Analysis
-
max time kernel
4294223s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
04c8196c86c206783bdb7ab846534328.exe
Resource
win7-20220310-en
0 signatures
0 seconds
General
-
Target
04c8196c86c206783bdb7ab846534328.exe
-
Size
15.1MB
-
MD5
04c8196c86c206783bdb7ab846534328
-
SHA1
949bbc7eb298f29fc39beb5297fde49ab9175950
-
SHA256
d33b0bce0ea5e62ba7480d8e150e021bf9151f5308400dac01a133fa4a94cbba
-
SHA512
e4968310b99251e509d367d0e25f642c957de523b4635165f0e4d01fc8c849c8724d1f78f6b329f12d66f54618e693d4992fd24c9773348ae27aac4b9ea8e580
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1620 rfusclient.exe 1952 rutserv.exe 992 rutserv.exe 1120 rfusclient.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 536 04c8196c86c206783bdb7ab846534328.exe 1620 rfusclient.exe 1620 rfusclient.exe 1620 rfusclient.exe 1620 rfusclient.exe 1952 rutserv.exe 1952 rutserv.exe 992 rutserv.exe 992 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1620 rfusclient.exe 1620 rfusclient.exe 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe 1120 rfusclient.exe 1120 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1952 rutserv.exe Token: SeTakeOwnershipPrivilege 992 rutserv.exe Token: SeTcbPrivilege 992 rutserv.exe Token: SeTcbPrivilege 992 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1120 rfusclient.exe 1120 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1120 rfusclient.exe 1120 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 1952 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe 992 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 536 wrote to memory of 1620 536 04c8196c86c206783bdb7ab846534328.exe 29 PID 536 wrote to memory of 1620 536 04c8196c86c206783bdb7ab846534328.exe 29 PID 536 wrote to memory of 1620 536 04c8196c86c206783bdb7ab846534328.exe 29 PID 536 wrote to memory of 1620 536 04c8196c86c206783bdb7ab846534328.exe 29 PID 1620 wrote to memory of 1952 1620 rfusclient.exe 30 PID 1620 wrote to memory of 1952 1620 rfusclient.exe 30 PID 1620 wrote to memory of 1952 1620 rfusclient.exe 30 PID 1620 wrote to memory of 1952 1620 rfusclient.exe 30 PID 992 wrote to memory of 1120 992 rutserv.exe 32 PID 992 wrote to memory of 1120 992 rutserv.exe 32 PID 992 wrote to memory of 1120 992 rutserv.exe 32 PID 992 wrote to memory of 1120 992 rutserv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c8196c86c206783bdb7ab846534328.exe"C:\Users\Admin\AppData\Local\Temp\04c8196c86c206783bdb7ab846534328.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rutserv.exe" -run_agent3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rutserv.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rfusclient.exe"C:\Users\Admin\AppData\Roaming\RMS Agent\70001\4F2A842DE2\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1120
-
-
-
-