Analysis

  • max time kernel
    164s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    13-02-2022 11:57

General

  • Target

    9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe

  • Size

    10.2MB

  • MD5

    e935690d76617f96a7d1f3cf8ea829fd

  • SHA1

    11c701c219393d30351a7c3aadbbde3aeefb7d35

  • SHA256

    9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882

  • SHA512

    c606f2aed982bef5a200273a8b299bd996e0a4535b91cb4bb529080920ce78c7ed138e870bfdf1a57ed8cbbc05d5cdbe668ad1c3f98c42626303ae35671eb5d8

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe
    "C:\Users\Admin\AppData\Local\Temp\9992114ca431bbcc576a1eebaaa878554ee85c4669e63e92adea8cc925fc9882.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AD01.tmp\Remote Manipulator System - Server.bat" "
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
        3⤵
          PID:3920
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /silentinstall
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          PID:1940
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /firewall
          3⤵
          • Executes dropped EXE
          PID:2988
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "settings.reg"
          3⤵
          • Runs .reg file with regedit
          PID:3636
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "Autorun.reg"
          3⤵
          • Adds Run key to start application
          • Runs .reg file with regedit
          PID:3980
        • C:\Windows\SysWOW64\Monitor.exe
          "C:\Windows\System32\Monitor.exe" /start
          3⤵
          • Executes dropped EXE
          PID:3276
        • C:\Windows\SysWOW64\RManServer.exe
          "C:\Windows\System32\RManServer.exe" /start
          3⤵
          • Executes dropped EXE
          PID:1416
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:2784
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:3540
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2752
    • C:\Windows\SysWOW64\RManServer.exe
      C:\Windows\SysWOW64\RManServer.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\RManFUSClient.exe
        "C:\Windows\SysWOW64\RManFUSClient.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1864
      • C:\Windows\SysWOW64\RManFUSClient.exe
        C:\Windows\SysWOW64\RManFUSClient.exe /tray
        2⤵
        • Executes dropped EXE
        PID:2888

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1416-158-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/1864-160-0x00000000026F0000-0x00000000026F1000-memory.dmp

      Filesize

      4KB

    • memory/1940-146-0x0000000000990000-0x0000000000991000-memory.dmp

      Filesize

      4KB

    • memory/2232-159-0x0000000000810000-0x0000000000811000-memory.dmp

      Filesize

      4KB

    • memory/2888-162-0x00000000008F0000-0x00000000008F1000-memory.dmp

      Filesize

      4KB

    • memory/2988-149-0x00000000023F0000-0x00000000023F1000-memory.dmp

      Filesize

      4KB