Analysis

  • max time kernel
    4294181s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    17-03-2022 01:27

General

  • Target

    rutserv.exe

  • Size

    9.5MB

  • MD5

    d10dae1197db0b694c832ae512b34024

  • SHA1

    24757c07c814d53ded645547bc53e29c98919077

  • SHA256

    74892811c87f574aea6d8b3a5419845a58096deaece96a9c6f06e5ad4f8859be

  • SHA512

    f968b9084c51aa3b4f24cf99ee0d354f323d435ad7c15a884bf16dc3b8d67f721d4c7bb5f111a44033a15d820f58e813e0dccbf1f84bd3ca736a0c57bd98395e

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rutserv.exe
    "C:\Users\Admin\AppData\Local\Temp\rutserv.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\rutserv.exe
      C:\Users\Admin\AppData\Local\Temp\rutserv.exe -second
      2⤵
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Users\Admin\AppData\Local\Temp\rfusclient.exe
        C:\Users\Admin\AppData\Local\Temp\rfusclient.exe /tray /user
        3⤵
          PID:1436

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1436-62-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-70-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-58-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-59-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-60-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-61-0x0000000000400000-0x00000000009B6000-memory.dmp

      Filesize

      5.7MB

    • memory/1436-69-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1596-63-0x0000000004240000-0x0000000004241000-memory.dmp

      Filesize

      4KB

    • memory/1596-65-0x0000000004250000-0x0000000004251000-memory.dmp

      Filesize

      4KB

    • memory/1596-66-0x0000000004270000-0x0000000004271000-memory.dmp

      Filesize

      4KB

    • memory/1596-67-0x0000000004280000-0x0000000004281000-memory.dmp

      Filesize

      4KB

    • memory/1596-68-0x00000000042A0000-0x00000000042A1000-memory.dmp

      Filesize

      4KB

    • memory/1596-64-0x0000000004290000-0x0000000004291000-memory.dmp

      Filesize

      4KB

    • memory/1596-56-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

      Filesize

      4KB

    • memory/1964-54-0x0000000074FF1000-0x0000000074FF3000-memory.dmp

      Filesize

      8KB