Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    13-02-2022 13:42

General

  • Target

    6016d62ee9ee6150f925bfa2369509d66f244c7912a9a3e0f44f15fd29054500.exe

  • Size

    2.8MB

  • MD5

    77fbf45826b6dccfcdd40eba740d4c16

  • SHA1

    014ccf125bae774fc3f49798050f0d2672afa10b

  • SHA256

    6016d62ee9ee6150f925bfa2369509d66f244c7912a9a3e0f44f15fd29054500

  • SHA512

    aab791168304aca292e31ca82249444d95aeac87b8ed0e1861853debd1aba4a9145f3202db8a0e7d6f7002725ee32e236871dde5b30a52937d8fffd4a71e3edc

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6016d62ee9ee6150f925bfa2369509d66f244c7912a9a3e0f44f15fd29054500.exe
    "C:\Users\Admin\AppData\Local\Temp\6016d62ee9ee6150f925bfa2369509d66f244c7912a9a3e0f44f15fd29054500.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows\build\data.exe" -p284579G45398T745398T
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Log\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
          4⤵
            PID:1136
          • C:\Windows\SysWOW64\wscript.exe
            "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
            4⤵
              PID:704
            • C:\Windows\SysWOW64\wscript.exe
              "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
              4⤵
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:1508
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Log\Windows\hiscomponent\install.bat" "
                5⤵
                • Loads dropped DLL
                PID:1208
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h "C:\Log"
                  6⤵
                  • Views/modifies file attributes
                  PID:1976
                • C:\Windows\SysWOW64\reg.exe
                  reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
                  6⤵
                    PID:1724
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\DEVICEMAP" /f
                    6⤵
                      PID:2036
                    • C:\Windows\SysWOW64\reg.exe
                      reg delete "HKEY_CURRENT_USER\Software\TektonIT\Remote Manipulator System" /f
                      6⤵
                        PID:1092
                      • C:\Windows\SysWOW64\regedit.exe
                        regedit /s "Windows\hiscomponent\regedit.reg"
                        6⤵
                        • Runs .reg file with regedit
                        PID:1960
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout 1
                        6⤵
                        • Delays execution with timeout.exe
                        PID:1748
                      • C:\Folder768\rutserv.exe
                        rutserv.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:1896
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib -s -h "C:\Folder768\*.*"
                        6⤵
                        • Views/modifies file attributes
                        PID:1708
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib -s -h "C:\Folder768"
                        6⤵
                        • Views/modifies file attributes
                        PID:1564
                  • C:\Windows\SysWOW64\wscript.exe
                    "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
                    4⤵
                      PID:284
                    • C:\Windows\SysWOW64\wscript.exe
                      "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
                      4⤵
                        PID:980
                      • C:\Windows\SysWOW64\wscript.exe
                        "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
                        4⤵
                          PID:436
                        • C:\Windows\SysWOW64\wscript.exe
                          "C:\Windows\System32\wscript.exe" "C:\Log\install.vbs" Run
                          4⤵
                            PID:1544

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1528-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

                      Filesize

                      8KB

                    • memory/1896-99-0x0000000000250000-0x0000000000251000-memory.dmp

                      Filesize

                      4KB

                    • memory/1896-98-0x0000000000400000-0x0000000000A97000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/1896-100-0x0000000000A96000-0x0000000000A97000-memory.dmp

                      Filesize

                      4KB

                    • memory/1896-101-0x0000000000230000-0x0000000000232000-memory.dmp

                      Filesize

                      8KB