Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 21:51
Static task
static1
Behavioral task
behavioral1
Sample
19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe
Resource
win10-en-20211208
General
-
Target
19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe
-
Size
5.9MB
-
MD5
23ef883914f616ad2e344670d1f5c50c
-
SHA1
0ad839ab1744b516e999b2e48b6758392be7bd4c
-
SHA256
19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167
-
SHA512
5cf22827e9300a413b85b35de17b060299512cdc5152d6033ead59fab2aa1d8b2a2c5ec0411f74af0f263c69c1f5f6ae7081e460387e3427924a6121c1200e38
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Good\\1svshost.exe, explorer.exe" 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Good\\svshost.exe, explorer.exe" 1svshost.exe -
Executes dropped EXE 9 IoCs
pid Process 1148 1svshost.exe 1056 rutserv.exe 1832 rutserv.exe 956 rutserv.exe 1680 rutserv.exe 1664 rfusclient.exe 108 rfusclient.exe 1016 rfusclient.exe 1712 svshost.exe -
Loads dropped DLL 7 IoCs
pid Process 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1148 1svshost.exe 616 cmd.exe 1680 rutserv.exe 1680 rutserv.exe 1148 1svshost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1396 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe 1148 1svshost.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1016 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1056 rutserv.exe Token: SeDebugPrivilege 956 rutserv.exe Token: SeTakeOwnershipPrivilege 1680 rutserv.exe Token: SeTcbPrivilege 1680 rutserv.exe Token: SeTcbPrivilege 1680 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1056 rutserv.exe 1832 rutserv.exe 956 rutserv.exe 1680 rutserv.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1148 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 27 PID 1676 wrote to memory of 1148 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 27 PID 1676 wrote to memory of 1148 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 27 PID 1676 wrote to memory of 1148 1676 19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe 27 PID 1148 wrote to memory of 1396 1148 1svshost.exe 28 PID 1148 wrote to memory of 1396 1148 1svshost.exe 28 PID 1148 wrote to memory of 1396 1148 1svshost.exe 28 PID 1148 wrote to memory of 1396 1148 1svshost.exe 28 PID 1148 wrote to memory of 616 1148 1svshost.exe 29 PID 1148 wrote to memory of 616 1148 1svshost.exe 29 PID 1148 wrote to memory of 616 1148 1svshost.exe 29 PID 1148 wrote to memory of 616 1148 1svshost.exe 29 PID 616 wrote to memory of 1056 616 cmd.exe 31 PID 616 wrote to memory of 1056 616 cmd.exe 31 PID 616 wrote to memory of 1056 616 cmd.exe 31 PID 616 wrote to memory of 1056 616 cmd.exe 31 PID 616 wrote to memory of 1832 616 cmd.exe 32 PID 616 wrote to memory of 1832 616 cmd.exe 32 PID 616 wrote to memory of 1832 616 cmd.exe 32 PID 616 wrote to memory of 1832 616 cmd.exe 32 PID 616 wrote to memory of 956 616 cmd.exe 33 PID 616 wrote to memory of 956 616 cmd.exe 33 PID 616 wrote to memory of 956 616 cmd.exe 33 PID 616 wrote to memory of 956 616 cmd.exe 33 PID 1680 wrote to memory of 1664 1680 rutserv.exe 35 PID 1680 wrote to memory of 1664 1680 rutserv.exe 35 PID 1680 wrote to memory of 1664 1680 rutserv.exe 35 PID 1680 wrote to memory of 1664 1680 rutserv.exe 35 PID 1680 wrote to memory of 108 1680 rutserv.exe 36 PID 1680 wrote to memory of 108 1680 rutserv.exe 36 PID 1680 wrote to memory of 108 1680 rutserv.exe 36 PID 1680 wrote to memory of 108 1680 rutserv.exe 36 PID 616 wrote to memory of 1968 616 cmd.exe 37 PID 616 wrote to memory of 1968 616 cmd.exe 37 PID 616 wrote to memory of 1968 616 cmd.exe 37 PID 616 wrote to memory of 1968 616 cmd.exe 37 PID 616 wrote to memory of 2016 616 cmd.exe 38 PID 616 wrote to memory of 2016 616 cmd.exe 38 PID 616 wrote to memory of 2016 616 cmd.exe 38 PID 616 wrote to memory of 2016 616 cmd.exe 38 PID 1664 wrote to memory of 1016 1664 rfusclient.exe 39 PID 1664 wrote to memory of 1016 1664 rfusclient.exe 39 PID 1664 wrote to memory of 1016 1664 rfusclient.exe 39 PID 1664 wrote to memory of 1016 1664 rfusclient.exe 39 PID 1148 wrote to memory of 1712 1148 1svshost.exe 40 PID 1148 wrote to memory of 1712 1148 1svshost.exe 40 PID 1148 wrote to memory of 1712 1148 1svshost.exe 40 PID 1148 wrote to memory of 1712 1148 1svshost.exe 40 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1968 attrib.exe 2016 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe"C:\Users\Admin\AppData\Local\Temp\19f28d00098dfa8146bec64dd3545fad8fb83c239cc7b723eaaba8ae2ab77167.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\1svshost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\1svshost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Roaming\Microsoft\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:1396
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Tupe.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe" /start4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\*.*" +s +h4⤵
- Views/modifies file attributes
PID:1968
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good" +s +h4⤵
- Views/modifies file attributes
PID:2016
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\svshost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\svshost.exe"3⤵
- Executes dropped EXE
PID:1712
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1016
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Good\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:108
-