Overview
overview
10Static
static
8install.bat
windows7_x64
10install.bat
windows10-2004_x64
10install.vbs
windows7_x64
10install.vbs
windows10-2004_x64
10mailsend.exe
windows7_x64
1mailsend.exe
windows10-2004_x64
1rfusclient.exe
windows7_x64
1rfusclient.exe
windows10-2004_x64
1rutserv.exe
windows7_x64
10rutserv.exe
windows10-2004_x64
10vp8decoder.dll
windows7_x64
1vp8decoder.dll
windows10-2004_x64
1vp8encoder.dll
windows7_x64
1vp8encoder.dll
windows10-2004_x64
1Analysis
-
max time kernel
111s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
17-03-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
install.vbs
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
install.vbs
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mailsend.exe
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
mailsend.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
rfusclient.exe
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
rfusclient.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
rutserv.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
rutserv.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
vp8decoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
vp8decoder.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
vp8encoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
vp8encoder.dll
Resource
win10v2004-20220310-en
General
-
Target
install.bat
-
Size
1KB
-
MD5
125b0e626d1babc93c042cf84dd33c05
-
SHA1
d5f01d546be84337306306f71e6bc612442481d8
-
SHA256
8df26877285b0fb8dd52db09da874c24c02e9f1a4d6794752d6ac556e4f927b3
-
SHA512
e6213ef36cc70cc257b671f9dbf590c96e5bcd02196b1de90b2b7be019035f2a859c98003be963983a0f86cf6695aed1db3a3e26b22c1f49bca79d1af9cc6ca5
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Delays execution with timeout.exe 2 IoCs
pid Process 4028 timeout.exe 1092 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 672 taskkill.exe 3868 taskkill.exe 4024 taskkill.exe 2768 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe -
Runs .reg file with regedit 1 IoCs
pid Process 568 regedit.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 632 rutserv.exe 632 rutserv.exe 632 rutserv.exe 632 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 1036 rfusclient.exe 1036 rfusclient.exe 2408 rutserv.exe 2408 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 672 taskkill.exe Token: SeDebugPrivilege 3868 taskkill.exe Token: SeDebugPrivilege 4024 taskkill.exe Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 3568 rutserv.exe Token: SeDebugPrivilege 3840 rutserv.exe Token: SeTakeOwnershipPrivilege 2516 rutserv.exe Token: SeTcbPrivilege 2516 rutserv.exe Token: SeTcbPrivilege 2516 rutserv.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 3568 rutserv.exe 632 rutserv.exe 632 rutserv.exe 632 rutserv.exe 632 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 3840 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2516 rutserv.exe 2408 rutserv.exe 2408 rutserv.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3468 2352 cmd.exe 82 PID 2352 wrote to memory of 3468 2352 cmd.exe 82 PID 2352 wrote to memory of 1372 2352 cmd.exe 88 PID 2352 wrote to memory of 1372 2352 cmd.exe 88 PID 2352 wrote to memory of 672 2352 cmd.exe 89 PID 2352 wrote to memory of 672 2352 cmd.exe 89 PID 2352 wrote to memory of 3868 2352 cmd.exe 90 PID 2352 wrote to memory of 3868 2352 cmd.exe 90 PID 2352 wrote to memory of 4024 2352 cmd.exe 91 PID 2352 wrote to memory of 4024 2352 cmd.exe 91 PID 2352 wrote to memory of 2768 2352 cmd.exe 92 PID 2352 wrote to memory of 2768 2352 cmd.exe 92 PID 2352 wrote to memory of 2512 2352 cmd.exe 93 PID 2352 wrote to memory of 2512 2352 cmd.exe 93 PID 2352 wrote to memory of 568 2352 cmd.exe 94 PID 2352 wrote to memory of 568 2352 cmd.exe 94 PID 2352 wrote to memory of 1092 2352 cmd.exe 95 PID 2352 wrote to memory of 1092 2352 cmd.exe 95 PID 2352 wrote to memory of 3568 2352 cmd.exe 96 PID 2352 wrote to memory of 3568 2352 cmd.exe 96 PID 2352 wrote to memory of 3568 2352 cmd.exe 96 PID 2352 wrote to memory of 632 2352 cmd.exe 97 PID 2352 wrote to memory of 632 2352 cmd.exe 97 PID 2352 wrote to memory of 632 2352 cmd.exe 97 PID 2352 wrote to memory of 3840 2352 cmd.exe 98 PID 2352 wrote to memory of 3840 2352 cmd.exe 98 PID 2352 wrote to memory of 3840 2352 cmd.exe 98 PID 2516 wrote to memory of 1036 2516 rutserv.exe 102 PID 2516 wrote to memory of 1036 2516 rutserv.exe 102 PID 2516 wrote to memory of 1036 2516 rutserv.exe 102 PID 2516 wrote to memory of 2168 2516 rutserv.exe 101 PID 2516 wrote to memory of 2168 2516 rutserv.exe 101 PID 2516 wrote to memory of 2168 2516 rutserv.exe 101 PID 2352 wrote to memory of 2120 2352 cmd.exe 103 PID 2352 wrote to memory of 2120 2352 cmd.exe 103 PID 2352 wrote to memory of 2960 2352 cmd.exe 104 PID 2352 wrote to memory of 2960 2352 cmd.exe 104 PID 2352 wrote to memory of 2996 2352 cmd.exe 106 PID 2352 wrote to memory of 2996 2352 cmd.exe 106 PID 2352 wrote to memory of 4028 2352 cmd.exe 107 PID 2352 wrote to memory of 4028 2352 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1372 attrib.exe 3468 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3468
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D2⤵
- Views/modifies file attributes
PID:1372
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rutserv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rutserv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rfusclient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rfusclient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f2⤵PID:2512
-
-
C:\Windows\regedit.exeregedit /s "regedit.reg"2⤵
- Runs .reg file with regedit
PID:568
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /silentinstall2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /firewall2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /start2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3840
-
-
C:\Windows\system32\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10002⤵PID:2120
-
-
C:\Windows\system32\sc.exesc config RManService obj= LocalSystem type= interact type= own2⤵PID:2960
-
-
C:\Windows\system32\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"2⤵PID:2996
-
-
C:\Windows\system32\timeout.exetimeout 1202⤵
- Delays execution with timeout.exe
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray3⤵PID:3824
-
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:780
-