Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 11:36

General

  • Target

    c3aa23331cded10fbfcd36406ed913b1.exe

  • Size

    15.4MB

  • MD5

    c3aa23331cded10fbfcd36406ed913b1

  • SHA1

    0394329a87f8a56b36a03b9da69ca85eed32e650

  • SHA256

    78dedaf861e8a8b88b1419aebf37a74be707f531dce0804f970c70f372b2a247

  • SHA512

    08c660af969812672704383e08cd05228b64946fb35e548e0d6351f6eaef4d4e741aa48ab267af6508dfd67228bf4a5cb35b7e92f7247182a111c5799dbd576a

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3aa23331cded10fbfcd36406ed913b1.exe
    "C:\Users\Admin\AppData\Local\Temp\c3aa23331cded10fbfcd36406ed913b1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rfusclient.exe
      "C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rfusclient.exe" -run_agent
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rutserv.exe
        "C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rutserv.exe" -run_agent
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:376
        • C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rutserv.exe" -run_agent -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2160
          • C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rfusclient.exe
            "C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70003\2BF6AA24F5\rfusclient.exe" /tray /user
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2260
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2288
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3372
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-142-0x0000000005050000-0x0000000005051000-memory.dmp

    Filesize

    4KB

  • memory/376-141-0x0000000005000000-0x0000000005001000-memory.dmp

    Filesize

    4KB

  • memory/376-140-0x0000000004F30000-0x0000000004F31000-memory.dmp

    Filesize

    4KB

  • memory/2160-146-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/2160-184-0x0000000005F70000-0x0000000005F71000-memory.dmp

    Filesize

    4KB

  • memory/2160-177-0x0000000005530000-0x0000000005531000-memory.dmp

    Filesize

    4KB

  • memory/2160-175-0x0000000005560000-0x0000000005561000-memory.dmp

    Filesize

    4KB

  • memory/2160-179-0x00000000056E0000-0x00000000056E1000-memory.dmp

    Filesize

    4KB

  • memory/2160-180-0x0000000006100000-0x0000000006101000-memory.dmp

    Filesize

    4KB

  • memory/2160-181-0x0000000005E80000-0x0000000005E81000-memory.dmp

    Filesize

    4KB

  • memory/2160-182-0x0000000005ED0000-0x0000000005ED1000-memory.dmp

    Filesize

    4KB

  • memory/2160-183-0x0000000005F20000-0x0000000005F21000-memory.dmp

    Filesize

    4KB

  • memory/2160-176-0x00000000056B0000-0x00000000056B1000-memory.dmp

    Filesize

    4KB

  • memory/2160-194-0x0000000006B20000-0x0000000006B21000-memory.dmp

    Filesize

    4KB

  • memory/2160-193-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/2160-192-0x0000000005110000-0x0000000005111000-memory.dmp

    Filesize

    4KB

  • memory/2160-190-0x0000000006A00000-0x0000000006A01000-memory.dmp

    Filesize

    4KB

  • memory/2260-188-0x0000000004950000-0x0000000004951000-memory.dmp

    Filesize

    4KB

  • memory/2260-189-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

    Filesize

    4KB

  • memory/2260-191-0x0000000004FD0000-0x0000000004FD1000-memory.dmp

    Filesize

    4KB

  • memory/2260-185-0x00000000012E0000-0x00000000012E1000-memory.dmp

    Filesize

    4KB

  • memory/2536-130-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/3116-134-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB