Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 20:14
Static task
static1
Behavioral task
behavioral1
Sample
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe
Resource
win7-20220311-en
General
-
Target
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe
-
Size
4.5MB
-
MD5
aa49af78c5949910f09e3d303f2b7680
-
SHA1
cf9d1787f45ee932791ab0a797a2fc67ecb5eb17
-
SHA256
34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222
-
SHA512
85c0a891667aafb44eca64d978eca2346771095f440880328749fd99ee7000f527a163a8985782a30a845f7dfab43eb66a61619948759508193453ca33ba2205
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000500000001e7ca-141.dat acprotect behavioral2/files/0x000500000001e7c9-140.dat acprotect -
resource yara_rule behavioral2/files/0x000400000001e7cc-139.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cb-138.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cc-150.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cc-157.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cc-165.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cc-171.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cb-179.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cb-180.dat aspack_v212_v242 behavioral2/files/0x000400000001e7cb-197.dat aspack_v212_v242 -
Executes dropped EXE 7 IoCs
pid Process 4888 rutserv.exe 860 rutserv.exe 4364 rutserv.exe 4756 rutserv.exe 3084 rfusclient.exe 4548 rfusclient.exe 1604 rfusclient.exe -
resource yara_rule behavioral2/files/0x000500000001e7ca-141.dat upx behavioral2/files/0x000500000001e7c9-140.dat upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File created C:\Program Files (x86)\System\vp8encoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\rutserv.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\vp8decoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\rfusclient.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\install.vbs 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\install.bat 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\install.bat attrib.exe File opened for modification C:\Program Files (x86)\System\install.vbs 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\Common Files\System attrib.exe File opened for modification C:\Program Files (x86)\System\rutserv.exe attrib.exe File opened for modification C:\Program Files (x86)\System 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\mailsend.exe attrib.exe File opened for modification C:\Program Files (x86)\System\regedit.reg attrib.exe File opened for modification C:\Program Files (x86)\System\rfusclient.exe attrib.exe File created C:\Program Files (x86)\System\__tmp_rar_sfx_access_check_30231859 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\mailsend.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8decoder.dll attrib.exe File created C:\Program Files (x86)\System\regedit.reg 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\install.bat 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8encoder.dll attrib.exe File created C:\Program Files (x86)\System\mailsend.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8decoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\vp8encoder.dll 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\rfusclient.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File created C:\Program Files (x86)\System\rutserv.exe 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System\regedit.reg 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe File opened for modification C:\Program Files (x86)\System attrib.exe File opened for modification C:\Program Files (x86)\System\install.vbs attrib.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 4828 timeout.exe 444 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 1472 taskkill.exe 4044 taskkill.exe 1900 taskkill.exe 2672 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4300 regedit.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4888 rutserv.exe 4888 rutserv.exe 4888 rutserv.exe 4888 rutserv.exe 4888 rutserv.exe 4888 rutserv.exe 860 rutserv.exe 860 rutserv.exe 4364 rutserv.exe 4364 rutserv.exe 4756 rutserv.exe 4756 rutserv.exe 4756 rutserv.exe 4756 rutserv.exe 4756 rutserv.exe 4756 rutserv.exe 3084 rfusclient.exe 3084 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1604 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeDebugPrivilege 2672 taskkill.exe Token: SeDebugPrivilege 4888 rutserv.exe Token: SeDebugPrivilege 4364 rutserv.exe Token: SeTakeOwnershipPrivilege 4756 rutserv.exe Token: SeTcbPrivilege 4756 rutserv.exe Token: SeTcbPrivilege 4756 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4888 rutserv.exe 860 rutserv.exe 4364 rutserv.exe 4756 rutserv.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3704 3372 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 79 PID 3372 wrote to memory of 3704 3372 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 79 PID 3372 wrote to memory of 3704 3372 34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe 79 PID 3704 wrote to memory of 912 3704 WScript.exe 80 PID 3704 wrote to memory of 912 3704 WScript.exe 80 PID 3704 wrote to memory of 912 3704 WScript.exe 80 PID 912 wrote to memory of 4712 912 cmd.exe 82 PID 912 wrote to memory of 4712 912 cmd.exe 82 PID 912 wrote to memory of 4712 912 cmd.exe 82 PID 912 wrote to memory of 1820 912 cmd.exe 83 PID 912 wrote to memory of 1820 912 cmd.exe 83 PID 912 wrote to memory of 1820 912 cmd.exe 83 PID 912 wrote to memory of 1472 912 cmd.exe 84 PID 912 wrote to memory of 1472 912 cmd.exe 84 PID 912 wrote to memory of 1472 912 cmd.exe 84 PID 912 wrote to memory of 4044 912 cmd.exe 86 PID 912 wrote to memory of 4044 912 cmd.exe 86 PID 912 wrote to memory of 4044 912 cmd.exe 86 PID 912 wrote to memory of 1900 912 cmd.exe 87 PID 912 wrote to memory of 1900 912 cmd.exe 87 PID 912 wrote to memory of 1900 912 cmd.exe 87 PID 912 wrote to memory of 2672 912 cmd.exe 88 PID 912 wrote to memory of 2672 912 cmd.exe 88 PID 912 wrote to memory of 2672 912 cmd.exe 88 PID 912 wrote to memory of 1624 912 cmd.exe 89 PID 912 wrote to memory of 1624 912 cmd.exe 89 PID 912 wrote to memory of 1624 912 cmd.exe 89 PID 912 wrote to memory of 4300 912 cmd.exe 90 PID 912 wrote to memory of 4300 912 cmd.exe 90 PID 912 wrote to memory of 4300 912 cmd.exe 90 PID 912 wrote to memory of 4828 912 cmd.exe 91 PID 912 wrote to memory of 4828 912 cmd.exe 91 PID 912 wrote to memory of 4828 912 cmd.exe 91 PID 912 wrote to memory of 4888 912 cmd.exe 92 PID 912 wrote to memory of 4888 912 cmd.exe 92 PID 912 wrote to memory of 4888 912 cmd.exe 92 PID 912 wrote to memory of 860 912 cmd.exe 93 PID 912 wrote to memory of 860 912 cmd.exe 93 PID 912 wrote to memory of 860 912 cmd.exe 93 PID 912 wrote to memory of 4364 912 cmd.exe 94 PID 912 wrote to memory of 4364 912 cmd.exe 94 PID 912 wrote to memory of 4364 912 cmd.exe 94 PID 4756 wrote to memory of 3084 4756 rutserv.exe 99 PID 4756 wrote to memory of 3084 4756 rutserv.exe 99 PID 4756 wrote to memory of 3084 4756 rutserv.exe 99 PID 4756 wrote to memory of 4548 4756 rutserv.exe 98 PID 4756 wrote to memory of 4548 4756 rutserv.exe 98 PID 4756 wrote to memory of 4548 4756 rutserv.exe 98 PID 912 wrote to memory of 4472 912 cmd.exe 103 PID 912 wrote to memory of 4472 912 cmd.exe 103 PID 912 wrote to memory of 4472 912 cmd.exe 103 PID 912 wrote to memory of 5112 912 cmd.exe 104 PID 912 wrote to memory of 5112 912 cmd.exe 104 PID 912 wrote to memory of 5112 912 cmd.exe 104 PID 912 wrote to memory of 4156 912 cmd.exe 106 PID 912 wrote to memory of 4156 912 cmd.exe 106 PID 912 wrote to memory of 4156 912 cmd.exe 106 PID 912 wrote to memory of 444 912 cmd.exe 107 PID 912 wrote to memory of 444 912 cmd.exe 107 PID 912 wrote to memory of 444 912 cmd.exe 107 PID 3084 wrote to memory of 1604 3084 rfusclient.exe 109 PID 3084 wrote to memory of 1604 3084 rfusclient.exe 109 PID 3084 wrote to memory of 1604 3084 rfusclient.exe 109 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4712 attrib.exe 1820 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe"C:\Users\Admin\AppData\Local\Temp\34f40cfa2823d88907f8d73c701aba10439b9a8e754cb3b71b026db00833d222.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\System\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\System" +H +S /S /D4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4712
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\System\*.*" +H +S /S /D4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rutserv.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /f /im rfusclient.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f4⤵PID:1624
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"4⤵
- Runs .reg file with regedit
PID:4300
-
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
PID:4828
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /silentinstall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /firewall4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:860
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /start4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10004⤵PID:4472
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own4⤵PID:5112
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Windows_Defender v6.3"4⤵PID:4156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 1204⤵
- Delays execution with timeout.exe
PID:444
-
-
-
-
C:\Program Files (x86)\System\rutserv.exe"C:\Program Files (x86)\System\rutserv.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:4548
-
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1604
-
-