Analysis

  • max time kernel
    157s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 18:44

General

  • Target

    b841d57bbf97cca0445878b8c938c3f6978dc52a42418c3e1db73a77c3cc3111.exe

  • Size

    3.0MB

  • MD5

    e722b64756034173c98ace2352df1904

  • SHA1

    8d01e508901935f31931fc9503de053f2a967d5c

  • SHA256

    b841d57bbf97cca0445878b8c938c3f6978dc52a42418c3e1db73a77c3cc3111

  • SHA512

    219ba9831b59b206561cd039317e2ac6286dcee7d37fe98865fa40d7234ac664d1a51841dbea63d612ac925a7868e646d27c45efa080754de2638f92a005ef89

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b841d57bbf97cca0445878b8c938c3f6978dc52a42418c3e1db73a77c3cc3111.exe
    "C:\Users\Admin\AppData\Local\Temp\b841d57bbf97cca0445878b8c938c3f6978dc52a42418c3e1db73a77c3cc3111.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\wet.vbs"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Microsoft\install.cmd" /silent"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 9 localhost
          4⤵
          • Runs ping.exe
          PID:1800
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "sys" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\rutserv.exe"
          4⤵
          • Adds Run key to start application
          PID:2060
        • C:\Users\Admin\AppData\Roaming\Microsoft\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\rutserv.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1404
          • C:\Users\Admin\AppData\Roaming\Microsoft\rutserv.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\rutserv.exe -second
            5⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1880
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:2148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1880-210-0x00000000045F0000-0x00000000045F1000-memory.dmp

    Filesize

    4KB

  • memory/1880-211-0x0000000004700000-0x0000000004701000-memory.dmp

    Filesize

    4KB

  • memory/1880-204-0x00000000010C0000-0x00000000010C1000-memory.dmp

    Filesize

    4KB

  • memory/1880-213-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

    Filesize

    4KB

  • memory/1880-212-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/1880-214-0x0000000005000000-0x0000000005001000-memory.dmp

    Filesize

    4KB

  • memory/1880-217-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/1880-216-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/1880-218-0x0000000004E40000-0x0000000004E41000-memory.dmp

    Filesize

    4KB

  • memory/1880-219-0x0000000004E90000-0x0000000004E91000-memory.dmp

    Filesize

    4KB

  • memory/1880-220-0x0000000006DA0000-0x0000000006DA1000-memory.dmp

    Filesize

    4KB

  • memory/1880-221-0x0000000007220000-0x00000000072F1000-memory.dmp

    Filesize

    836KB

  • memory/1880-222-0x0000000007300000-0x00000000073D1000-memory.dmp

    Filesize

    836KB