Analysis
-
max time kernel
4294218s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
19-03-2022 13:18
Static task
static1
Behavioral task
behavioral1
Sample
d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe
Resource
win10v2004-20220310-en
General
-
Target
d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe
-
Size
8.1MB
-
MD5
89e13b57f61901ec9137dd7ed11dad01
-
SHA1
62f2de5d10c001e69dcd8958eb52bec31caec16d
-
SHA256
d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20
-
SHA512
2feeb0463b386517dee8e7d3488f2cb89059b7c614e3abc8c02576bad2ac53e33619da139658d321869c62cd2184d14ba95a3cfa451eebde4547a0ba54ccd873
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000014987-96.dat acprotect behavioral1/files/0x0006000000014a92-97.dat acprotect -
resource yara_rule behavioral1/files/0x0006000000014b3e-94.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-95.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-105.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-106.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-108.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-115.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-116.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-118.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-126.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-125.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-128.dat aspack_v212_v242 behavioral1/files/0x0007000000014ac1-134.dat aspack_v212_v242 behavioral1/files/0x0006000000014b3e-141.dat aspack_v212_v242 behavioral1/files/0x0006000000014b3e-142.dat aspack_v212_v242 behavioral1/files/0x0006000000014b3e-146.dat aspack_v212_v242 behavioral1/files/0x0006000000014b3e-161.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 1972 CDS.exe 452 crypted.exe 760 windows32.exe 1448 rutserv.exe 1820 rutserv.exe 600 rutserv.exe 1628 rutserv.exe 1148 rfusclient.exe 568 rfusclient.exe 808 rfusclient.exe -
resource yara_rule behavioral1/files/0x0006000000014987-96.dat upx behavioral1/files/0x0006000000014a92-97.dat upx -
Loads dropped DLL 19 IoCs
pid Process 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 1972 CDS.exe 1972 CDS.exe 1972 CDS.exe 1972 CDS.exe 1972 CDS.exe 1972 CDS.exe 452 crypted.exe 452 crypted.exe 452 crypted.exe 452 crypted.exe 760 windows32.exe 548 cmd.exe 1448 rutserv.exe 548 cmd.exe 1820 rutserv.exe 548 cmd.exe 600 rutserv.exe 1628 rutserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files\System\install.vbs windows32.exe File created C:\Program Files\System\vp8decoder.dll windows32.exe File opened for modification C:\Program Files\Common Files\System attrib.exe File opened for modification C:\Program Files\System attrib.exe File opened for modification C:\Program Files\System windows32.exe File opened for modification C:\Program Files\System\rfusclient.exe windows32.exe File created C:\Program Files\System\mailsend.exe windows32.exe File created C:\Program Files\System\rfusclient.exe windows32.exe File opened for modification C:\Program Files\System\regedit.reg windows32.exe File opened for modification C:\Program Files\System\mailsend.exe windows32.exe File created C:\Program Files\System\vp8encoder.dll windows32.exe File opened for modification C:\Program Files\System\install.bat windows32.exe File opened for modification C:\Program Files\System\mailsend.exe attrib.exe File created C:\Program Files\System\install.bat windows32.exe File opened for modification C:\Program Files\System\vp8encoder.dll windows32.exe File created C:\Program Files\System\rutserv.exe windows32.exe File opened for modification C:\Program Files\System\install.bat attrib.exe File opened for modification C:\Program Files\System\regedit.reg attrib.exe File opened for modification C:\Program Files\System\rfusclient.exe attrib.exe File opened for modification C:\Program Files\System\rutserv.exe attrib.exe File created C:\Program Files\System\__tmp_rar_sfx_access_check_259471424 windows32.exe File created C:\Program Files\System\regedit.reg windows32.exe File opened for modification C:\Program Files\System\vp8decoder.dll windows32.exe File opened for modification C:\Program Files\System\rutserv.exe windows32.exe File opened for modification C:\Program Files\System\install.vbs attrib.exe File opened for modification C:\Program Files\System\vp8decoder.dll attrib.exe File opened for modification C:\Program Files\System\vp8encoder.dll attrib.exe File created C:\Program Files\System\install.vbs windows32.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1688 timeout.exe 664 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 108 taskkill.exe 1172 taskkill.exe 1736 taskkill.exe 1860 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 576 regedit.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1972 CDS.exe 1972 CDS.exe 1448 rutserv.exe 1448 rutserv.exe 1448 rutserv.exe 1448 rutserv.exe 1820 rutserv.exe 1820 rutserv.exe 600 rutserv.exe 600 rutserv.exe 1628 rutserv.exe 1628 rutserv.exe 1628 rutserv.exe 1628 rutserv.exe 1148 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 808 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 108 taskkill.exe Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 1448 rutserv.exe Token: SeDebugPrivilege 600 rutserv.exe Token: SeTakeOwnershipPrivilege 1628 rutserv.exe Token: SeTcbPrivilege 1628 rutserv.exe Token: SeTcbPrivilege 1628 rutserv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 CDS.exe 1972 CDS.exe 1448 rutserv.exe 1820 rutserv.exe 600 rutserv.exe 1628 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1980 wrote to memory of 1972 1980 d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe 27 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 1972 wrote to memory of 452 1972 CDS.exe 30 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 452 wrote to memory of 760 452 crypted.exe 31 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 760 wrote to memory of 768 760 windows32.exe 32 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 768 wrote to memory of 548 768 WScript.exe 33 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 1264 548 cmd.exe 35 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 2028 548 cmd.exe 37 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 108 548 cmd.exe 38 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1172 548 cmd.exe 40 PID 548 wrote to memory of 1736 548 cmd.exe 41 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1264 attrib.exe 2028 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe"C:\Users\Admin\AppData\Local\Temp\d323807515f83943d6b6a268a39feef1b61b0c2db5de5e2bb6d2cb5ad78d5a20.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\windows32.exe"C:\Users\Admin\AppData\Local\Temp\windows32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\System\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\System\install.bat" "6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\System" +H +S /S /D7⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1264
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\System\*.*" +H +S /S /D7⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:1464
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:576
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Program Files\System\rutserv.exerutserv.exe /silentinstall7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Program Files\System\rutserv.exerutserv.exe /firewall7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Program Files\System\rutserv.exerutserv.exe /start7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:600
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10007⤵PID:576
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own7⤵PID:1824
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"7⤵PID:1484
-
-
C:\Windows\SysWOW64\timeout.exetimeout 1207⤵
- Delays execution with timeout.exe
PID:664
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1460
-
C:\Program Files\System\rutserv.exe"C:\Program Files\System\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1148 -
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:808
-
-
-
C:\Program Files\System\rfusclient.exe"C:\Program Files\System\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:568
-