Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 22:12

General

  • Target

    1ae82aa9ca4bfcb909bada0f863b66101794fc903f7b74ac3ba4b5d6273431f9.exe

  • Size

    14.6MB

  • MD5

    c178f06f0551300180ee4d0ab7e7f09d

  • SHA1

    1bf041b094f5a8f1db87e6b003694fa9b5b7496c

  • SHA256

    1ae82aa9ca4bfcb909bada0f863b66101794fc903f7b74ac3ba4b5d6273431f9

  • SHA512

    e20a870810243af4fae7841d6692764d6e208b52814975bd4a4eab6fdbbab72e1a61220438e887a1ced0c1864469218eb9e363eb73906b35b7c8817326d2d137

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ae82aa9ca4bfcb909bada0f863b66101794fc903f7b74ac3ba4b5d6273431f9.exe
    "C:\Users\Admin\AppData\Local\Temp\1ae82aa9ca4bfcb909bada0f863b66101794fc903f7b74ac3ba4b5d6273431f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set opmode mode=disable
      2⤵
        PID:2700
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall set allprofiles state off
        2⤵
          PID:2728
        • C:\Windows\SysWOW64\powercfg.exe
          powercfg.exe -h off
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2220
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          2⤵
          • Modifies registry key
          PID:1440
        • C:\ProgramData\sysdisk.exe
          "C:\ProgramData\sysdisk.exe"
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2780
          • C:\ProgramData\sysdisk.exe
            C:\ProgramData\sysdisk.exe -second
            3⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3408

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2424-118-0x0000000003010000-0x0000000003011000-memory.dmp

        Filesize

        4KB

      • memory/2780-121-0x00000000045D0000-0x00000000045D1000-memory.dmp

        Filesize

        4KB

      • memory/2780-122-0x0000000004660000-0x0000000004661000-memory.dmp

        Filesize

        4KB

      • memory/3408-128-0x00000000046D0000-0x00000000046D1000-memory.dmp

        Filesize

        4KB

      • memory/3408-132-0x0000000004900000-0x0000000004901000-memory.dmp

        Filesize

        4KB

      • memory/3408-124-0x0000000004490000-0x0000000004491000-memory.dmp

        Filesize

        4KB

      • memory/3408-131-0x0000000005230000-0x0000000005231000-memory.dmp

        Filesize

        4KB

      • memory/3408-130-0x00000000050E0000-0x00000000050E1000-memory.dmp

        Filesize

        4KB

      • memory/3408-129-0x0000000004930000-0x0000000004931000-memory.dmp

        Filesize

        4KB

      • memory/3408-133-0x0000000004910000-0x0000000004911000-memory.dmp

        Filesize

        4KB

      • memory/3408-127-0x00000000046E0000-0x00000000046E1000-memory.dmp

        Filesize

        4KB

      • memory/3408-134-0x0000000004920000-0x0000000004921000-memory.dmp

        Filesize

        4KB

      • memory/3408-135-0x0000000005500000-0x0000000005501000-memory.dmp

        Filesize

        4KB

      • memory/3408-136-0x0000000006E90000-0x0000000006E91000-memory.dmp

        Filesize

        4KB

      • memory/3408-137-0x0000000007090000-0x0000000007091000-memory.dmp

        Filesize

        4KB

      • memory/3408-138-0x0000000007320000-0x0000000007321000-memory.dmp

        Filesize

        4KB

      • memory/3408-139-0x0000000007470000-0x0000000007541000-memory.dmp

        Filesize

        836KB