Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    09-03-2022 17:39

General

  • Target

    8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe

  • Size

    5.0MB

  • MD5

    06f4968bbe4bc2595432073659abdb12

  • SHA1

    89e4f5a320643818011c0c22017a866f6fe0198f

  • SHA256

    8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec

  • SHA512

    f15f337793f58ead1817c68d3cecf6189d6027773707a96733ab6c93591f9e286eac28274cba3ee8d86a2b6309ce5b479233fd4372b1c0ff8fb64307c3a8d9b9

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs
  • Executes dropped EXE 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: SetClipboardViewer 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe
    "C:\Users\Admin\AppData\Local\Temp\8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2784
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s "C:\Program Files\RMS\regedit.reg"
      2⤵
      • Runs .reg file with regedit
      PID:1944
    • C:\Program Files\RMS\Windows.exe
      "C:\Program Files\RMS\Windows.exe" /silentinstall
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3448
    • C:\Program Files\RMS\Windows.exe
      "C:\Program Files\RMS\Windows.exe" /firewall
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3864
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s "C:\Program Files\RMS\regedit.reg"
      2⤵
      • Runs .reg file with regedit
      PID:4088
    • C:\Program Files\RMS\Windows.exe
      "C:\Program Files\RMS\Windows.exe" /start
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1796
  • C:\Program Files\RMS\Windows.exe
    "C:\Program Files\RMS\Windows.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Program Files\RMS\Windowsx32.exe
      "C:\Program Files\RMS\Windowsx32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Program Files\RMS\Windowsx32.exe
        "C:\Program Files\RMS\Windowsx32.exe" /tray
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: SetClipboardViewer
        PID:2436
    • C:\Program Files\RMS\Windowsx32.exe
      "C:\Program Files\RMS\Windowsx32.exe" /tray
      2⤵
      • Executes dropped EXE
      PID:3792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-148-0x0000000000400000-0x00000000009B6000-memory.dmp

    Filesize

    5.7MB

  • memory/2192-149-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

    Filesize

    4KB

  • memory/2784-130-0x0000000000400000-0x0000000000BF9000-memory.dmp

    Filesize

    8.0MB

  • memory/2784-145-0x0000000000400000-0x0000000000BF9000-memory.dmp

    Filesize

    8.0MB

  • memory/3244-147-0x00000000014F0000-0x00000000014F1000-memory.dmp

    Filesize

    4KB

  • memory/3448-137-0x0000000000400000-0x0000000000AA1000-memory.dmp

    Filesize

    6.6MB

  • memory/3792-146-0x0000000002750000-0x0000000002751000-memory.dmp

    Filesize

    4KB