Analysis

  • max time kernel
    185s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    08-02-2022 01:52

General

  • Target

    5598febfbf00839c9f7047d9fe3205e3.exe

  • Size

    16.2MB

  • MD5

    5598febfbf00839c9f7047d9fe3205e3

  • SHA1

    3bc26a4c8e5f8a93671c9e24678530b51224ef61

  • SHA256

    02dda0916789c0c3572cbbf0e119cbae7be42e10eca39be66bbaaf2468a62b7a

  • SHA512

    56dbe64e5f45a7e175ced8055f92e9a651c2aad984a1150f25654f4928d16ceaa2cc7fe0cdb3ba8ffebe4905620599625dceefdba0ed3b200cc947bcaf57285b

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5598febfbf00839c9f7047d9fe3205e3.exe
    "C:\Users\Admin\AppData\Local\Temp\5598febfbf00839c9f7047d9fe3205e3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rfusclient.exe
      "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rfusclient.exe" -run_agent
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rutserv.exe
        "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rutserv.exe" -run_agent
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1924
        • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rutserv.exe" -run_agent -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4224
          • C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rfusclient.exe
            "C:\Users\Admin\AppData\Roaming\RMS Agent\70020\2D1DBD89B2\rfusclient.exe" /tray /user
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3692
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4476
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4160
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1252-133-0x0000000001710000-0x0000000001711000-memory.dmp

    Filesize

    4KB

  • memory/1924-141-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

    Filesize

    4KB

  • memory/1924-142-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/1924-140-0x000000000360A000-0x00000000037D0000-memory.dmp

    Filesize

    1.8MB

  • memory/3576-130-0x00000000048C0000-0x00000000048C1000-memory.dmp

    Filesize

    4KB

  • memory/3692-180-0x00000000048F0000-0x00000000048F1000-memory.dmp

    Filesize

    4KB

  • memory/3692-173-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/3692-179-0x0000000004860000-0x0000000004861000-memory.dmp

    Filesize

    4KB

  • memory/3692-178-0x0000000004800000-0x0000000004801000-memory.dmp

    Filesize

    4KB

  • memory/4160-159-0x000002C6171A0000-0x000002C6171A4000-memory.dmp

    Filesize

    16KB

  • memory/4224-176-0x0000000006160000-0x0000000006161000-memory.dmp

    Filesize

    4KB

  • memory/4224-168-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/4224-175-0x00000000056B0000-0x00000000056B1000-memory.dmp

    Filesize

    4KB

  • memory/4224-177-0x0000000006010000-0x0000000006011000-memory.dmp

    Filesize

    4KB

  • memory/4224-169-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/4224-172-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/4224-171-0x0000000005170000-0x0000000005171000-memory.dmp

    Filesize

    4KB

  • memory/4224-174-0x00000000056A0000-0x00000000056A1000-memory.dmp

    Filesize

    4KB

  • memory/4224-167-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/4224-158-0x0000000004E20000-0x0000000004E21000-memory.dmp

    Filesize

    4KB

  • memory/4224-183-0x0000000006730000-0x0000000006731000-memory.dmp

    Filesize

    4KB

  • memory/4224-184-0x0000000006740000-0x0000000006741000-memory.dmp

    Filesize

    4KB

  • memory/4224-185-0x0000000006790000-0x0000000006791000-memory.dmp

    Filesize

    4KB

  • memory/4224-186-0x00000000068C0000-0x00000000068C1000-memory.dmp

    Filesize

    4KB