Analysis

  • max time kernel
    123s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    25-11-2021 11:38

General

  • Target

    8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc.exe

  • Size

    17.1MB

  • MD5

    4998446e6c16d36185faa040c6ea659a

  • SHA1

    18828e72224bff71730ad7e90952d7d3b0a53293

  • SHA256

    8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc

  • SHA512

    4db58e144acec3471ba9f007577b6e2f296394c520a02527ed5209563b122938214cc3c201021eb53cea49f681203ecf1c8c37629a678bb15e8d1a7ebed78fde

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc.exe
    "C:\Users\Admin\AppData\Local\Temp\8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc.exe
      C:\Users\Admin\AppData\Local\Temp\8e63f9781e37269e3c4aea0f6266aa01154dc3491c5154267fda828d41e23abc.exe -run_agent -second
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/320-55-0x0000000075A61000-0x0000000075A63000-memory.dmp

    Filesize

    8KB

  • memory/320-56-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/320-59-0x0000000003050000-0x0000000003051000-memory.dmp

    Filesize

    4KB

  • memory/320-58-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/616-60-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/616-61-0x0000000005970000-0x0000000005971000-memory.dmp

    Filesize

    4KB

  • memory/616-63-0x00000000059D0000-0x00000000059D1000-memory.dmp

    Filesize

    4KB

  • memory/616-62-0x00000000059C0000-0x00000000059C1000-memory.dmp

    Filesize

    4KB