021 00:02

General

  • Target

    56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe

  • Size

    15.4MB

  • MD5

    7825beab377e9a88cd97cf5d2ccbf81b

  • SHA1

    fbaa432a4ce17068a6af7b79134d9004f569e162

  • SHA256

    56cec810fc6f445e17a04306b653bb3296b55fe481b518c9aca4b1ef69824a3e

  • SHA512

    592be3743297fdb76b05b4faaf7cff77c095ea816ea183a92e8e252ef9098aa34b232987f45b6ba37adcd78bb2e166cc57459bfd03ed1b189ca23e6c68b58bea

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe
    "C:\Users\Admin\AppData\Local\Temp\56CEC810FC6F445E17A04306B653BB3296B55FE481B51.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe
      "C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe" -run_agent
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe
        "C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe" -run_agent
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:856
        • C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rutserv.exe" -run_agent -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe
            "C:\Users\Admin\AppData\Roaming\RMS Agent\70003\B023FD26B4\rfusclient.exe" /tray /user
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-55-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/524-56-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/568-63-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/856-71-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/856-77-0x00000000030A0000-0x00000000030A1000-memory.dmp

    Filesize

    4KB

  • memory/856-76-0x0000000001770000-0x0000000001771000-memory.dmp

    Filesize

    4KB

  • memory/1248-90-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1248-105-0x0000000005EA0000-0x0000000005EA1000-memory.dmp

    Filesize

    4KB

  • memory/1248-94-0x0000000005810000-0x0000000005811000-memory.dmp

    Filesize

    4KB

  • memory/1248-93-0x00000000059C0000-0x00000000059C1000-memory.dmp

    Filesize

    4KB

  • memory/1248-91-0x0000000005820000-0x0000000005821000-memory.dmp

    Filesize

    4KB

  • memory/1248-113-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1248-106-0x0000000005FB0000-0x00000000060C0000-memory.dmp

    Filesize

    1.1MB

  • memory/1248-111-0x0000000006650000-0x0000000006651000-memory.dmp

    Filesize

    4KB

  • memory/1248-104-0x0000000005CD0000-0x0000000005CD1000-memory.dmp

    Filesize

    4KB

  • memory/1248-103-0x0000000005CC0000-0x0000000005CC1000-memory.dmp

    Filesize

    4KB

  • memory/1248-102-0x0000000005C30000-0x0000000005C31000-memory.dmp

    Filesize

    4KB

  • memory/1248-101-0x0000000005C20000-0x0000000005C21000-memory.dmp

    Filesize

    4KB

  • memory/1248-100-0x0000000005B90000-0x0000000005B91000-memory.dmp

    Filesize

    4KB

  • memory/1248-112-0x0000000007250000-0x0000000007251000-memory.dmp

    Filesize

    4KB

  • memory/1248-110-0x0000000006640000-0x0000000006641000-memory.dmp

    Filesize

    4KB

  • memory/1716-107-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1716-109-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

    Filesize

    4KB

  • memory/1716-108-0x0000000002B60000-0x0000000002B61000-memory.dmp

    Filesize

    4KB

  • memory/1716-114-0x00000000043E0000-0x00000000043E1000-memory.dmp

    Filesize

    4KB