Analysis

  • max time kernel
    152s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    13-02-2022 11:57

General

  • Target

    9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe

  • Size

    10.2MB

  • MD5

    e935690d76617f96a7d1f3cf8ea829fd

  • SHA1

    11c701c219393d30351a7c3aadbbde3aeefb7d35

  • SHA256

    9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882

  • SHA512

    c606f2aed982bef5a200273a8b299bd996e0a4535b91cb4bb529080920ce78c7ed138e870bfdf1a57ed8cbbc05d5cdbe668ad1c3f98c42626303ae35671eb5d8

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe
    "C:\Users\Admin\AppData\Local\Temp\9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\DBDE.tmp\Remote Manipulator System - Server.bat" "
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
        3⤵
          PID:784
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /silentinstall
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          PID:1372
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /firewall
          3⤵
          • Executes dropped EXE
          PID:1552
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "settings.reg"
          3⤵
          • Runs .reg file with regedit
          PID:1192
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "Autorun.reg"
          3⤵
          • Adds Run key to start application
          • Runs .reg file with regedit
          PID:1200
        • C:\Windows\SysWOW64\Monitor.exe
          "C:\Windows\System32\Monitor.exe" /start
          3⤵
          • Executes dropped EXE
          PID:1056
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /start
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1680
    • C:\Windows\SysWOW64\RManServer.exe
      C:\Windows\SysWOW64\RManServer.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Windows\SysWOW64\RManFUSClient.exe
        "C:\Windows\SysWOW64\RManFUSClient.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1348
      • C:\Windows\SysWOW64\RManFUSClient.exe
        C:\Windows\SysWOW64\RManFUSClient.exe /tray
        2⤵
        • Executes dropped EXE
        PID:1696

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/860-93-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/1056-85-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/1348-101-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1372-72-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/1552-77-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/1680-92-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1696-100-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1916-54-0x0000000075F21000-0x0000000075F23000-memory.dmp

      Filesize

      8KB