Analysis
-
max time kernel
4294214s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 17:53
Static task
static1
Behavioral task
behavioral1
Sample
b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe
Resource
win10v2004-20220310-en
General
-
Target
b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe
-
Size
4.7MB
-
MD5
07df176023a74870f154494e50cf1a4c
-
SHA1
2ccd182a1b76b64e93d8fe1bb76c9d7956651a87
-
SHA256
b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6
-
SHA512
e8b00a91a0e9b69988c7673c32a97cc05569862f406f526e13aaa808686c44a866ceded9e56d8bc7bd96739ac9c7f2ceec1e9e88ac16fe5104faeefb10cc0bab
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 276 ##HACK##.exe 1804 mpv.exe 1284 WmiPrvSE.exe 1800 WBP.exe 900 mespv.exe 1964 pv.exe 364 rutserv.exe 1876 rutserv.exe 1956 rutserv.exe 808 rfusclient.exe 1460 rfusclient.exe -
resource yara_rule behavioral1/files/0x00070000000133b6-64.dat upx behavioral1/files/0x00070000000133b6-65.dat upx behavioral1/files/0x00070000000133b6-66.dat upx behavioral1/files/0x00070000000133b6-67.dat upx behavioral1/files/0x00070000000133b6-69.dat upx behavioral1/files/0x0009000000012749-77.dat upx -
Loads dropped DLL 7 IoCs
pid Process 276 ##HACK##.exe 276 ##HACK##.exe 276 ##HACK##.exe 276 ##HACK##.exe 1416 cmd.exe 1416 cmd.exe 1956 rutserv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts mpv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8encoder.dll ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\__tmp_rar_sfx_access_check_259544682 ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\install.bat ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\vp8decoder.dll ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\russian.lg ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\regedit.reg ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog attrib.exe File created C:\Windows\SysWOW64\vipcatalog\install.bat ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\rfusclient.exe ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\rutserv.exe ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rutserv.exe ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\rfusclient.exe ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\WmiPrvSE.exe ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\russian.lg ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\1.reg ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\start.vbs ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\start.vbs ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\vp8decoder.dll ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\vp8encoder.dll ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\WmiPrvSE.exe ##HACK##.exe File opened for modification C:\Windows\SysWOW64\vipcatalog\1.reg ##HACK##.exe File created C:\Windows\SysWOW64\vipcatalog\regedit.reg ##HACK##.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1636 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 1292 taskkill.exe 820 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1584 regedit.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 364 rutserv.exe 364 rutserv.exe 364 rutserv.exe 364 rutserv.exe 1876 rutserv.exe 1876 rutserv.exe 1956 rutserv.exe 1956 rutserv.exe 1956 rutserv.exe 1956 rutserv.exe 808 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 900 mespv.exe Token: SeDebugPrivilege 1292 taskkill.exe Token: SeDebugPrivilege 820 taskkill.exe Token: SeDebugPrivilege 364 rutserv.exe Token: SeDebugPrivilege 1876 rutserv.exe Token: SeTakeOwnershipPrivilege 1956 rutserv.exe Token: SeTcbPrivilege 1956 rutserv.exe Token: SeTcbPrivilege 1956 rutserv.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 364 rutserv.exe 1876 rutserv.exe 1956 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 276 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 29 PID 1084 wrote to memory of 1804 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 30 PID 1084 wrote to memory of 1804 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 30 PID 1084 wrote to memory of 1804 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 30 PID 1084 wrote to memory of 1804 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 30 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1984 276 ##HACK##.exe 31 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 276 wrote to memory of 1284 276 ##HACK##.exe 32 PID 1084 wrote to memory of 1800 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 33 PID 1084 wrote to memory of 1800 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 33 PID 1084 wrote to memory of 1800 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 33 PID 1084 wrote to memory of 1800 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 33 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1984 wrote to memory of 1416 1984 WScript.exe 35 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1416 wrote to memory of 1292 1416 cmd.exe 37 PID 1084 wrote to memory of 900 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 38 PID 1084 wrote to memory of 900 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 38 PID 1084 wrote to memory of 900 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 38 PID 1084 wrote to memory of 900 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 38 PID 1084 wrote to memory of 1964 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 39 PID 1084 wrote to memory of 1964 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 39 PID 1084 wrote to memory of 1964 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 39 PID 1084 wrote to memory of 1964 1084 b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe 39 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 820 1416 cmd.exe 41 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 PID 1416 wrote to memory of 1960 1416 cmd.exe 42 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 948 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe"C:\Users\Admin\AppData\Local\Temp\b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\##HACK##.exe"C:\Users\Admin\AppData\Local\Temp\##HACK##.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\vipcatalog\start.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\System32\vipcatalog\install.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f5⤵PID:1960
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\System32\vipcatalog"5⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:948
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /silentinstall5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:364
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s regedit.reg5⤵
- Runs .reg file with regedit
PID:1584
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exe"rutserv.exe" /start5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:1636
-
-
-
-
C:\Windows\SysWOW64\vipcatalog\WmiPrvSE.exe"C:\Windows\System32\vipcatalog\WmiPrvSE.exe"3⤵
- Executes dropped EXE
PID:1284
-
-
-
C:\Users\Admin\AppData\Local\Temp\mpv.exeC:\Users\Admin\AppData\Local\Temp\mpv.exe /stext C:\Users\Admin\AppData\Local\Temp\mpvp.txt2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\WBP.exeC:\Users\Admin\AppData\Local\Temp\WBP.exe /stext C:\Users\Admin\AppData\Local\Temp\WBVP.txt2⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\mespv.exeC:\Users\Admin\AppData\Local\Temp\mespv.exe /stext C:\Users\Admin\AppData\Local\Temp\mespvp.txt2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\pv.exeC:\Users\Admin\AppData\Local\Temp\pv.exe /stext C:\Users\Admin\AppData\Local\Temp\pvp.txt2⤵
- Executes dropped EXE
PID:1964
-
-
C:\Windows\SysWOW64\vipcatalog\rutserv.exeC:\Windows\SysWOW64\vipcatalog\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Windows\SysWOW64\vipcatalog\rfusclient.exeC:\Windows\SysWOW64\vipcatalog\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:1460
-