Analysis

  • max time kernel
    4294210s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    14-03-2022 02:11

General

  • Target

    d970b41099d916b86fce2da5574054f2fb7e42f386a5aefe9a9793071307ea3a.exe

  • Size

    9.3MB

  • MD5

    974e935a91b133666e1cd10901d5cfaf

  • SHA1

    eabd2136a8870cba64e969fd5cedccf58d6c5b2c

  • SHA256

    d970b41099d916b86fce2da5574054f2fb7e42f386a5aefe9a9793071307ea3a

  • SHA512

    4964bb2ca9ebad86904fad3f8276bd239814a39392af6d61ef8bf2bdf7ca0c04f8aa6697ffe911bc367017f59813e2d2d3150d9b11fd12090619670660c12990

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 13 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Disables RegEdit via registry modification
  • Executes dropped EXE 9 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d970b41099d916b86fce2da5574054f2fb7e42f386a5aefe9a9793071307ea3a.exe
    "C:\Users\Admin\AppData\Local\Temp\d970b41099d916b86fce2da5574054f2fb7e42f386a5aefe9a9793071307ea3a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\bel3st.exe
      "C:\Users\Admin\AppData\Local\Temp\bel3st.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\program files\java\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Program Files\Java\install.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:612
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im rutserv.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im rfusclient.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
            5⤵
              PID:1012
            • C:\Windows\SysWOW64\regedit.exe
              regedit /s "regedit.reg"
              5⤵
              • Runs .reg file with regedit
              PID:996
            • C:\Windows\SysWOW64\regedit.exe
              regedit /s "Disable_Open-File_Security_Warning.reg"
              5⤵
              • Runs .reg file with regedit
              PID:2024
            • C:\Windows\SysWOW64\regedit.exe
              regedit /s "vir.reg"
              5⤵
              • Modifies system executable filetype association
              • Modifies registry class
              • Runs .reg file with regedit
              PID:1436
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisableRegistryTools /f /d 0
              5⤵
                PID:1776
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                5⤵
                • Modifies registry key
                PID:1464
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run" /v "BEL3ST" /t REG_SZ /d "C:\bel3st.exe" /f
                5⤵
                • Adds Run key to start application
                PID:2008
              • C:\Windows\SysWOW64\reg.exe
                Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "BELE3ST" /t REG_SZ /d "C:\bel3st.exe" /f
                5⤵
                • Adds Run key to start application
                PID:1700
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                5⤵
                • Delays execution with timeout.exe
                PID:1260
              • \??\c:\program files\java\rutserv.exe
                rutserv.exe /silentinstall
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1488
              • \??\c:\program files\java\rutserv.exe
                rutserv.exe /firewall
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1612
              • \??\c:\program files\java\rutserv.exe
                rutserv.exe /start
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1984
        • C:\Users\Admin\AppData\Local\Temp\ZombieFerma.exe
          "C:\Users\Admin\AppData\Local\Temp\ZombieFerma.exe"
          2⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:692
      • \??\c:\program files\java\rutserv.exe
        "c:\program files\java\rutserv.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1604
        • \??\c:\program files\java\rfusclient.exe
          "c:\program files\java\rfusclient.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1512
          • \??\c:\program files\java\rfusclient.exe
            "c:\program files\java\rfusclient.exe" /tray
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: SetClipboardViewer
            PID:1612
        • \??\c:\program files\java\rfusclient.exe
          "c:\program files\java\rfusclient.exe" /tray
          2⤵
          • Executes dropped EXE
          PID:2036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1488-90-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1488-89-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1488-88-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1488-85-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1488-87-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1488-86-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1512-124-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1512-134-0x00000000001C0000-0x00000000001C1000-memory.dmp

        Filesize

        4KB

      • memory/1512-128-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1512-127-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1512-123-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1512-122-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1604-112-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1604-111-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1604-113-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1604-114-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1604-110-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-139-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-98-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-97-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-96-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-99-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-141-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-140-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-95-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1612-138-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-142-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-143-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/1612-94-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-103-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-104-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-106-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-107-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-105-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-121-0x0000000000400000-0x0000000000AB9000-memory.dmp

        Filesize

        6.7MB

      • memory/1984-54-0x0000000074F21000-0x0000000074F23000-memory.dmp

        Filesize

        8KB

      • memory/2036-129-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/2036-132-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/2036-135-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/2036-131-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/2036-130-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/2036-133-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB

      • memory/2036-144-0x0000000000400000-0x00000000009B6000-memory.dmp

        Filesize

        5.7MB