Overview
overview
10Static
static
8install.bat
windows7_x64
10install.bat
windows10-2004_x64
10install.vbs
windows7_x64
10install.vbs
windows10-2004_x64
10mailsend.exe
windows7_x64
1mailsend.exe
windows10-2004_x64
1rfusclient.exe
windows7_x64
1rfusclient.exe
windows10-2004_x64
1rutserv.exe
windows7_x64
10rutserv.exe
windows10-2004_x64
10vp8decoder.dll
windows7_x64
1vp8decoder.dll
windows10-2004_x64
1vp8encoder.dll
windows7_x64
1vp8encoder.dll
windows10-2004_x64
1Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-03-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
install.vbs
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
install.vbs
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mailsend.exe
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
mailsend.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
rfusclient.exe
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
rfusclient.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
rutserv.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
rutserv.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
vp8decoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
vp8decoder.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
vp8encoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
vp8encoder.dll
Resource
win10v2004-20220310-en
General
-
Target
install.vbs
-
Size
120B
-
MD5
c719a030434d3fa96d62868f27e904a6
-
SHA1
f2f750a752dd1fda8915a47b082af7cf2d3e3655
-
SHA256
2696ee4302a85c6b4101fc6d1ce8e38b94fd9c2bbd1acc73b553576b3aacb92f
-
SHA512
47a9367f7596d19c0636766cd34ca3701d3b1239a284f2333fd04a48422f53b0df21002fd38a4f229f6a2f9f9e8163267e13ecb24d9ce6de1863d5f59ab04ff0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 2236 timeout.exe 2940 timeout.exe 4680 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 3564 taskkill.exe 4316 taskkill.exe 4216 taskkill.exe 4960 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4620 regedit.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 3340 rfusclient.exe 3340 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 4316 taskkill.exe Token: SeDebugPrivilege 4216 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 4236 rutserv.exe Token: SeDebugPrivilege 2028 rutserv.exe Token: SeTakeOwnershipPrivilege 392 rutserv.exe Token: SeTcbPrivilege 392 rutserv.exe Token: SeTcbPrivilege 392 rutserv.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 4236 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 5116 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 2028 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe 392 rutserv.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3636 2964 WScript.exe 78 PID 2964 wrote to memory of 3636 2964 WScript.exe 78 PID 3636 wrote to memory of 3424 3636 cmd.exe 80 PID 3636 wrote to memory of 3424 3636 cmd.exe 80 PID 3636 wrote to memory of 3680 3636 cmd.exe 81 PID 3636 wrote to memory of 3680 3636 cmd.exe 81 PID 3636 wrote to memory of 3564 3636 cmd.exe 82 PID 3636 wrote to memory of 3564 3636 cmd.exe 82 PID 3636 wrote to memory of 4316 3636 cmd.exe 84 PID 3636 wrote to memory of 4316 3636 cmd.exe 84 PID 3636 wrote to memory of 4216 3636 cmd.exe 85 PID 3636 wrote to memory of 4216 3636 cmd.exe 85 PID 3636 wrote to memory of 4960 3636 cmd.exe 86 PID 3636 wrote to memory of 4960 3636 cmd.exe 86 PID 3636 wrote to memory of 4664 3636 cmd.exe 87 PID 3636 wrote to memory of 4664 3636 cmd.exe 87 PID 3636 wrote to memory of 4620 3636 cmd.exe 88 PID 3636 wrote to memory of 4620 3636 cmd.exe 88 PID 3636 wrote to memory of 4680 3636 cmd.exe 89 PID 3636 wrote to memory of 4680 3636 cmd.exe 89 PID 3636 wrote to memory of 4236 3636 cmd.exe 92 PID 3636 wrote to memory of 4236 3636 cmd.exe 92 PID 3636 wrote to memory of 4236 3636 cmd.exe 92 PID 3636 wrote to memory of 5116 3636 cmd.exe 94 PID 3636 wrote to memory of 5116 3636 cmd.exe 94 PID 3636 wrote to memory of 5116 3636 cmd.exe 94 PID 3636 wrote to memory of 2028 3636 cmd.exe 96 PID 3636 wrote to memory of 2028 3636 cmd.exe 96 PID 3636 wrote to memory of 2028 3636 cmd.exe 96 PID 392 wrote to memory of 4788 392 rutserv.exe 100 PID 392 wrote to memory of 4788 392 rutserv.exe 100 PID 392 wrote to memory of 4788 392 rutserv.exe 100 PID 392 wrote to memory of 3340 392 rutserv.exe 99 PID 392 wrote to memory of 3340 392 rutserv.exe 99 PID 392 wrote to memory of 3340 392 rutserv.exe 99 PID 3636 wrote to memory of 4436 3636 cmd.exe 101 PID 3636 wrote to memory of 4436 3636 cmd.exe 101 PID 3636 wrote to memory of 1656 3636 cmd.exe 102 PID 3636 wrote to memory of 1656 3636 cmd.exe 102 PID 3636 wrote to memory of 2208 3636 cmd.exe 104 PID 3636 wrote to memory of 2208 3636 cmd.exe 104 PID 3636 wrote to memory of 2236 3636 cmd.exe 105 PID 3636 wrote to memory of 2236 3636 cmd.exe 105 PID 3636 wrote to memory of 3728 3636 cmd.exe 113 PID 3636 wrote to memory of 3728 3636 cmd.exe 113 PID 3636 wrote to memory of 2940 3636 cmd.exe 114 PID 3636 wrote to memory of 2940 3636 cmd.exe 114 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3424 attrib.exe 3680 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3424
-
-
C:\Windows\system32\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D3⤵
- Views/modifies file attributes
PID:3680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\system32\taskkill.exeTaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:4664
-
-
C:\Windows\regedit.exeregedit /s "regedit.reg"3⤵
- Runs .reg file with regedit
PID:4620
-
-
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /silentinstall3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /firewall3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exerutserv.exe /start3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Windows\system32\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10003⤵PID:4436
-
-
C:\Windows\system32\sc.exesc config RManService obj= LocalSystem type= interact type= own3⤵PID:1656
-
-
C:\Windows\system32\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"3⤵PID:2208
-
-
C:\Windows\system32\timeout.exetimeout 1203⤵
- Delays execution with timeout.exe
PID:2236
-
-
C:\Windows\system32\reg.exereg export "HKEY_LOCAL_MACHINE\SYSTEM\Remote Manipulator System\v4" "id.txt"3⤵PID:3728
-
-
C:\Windows\system32\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray2⤵PID:4788
-