Analysis
-
max time kernel
4294206s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
11-03-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe
Resource
win7-20220223-en
0 signatures
0 seconds
General
-
Target
c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe
-
Size
9.7MB
-
MD5
3274c8646fb85f70e22374e61804525f
-
SHA1
3c630d65bdf87dc8981b0900af3eeafd053c2240
-
SHA256
c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba
-
SHA512
ff86e11844547a047110f919062c9c72d79b441c4f7cdf96d92ca10c9afbd4ccb0e5f56067a506b62a1f1049660c2b7478770dac2c90b0e498669b683f13b279
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 844 install.sfx.exe 1684 install.exe 1520 rutserv.exe 636 rutserv.exe 1332 rutserv.exe 1312 rutserv.exe 956 rfusclient.exe 1780 rfusclient.exe 1540 rfusclient.exe -
resource yara_rule behavioral1/files/0x00080000000122ed-77.dat upx behavioral1/files/0x00080000000122ef-78.dat upx behavioral1/files/0x00080000000122f3-82.dat upx behavioral1/files/0x00080000000122f5-83.dat upx behavioral1/files/0x00080000000122f5-86.dat upx behavioral1/files/0x00080000000122f5-87.dat upx behavioral1/files/0x00080000000122f5-90.dat upx behavioral1/files/0x00080000000122f5-91.dat upx behavioral1/files/0x00080000000122f5-94.dat upx behavioral1/files/0x00080000000122f5-93.dat upx behavioral1/files/0x00080000000122f5-96.dat upx behavioral1/files/0x00080000000122f3-99.dat upx behavioral1/files/0x00080000000122f3-102.dat upx behavioral1/files/0x00080000000122f3-100.dat upx behavioral1/files/0x00080000000122f3-98.dat upx behavioral1/files/0x00080000000122f3-114.dat upx -
Loads dropped DLL 9 IoCs
pid Process 1868 cmd.exe 844 install.sfx.exe 844 install.sfx.exe 844 install.sfx.exe 624 cmd.exe 624 cmd.exe 624 cmd.exe 1312 rutserv.exe 1312 rutserv.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows\run.bat c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File opened for modification C:\Program Files\Server\vp8encoder.dll cmd.exe File opened for modification C:\Program Files\Server\rutserv.exe attrib.exe File opened for modification C:\Program Files\Server\vp8encoder.dll attrib.exe File opened for modification C:\Program Files (x86)\Windows c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File created C:\Program Files (x86)\Windows\run.bat c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File created C:\Program Files\Server\vp8decoder.dll cmd.exe File opened for modification C:\Program Files\Server\vp8decoder.dll cmd.exe File created C:\Program Files\Server\vp8encoder.dll cmd.exe File opened for modification C:\Program Files\Server\rfusclient.exe attrib.exe File created C:\Program Files (x86)\Windows\__tmp_rar_sfx_access_check_259397854 c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File opened for modification C:\Program Files (x86)\Windows\install.sfx.exe c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File created C:\Program Files\Server\rfusclient.exe cmd.exe File opened for modification C:\Program Files\Server\rfusclient.exe cmd.exe File created C:\Program Files\Server\rutserv.exe cmd.exe File opened for modification C:\Program Files\Server\vp8decoder.dll attrib.exe File created C:\Program Files (x86)\Windows\install.sfx.exe c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe File opened for modification C:\Program Files\Server\rutserv.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 1808 timeout.exe 1868 timeout.exe 1032 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 1304 taskkill.exe 1104 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1704 regedit.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1520 rutserv.exe 1520 rutserv.exe 1520 rutserv.exe 1520 rutserv.exe 636 rutserv.exe 636 rutserv.exe 1332 rutserv.exe 1332 rutserv.exe 1312 rutserv.exe 1312 rutserv.exe 1312 rutserv.exe 1312 rutserv.exe 1780 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1540 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1304 taskkill.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 1520 rutserv.exe Token: SeDebugPrivilege 1332 rutserv.exe Token: SeTakeOwnershipPrivilege 1312 rutserv.exe Token: SeTcbPrivilege 1312 rutserv.exe Token: SeTcbPrivilege 1312 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1520 rutserv.exe 636 rutserv.exe 1332 rutserv.exe 1312 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 1868 756 c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe 27 PID 756 wrote to memory of 1868 756 c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe 27 PID 756 wrote to memory of 1868 756 c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe 27 PID 756 wrote to memory of 1868 756 c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe 27 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 1868 wrote to memory of 844 1868 cmd.exe 29 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 844 wrote to memory of 1684 844 install.sfx.exe 30 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1684 wrote to memory of 1444 1684 install.exe 31 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 1444 wrote to memory of 624 1444 WScript.exe 33 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1304 624 cmd.exe 34 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1104 624 cmd.exe 36 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1620 624 cmd.exe 37 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1704 624 cmd.exe 38 PID 624 wrote to memory of 1032 624 cmd.exe 39 PID 624 wrote to memory of 1032 624 cmd.exe 39 PID 624 wrote to memory of 1032 624 cmd.exe 39 PID 624 wrote to memory of 1032 624 cmd.exe 39 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 268 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe"C:\Users\Admin\AppData\Local\Temp\c0fe78cf0f184149f48658b4d0e82cbad6204ec03785c39716750cf45bcf30ba.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Windows\run.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Windows\install.sfx.exeinstall.sfx.exe -p666666 -dc:/Program Files (x86)/Windows3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program\install.exe"C:\Program\install.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Hex\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Hex\install.bat" "6⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:1620
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:1704
-
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
PID:1032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:1808
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\Server\*.*"7⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:268
-
-
C:\Program Files\Server\rutserv.exerutserv.exe /silentinstall7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Program Files\Server\rutserv.exerutserv.exe /firewall7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:636
-
-
C:\Program Files\Server\rutserv.exerutserv.exe /start7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:1868
-
-
-
-
-
-
-
C:\Program Files\Server\rutserv.exe"C:\Program Files\Server\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Program Files\Server\rfusclient.exe"C:\Program Files\Server\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:956
-
-
C:\Program Files\Server\rfusclient.exe"C:\Program Files\Server\rfusclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Program Files\Server\rfusclient.exe"C:\Program Files\Server\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1540
-
-