Overview
overview
10Static
static
8install.bat
windows7_x64
10install.bat
windows10-2004_x64
10install.vbs
windows7_x64
10install.vbs
windows10-2004_x64
10mailsend.exe
windows7_x64
1mailsend.exe
windows10-2004_x64
1rfusclient.exe
windows7_x64
1rfusclient.exe
windows10-2004_x64
1rutserv.exe
windows7_x64
10rutserv.exe
windows10-2004_x64
10vp8decoder.dll
windows7_x64
1vp8decoder.dll
windows10-2004_x64
1vp8encoder.dll
windows7_x64
1vp8encoder.dll
windows10-2004_x64
1Analysis
-
max time kernel
4294181s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
17-03-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
install.vbs
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
install.vbs
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mailsend.exe
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
mailsend.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
rfusclient.exe
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
rfusclient.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
rutserv.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
rutserv.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
vp8decoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
vp8decoder.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
vp8encoder.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
vp8encoder.dll
Resource
win10v2004-20220310-en
General
-
Target
rutserv.exe
-
Size
9.5MB
-
MD5
d10dae1197db0b694c832ae512b34024
-
SHA1
24757c07c814d53ded645547bc53e29c98919077
-
SHA256
74892811c87f574aea6d8b3a5419845a58096deaece96a9c6f06e5ad4f8859be
-
SHA512
f968b9084c51aa3b4f24cf99ee0d354f323d435ad7c15a884bf16dc3b8d67f721d4c7bb5f111a44033a15d820f58e813e0dccbf1f84bd3ca736a0c57bd98395e
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\International\Geo\Nation rutserv.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rutserv.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1964 rutserv.exe 1964 rutserv.exe 1964 rutserv.exe 1964 rutserv.exe 1964 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1964 rutserv.exe Token: SeTakeOwnershipPrivilege 1596 rutserv.exe Token: SeTcbPrivilege 1596 rutserv.exe Token: SeTcbPrivilege 1596 rutserv.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1964 rutserv.exe 1964 rutserv.exe 1964 rutserv.exe 1964 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe 1596 rutserv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1436 1596 rutserv.exe 28 PID 1596 wrote to memory of 1436 1596 rutserv.exe 28 PID 1596 wrote to memory of 1436 1596 rutserv.exe 28 PID 1596 wrote to memory of 1436 1596 rutserv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\rutserv.exeC:\Users\Admin\AppData\Local\Temp\rutserv.exe -second2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray /user3⤵PID:1436
-
-