Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe
-
Size
8.1MB
-
MD5
b1ba94ac9a71583453f1278327233414
-
SHA1
f0bf96a6e4356d0b99769f6d59d9fdc0d7f442fc
-
SHA256
1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7
-
SHA512
3943bb6bc415adb72539171620cd0ef8cd8912cfc1951786b16c038af5b11729ea7444be0f93d86475e2b57428f2167c84b16b228644f82ff2582614bc361f4f
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00060000000132eb-97.dat acprotect behavioral1/files/0x00060000000132df-96.dat acprotect -
resource yara_rule behavioral1/files/0x00060000000133dd-95.dat aspack_v212_v242 behavioral1/files/0x000600000001337b-94.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-105.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-106.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-108.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-115.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-116.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-118.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-125.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-126.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-128.dat aspack_v212_v242 behavioral1/files/0x00060000000133dd-134.dat aspack_v212_v242 behavioral1/files/0x000600000001337b-141.dat aspack_v212_v242 behavioral1/files/0x000600000001337b-142.dat aspack_v212_v242 behavioral1/files/0x000600000001337b-148.dat aspack_v212_v242 behavioral1/files/0x000600000001337b-162.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 904 CDS.exe 1096 crypted.exe 1544 windows32.exe 1404 rutserv.exe 1904 rutserv.exe 1448 rutserv.exe 552 rutserv.exe 1328 rfusclient.exe 540 rfusclient.exe 736 rfusclient.exe -
resource yara_rule behavioral1/files/0x00060000000132eb-97.dat upx behavioral1/files/0x00060000000132df-96.dat upx -
Loads dropped DLL 19 IoCs
pid Process 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 904 CDS.exe 904 CDS.exe 904 CDS.exe 904 CDS.exe 904 CDS.exe 904 CDS.exe 1096 crypted.exe 1096 crypted.exe 1096 crypted.exe 1096 crypted.exe 1544 windows32.exe 1924 cmd.exe 1404 rutserv.exe 1924 cmd.exe 1904 rutserv.exe 1924 cmd.exe 1448 rutserv.exe 552 rutserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files\System\mailsend.exe windows32.exe File opened for modification C:\Program Files\System\install.bat windows32.exe File opened for modification C:\Program Files\System\mailsend.exe attrib.exe File opened for modification C:\Program Files\System\rfusclient.exe attrib.exe File created C:\Program Files\System\__tmp_rar_sfx_access_check_259420739 windows32.exe File opened for modification C:\Program Files\System\vp8decoder.dll windows32.exe File created C:\Program Files\System\mailsend.exe windows32.exe File created C:\Program Files\System\regedit.reg windows32.exe File opened for modification C:\Program Files\System\install.bat attrib.exe File opened for modification C:\Program Files\System\vp8encoder.dll attrib.exe File opened for modification C:\Program Files\System\install.vbs windows32.exe File opened for modification C:\Program Files\System\vp8encoder.dll windows32.exe File created C:\Program Files\System\rfusclient.exe windows32.exe File opened for modification C:\Program Files\Common Files\System attrib.exe File opened for modification C:\Program Files\System\install.vbs attrib.exe File opened for modification C:\Program Files\System windows32.exe File created C:\Program Files\System\vp8decoder.dll windows32.exe File created C:\Program Files\System\rutserv.exe windows32.exe File created C:\Program Files\System\vp8encoder.dll windows32.exe File opened for modification C:\Program Files\System\vp8decoder.dll attrib.exe File opened for modification C:\Program Files\System\rfusclient.exe windows32.exe File opened for modification C:\Program Files\System\rutserv.exe windows32.exe File opened for modification C:\Program Files\System\regedit.reg attrib.exe File created C:\Program Files\System\install.vbs windows32.exe File created C:\Program Files\System\install.bat windows32.exe File opened for modification C:\Program Files\System\rutserv.exe attrib.exe File opened for modification C:\Program Files\System\regedit.reg windows32.exe File opened for modification C:\Program Files\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1416 timeout.exe 1820 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 1212 taskkill.exe 1328 taskkill.exe 1472 taskkill.exe 540 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 816 regedit.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 904 CDS.exe 904 CDS.exe 1404 rutserv.exe 1404 rutserv.exe 1404 rutserv.exe 1404 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1448 rutserv.exe 1448 rutserv.exe 552 rutserv.exe 552 rutserv.exe 552 rutserv.exe 552 rutserv.exe 1328 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 736 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1212 taskkill.exe Token: SeDebugPrivilege 1328 taskkill.exe Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 1404 rutserv.exe Token: SeDebugPrivilege 1448 rutserv.exe Token: SeTakeOwnershipPrivilege 552 rutserv.exe Token: SeTcbPrivilege 552 rutserv.exe Token: SeTcbPrivilege 552 rutserv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 904 CDS.exe 904 CDS.exe 1404 rutserv.exe 1904 rutserv.exe 1448 rutserv.exe 552 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 1724 wrote to memory of 904 1724 1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe 27 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 904 wrote to memory of 1096 904 CDS.exe 28 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1096 wrote to memory of 1544 1096 crypted.exe 29 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1544 wrote to memory of 1560 1544 windows32.exe 30 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1560 wrote to memory of 1924 1560 WScript.exe 31 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 552 1924 cmd.exe 33 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 888 1924 cmd.exe 35 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1212 1924 cmd.exe 36 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1328 1924 cmd.exe 38 PID 1924 wrote to memory of 1472 1924 cmd.exe 39 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 888 attrib.exe 552 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe"C:\Users\Admin\AppData\Local\Temp\1557efb23313df99eac4a653a3337f07e7f88ba91273510c1a790fa334e03cc7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\windows32.exe"C:\Users\Admin\AppData\Local\Temp\windows32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\System\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\System\install.bat" "6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\System" +H +S /S /D7⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:552
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\System\*.*" +H +S /S /D7⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:1164
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Program Files\System\rutserv.exerutserv.exe /silentinstall7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files\System\rutserv.exerutserv.exe /firewall7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Program Files\System\rutserv.exerutserv.exe /start7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10007⤵PID:1164
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own7⤵PID:596
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"7⤵PID:972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 1207⤵
- Delays execution with timeout.exe
PID:1820
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2028
-
C:\Program Files\System\rutserv.exe"C:\Program Files\System\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:736
-
-
-
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:540
-