Analysis
-
max time kernel
4294209s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 20:14
Static task
static1
Behavioral task
behavioral1
Sample
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe
Resource
win7-20220311-en
0 signatures
0 seconds
General
-
Target
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe
-
Size
4.5MB
-
MD5
aa49af78c5949910f09e3d303f2b7680
-
SHA1
cf9d1787f45ee932791ab0a797a2fc67ecb5eb17
-
SHA256
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222
-
SHA512
85c0a891667aafb44eca64d978eca2346771095f440880328749fd99ee7000f527a163a8985782a30a845f7dfab43eb66a61619948759508193453ca33ba2205
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000800000001273a-70.dat acprotect behavioral1/files/0x0009000000012697-69.dat acprotect -
resource yara_rule behavioral1/files/0x0006000000013101-68.dat aspack_v212_v242 behavioral1/files/0x000700000001274a-67.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-85.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-87.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-95.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-97.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-105.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-107.dat aspack_v212_v242 behavioral1/files/0x0006000000013101-114.dat aspack_v212_v242 behavioral1/files/0x000700000001274a-121.dat aspack_v212_v242 behavioral1/files/0x000700000001274a-122.dat aspack_v212_v242 behavioral1/files/0x000700000001274a-125.dat aspack_v212_v242 behavioral1/files/0x000700000001274a-127.dat aspack_v212_v242 -
Executes dropped EXE 6 IoCs
pid Process 1524 rutserv.exe 304 rutserv.exe 916 rutserv.exe 1584 rutserv.exe 1752 rfusclient.exe 520 rfusclient.exe -
resource yara_rule behavioral1/files/0x000800000001273a-70.dat upx behavioral1/files/0x0009000000012697-69.dat upx -
Loads dropped DLL 5 IoCs
pid Process 1652 cmd.exe 1652 cmd.exe 1652 cmd.exe 1584 rutserv.exe 1584 rutserv.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\System\vp8decoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\rutserv.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\vp8decoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\rfusclient.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\install.bat attrib.exe File created C:\Program Files (x86)\System\__tmp_rar_sfx_access_check_259405357 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8encoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\install.bat 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\rfusclient.exe attrib.exe File created C:\Program Files (x86)\System\vp8encoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\regedit.reg attrib.exe File created C:\Program Files (x86)\System\id.txt reg.exe File opened for modification C:\Program Files (x86)\System 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\rutserv.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\mailsend.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe File opened for modification C:\Program Files (x86)\System\install.vbs attrib.exe File opened for modification C:\Program Files (x86)\System\mailsend.exe attrib.exe File created C:\Program Files (x86)\System\regedit.reg 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\regedit.reg 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\mailsend.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\install.vbs 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8decoder.dll attrib.exe File opened for modification C:\Program Files (x86)\System\vp8encoder.dll attrib.exe File opened for modification C:\Program Files (x86)\System\id.txt reg.exe File created C:\Program Files (x86)\System\install.vbs 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\rutserv.exe attrib.exe File opened for modification C:\Program Files (x86)\System\rfusclient.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\install.bat 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 1348 timeout.exe 956 timeout.exe 1700 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 432 taskkill.exe 1816 taskkill.exe 1848 taskkill.exe 1132 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1732 regedit.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1524 rutserv.exe 1524 rutserv.exe 1524 rutserv.exe 1524 rutserv.exe 304 rutserv.exe 304 rutserv.exe 916 rutserv.exe 916 rutserv.exe 1584 rutserv.exe 1584 rutserv.exe 1584 rutserv.exe 1584 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 1848 taskkill.exe Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 1524 rutserv.exe Token: SeDebugPrivilege 916 rutserv.exe Token: SeTakeOwnershipPrivilege 1584 rutserv.exe Token: SeTcbPrivilege 1584 rutserv.exe Token: SeTcbPrivilege 1584 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1524 rutserv.exe 304 rutserv.exe 916 rutserv.exe 1584 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1212 wrote to memory of 1752 1212 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 27 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1752 wrote to memory of 1652 1752 WScript.exe 28 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1644 1652 cmd.exe 30 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 1384 1652 cmd.exe 31 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 432 1652 cmd.exe 32 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1816 1652 cmd.exe 34 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1848 1652 cmd.exe 35 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1132 1652 cmd.exe 36 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1504 1652 cmd.exe 37 PID 1652 wrote to memory of 1732 1652 cmd.exe 38 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1644 attrib.exe 1384 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe"C:\Users\Admin\AppData\Local\Temp\34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\System\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1644
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rutserv.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rfusclient.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f4⤵PID:1504
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"4⤵
- Runs .reg file with regedit
PID:1732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
PID:1348
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /silentinstall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /firewall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:304
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /start4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10004⤵PID:1368
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own4⤵PID:1020
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"4⤵PID:1816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 1204⤵
- Delays execution with timeout.exe
PID:956
-
-
C:\Windows\SysWOW64\reg.exereg export "HKEY_LOCAL_MACHINE\SYSTEM\Remote Manipulator System\v4" "id.txt"4⤵
- Drops file in Program Files directory
PID:588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 104⤵
- Delays execution with timeout.exe
PID:1700
-
-
-
-
C:\Program Files (x86)\System\rutserv.exe"C:\Program Files (x86)\System\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe"2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:520
-