Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-04-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe
Resource
win7-20220414-en
General
-
Target
d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe
-
Size
4.5MB
-
MD5
df90a4b81b13da8e76a73f5805cd259b
-
SHA1
5ce1bb0bc4ca5d85e4f8c309191c83b7b845e210
-
SHA256
d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5
-
SHA512
42acbce87827ea155f1ac0f958dd8bc493a970b9efa6cd7d7c090b9bb97c0c7dfd9b55a5e6d84408b4fb51362049e7cbdba7d9f6f2af60dd52e3c059d8673fff
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3896 created 4064 3896 svchost.exe 82 -
Executes dropped EXE 4 IoCs
pid Process 392 rfusclient.exe 4064 rutserv.exe 4456 rutserv.exe 4880 rfusclient.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 rutserv.exe 4064 rutserv.exe 4064 rutserv.exe 4064 rutserv.exe 4064 rutserv.exe 4064 rutserv.exe 4456 rutserv.exe 4456 rutserv.exe 4456 rutserv.exe 4456 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4064 rutserv.exe Token: SeTcbPrivilege 3896 svchost.exe Token: SeTcbPrivilege 3896 svchost.exe Token: SeTakeOwnershipPrivilege 4456 rutserv.exe Token: SeTcbPrivilege 4456 rutserv.exe Token: SeTcbPrivilege 4456 rutserv.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4880 rfusclient.exe 4880 rfusclient.exe 4880 rfusclient.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4880 rfusclient.exe 4880 rfusclient.exe 4880 rfusclient.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4064 rutserv.exe 4064 rutserv.exe 4456 rutserv.exe 4456 rutserv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3272 wrote to memory of 5096 3272 d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe 79 PID 3272 wrote to memory of 5096 3272 d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe 79 PID 3272 wrote to memory of 5096 3272 d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe 79 PID 5096 wrote to memory of 392 5096 cmd.exe 81 PID 5096 wrote to memory of 392 5096 cmd.exe 81 PID 5096 wrote to memory of 392 5096 cmd.exe 81 PID 392 wrote to memory of 4064 392 rfusclient.exe 82 PID 392 wrote to memory of 4064 392 rfusclient.exe 82 PID 392 wrote to memory of 4064 392 rfusclient.exe 82 PID 3896 wrote to memory of 4456 3896 svchost.exe 85 PID 3896 wrote to memory of 4456 3896 svchost.exe 85 PID 3896 wrote to memory of 4456 3896 svchost.exe 85 PID 4456 wrote to memory of 4880 4456 rutserv.exe 86 PID 4456 wrote to memory of 4880 4456 rutserv.exe 86 PID 4456 wrote to memory of 4880 4456 rutserv.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe"C:\Users\Admin\AppData\Local\Temp\d3a0e0db4c175d6c06c54909e986f5c252904dd604aba3c668a2966f5fca42d5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rfusclient.exerfusclient.exe -run_agent3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rutserv.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rutserv.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rutserv.exe -second5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rfusclient.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rfusclient.exe /tray /user6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4880
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD58e66ace6092bd48466784fec9bc3648b
SHA198ae43d49ebcc409d704b4bd6a3a3b2c508046ec
SHA2564dc45baa86597a4c3d08b8297a7cd621e57089390837c3b1ef875393b34d2bf6
SHA512cccf9e14ff4d35b0f08b80a5ca8684b5feaf2677769154ff5e9a9122683787984750913768605375c1bbe23c20ff88e0193aa62dbd5bf1a738b759f44438ca48
-
Filesize
33KB
MD51b1fb5d5b3a34199682b381826128d10
SHA149862566b76aab47e365bcdf1993b3c542fd0a2d
SHA2560137cc6245a8dcf82c1b8100fe2c90ecb19ec263f01009082885b07f125540ea
SHA512d8e207e5a912e4e4f4b874abbd14362d6806941066f5a78283fa47543a73947bf786e4b119c8557c9b2093a32cb465a6db314fdb0aaa1e412c1ddfd0fb850dce
-
Filesize
33KB
MD5a5de798ae043119dcd1f469ccaa93d83
SHA18cbf1b02f0c22eef305b1a00f2cf06fcc2d1e107
SHA256d47fe430e4414f1285f67d93ee5ec1b6cb5f8c89b126b5558f97165579018f45
SHA51287816f770a0d8568dc68d939e1504ba6156e643e560c4b8f610e143b7bbe7d729c4b0f6595cdc2f6e3fa1aa8fc4334aa6192a2d78a6e467b429c12025a63f7e9
-
Filesize
47KB
MD59f2fc2133731272cbf022300b3cb32f6
SHA17632ee3a7b329d7c509298c298a61c2532701ed0
SHA256debf4286d7548ec59eccae0d86d3e735b14a895d85e3efacfe3b37e94ebb4316
SHA51258577a50e405b556e42351e35a02d3fe536f032c52fe4682d5e4fa7d4fe0abd60d02ca513672fd9bd54046e840c2d7e964b90ee322f9a59906b29e1fdfbc7075
-
Filesize
46KB
MD51760c67e9e696c2a21efc2e6af49fd87
SHA1f0d9317093b5d90a9721bf08689c427e79081f05
SHA2561dd3dbe1bc8a0fe7bf63abbdeb78f5e8fd86b3e03f23495cb4ccea79308e7cae
SHA512cf2595532a285c617dc5333928d9217ebc0e4c06c1f28f742b29ec3ee9cb3d55fd86d612e99540dc4c59e2c6d094027efa3879333d846647d8445f76fcb0bf81
-
Filesize
47KB
MD5c5b854838dba2e259b0216a89ce8d50f
SHA1863442944210d40654b336685a51e8542b95c56d
SHA2568a9475ac44cda25fa749b814cbe5c2837326b8f1565e0dfbdbf79cd6bfdb99be
SHA512cf6b92e67299b329d2f15525178e8c13f088570d75c484b4986834d5078d962c49f5387554ee7cfc3484cc25921f32282a230fdddf40d2e857d8fd9865205789
-
Filesize
48KB
MD5ec745cba92381b127d0c1f237af206b0
SHA14ec72d56f3c315692b7a5e0f342a794d47a0c5cb
SHA2568f2cd174d540a6ab733521737b7e0726fd1668513e2cde44578473b51d5d69e6
SHA5128d39245fcbd8396afbf4f4e067684a8e9c838eadcf60f130fdaa07212e9c1fb55081a9cfc5305881fb26b823246d493dbb824a4b643536e415181ed28585711c
-
Filesize
49KB
MD584d6b9987b7e52e32cb230856df57487
SHA10f544792675ef0993022768594f2c8b051dfd83e
SHA256c771abe02aa0a0d6cbe37ba09b62ba4ec17195c85c2f11af13555c48afa5fcd2
SHA5129273923c2e4545a2f48f2b00c3f22f7426a523a6347f63ae066b828b6d853de4791a143043714e388ca1b7fa40ad2c0809dd3041dcb5e36c007db90d7b9bf6e7
-
Filesize
48KB
MD514d228712681b346e3910d72ad337d0c
SHA1e13b71686e0887d3cfd6a6bacbe0e8c345f2602d
SHA256e5358640906c61b3474a6cf803dd967d0e3c576dfd6368646f6e09a5acb4a431
SHA5123b3c9a1760a1042295f529344d0904f08edee43d1ac946e04eb55e49c767b1bb90da7edad5d51868842c6624efd5c741227b7a3794bcdf3769870c075242fea2
-
Filesize
40KB
MD5f1c253bcdb334df95b4016f0994fc172
SHA1c4185b62278dcba8fed32f4c9ffebb1b0b91daac
SHA256a6623f691d947be4327b53662af986827aeeba497a07cdba5224402ae55b5fd9
SHA5123868ca19f158dc4c4feeca67940b9b82db042d9f80bb3336f4ef027f5588dcd598eb7d007dba63020266a347b438694f2467502f60fe776a84857ca5b939d05e
-
Filesize
48KB
MD562bae9a3b61257771bc4487774d03392
SHA1cf64d7012fdbb662257508a9cab7b77808c78716
SHA25601ba730325b4807b877ca64db8aec1fc261cfd24b6cee0b55519194d29f2da98
SHA5122b29df2eb014d26644c5c4d60dc3c11a122caaa0119a266b560b111987695e2fedcd1e19e9aa2eec30eb303688d0ab9e2602536845cabbeda652691866ed77f6
-
Filesize
37KB
MD5219c07808c3707ea123d018f48b1046d
SHA1c82cc84ae347640d1ae16cf774c2ce04f7bee8aa
SHA256ba275f68ccf0634cf5038ff17cc90748fe3a336c82cc5bde856a10efe4632e9b
SHA512bd4fb22e4acf8223ae3f3ff1a7498310f3494efac2236ce88595288727b20cc6e174681926b11cf70353d1ac4ce7210fff1ebfc8c36f2e89fe56946d0a1c7b5f
-
Filesize
36KB
MD56a02429f647df9b53fb7fa02e289da75
SHA12ad17e95a4b91f36a9eb22a98a9fdbac96d602a3
SHA25684f90a4dde8abfb48f1b6a2601952861a85df0cfb2ae1f2e27435b47534a8f06
SHA5128cddaf8fc1782769875fe21e1070085c85773ff84ce2fe51bbdc1f8f8577f4ecdcc1d92c93f5cb4c2bd3478a8d1aaf28b5e2e120ecbbd111f91348e66d5c01eb
-
Filesize
45KB
MD5b0b9aac2125db5ea4b06623900e2e8d6
SHA1095b8f9326d53ee7d14758c1c0810fcd6993cab3
SHA2566e3cc5e24337846c660cfc1e5e2e7ec18a5ec94702dbf1f8ae253fd00a1b07d9
SHA512feccad04b242f33a91d1fc311d495c41cf922f7ed91b922e8d5dc0c28ba77c29e2e81a0ebf8c6d0b4e3e91fc397f01bec8eaf277ad6a8cfda064fc9cb520aabf
-
Filesize
47KB
MD51c11ddfdccb34efe5fd3201a90b09ffc
SHA128421bc35d3d3eaaf10000da6c06e4982ec1acc2
SHA256c0aa8df31b4f8e796a140159201b6809de077d58bafc6515c368f03cbacc5954
SHA512b4b1da92e9ae5a0d560887b2cf9bfd1373ad5fdc94e173c1002de7c6dd57995c408d4f658b6c22aa9060b582812531901fcb0c7b212ac49aadcd91b1ae5f02db
-
Filesize
48KB
MD5f768f95e49c7092e16b0f19b328fe57b
SHA18b70ce67074862c79e61cba15f7bffea53d8632c
SHA256d6c19126bfcea74dd5525ec13cfee394f8124cf3a1af34a84d443d6ea824d419
SHA5120388775b4ff9cd7c1016d92b938a58e94073ccdb3dbc91d1fb0c1bb38ba74e8e367140090adf510a2bd423924f65c3ab94d497d66f5972d9aecfb1c50b47a6db
-
Filesize
147KB
MD55236fc713d1fd42567d5331ff83ff5e6
SHA1e58c652a57833cdb04c548149a146a82669edad7
SHA256c1a4af23df4b4630014e7e01704e61b9031fd78eda9352805a56d3e729b42929
SHA51245dbe59693e12a20a8b96c43c6b23e08077dabba332512678d555da8b3e6524a31e0a1a11fa237992a1576b16f7ac3e4c8ce059cf8620143276a367a2cc7e877
-
Filesize
979KB
MD5999b47021c31f1b2a7220c04192404aa
SHA179801d2556cd3efc4fee562dae1a17768d04ecd2
SHA25636dde9f3025b18313008b95afbe4dfa5359eccef81b5692b69b14a135e844a2a
SHA51218a325af8d293c8e607757d4aa33f5d1b8709372821bfeb322d9e85a5493fd7446988837d89b1311fd86b58f7b6992b8fe9e7954d0e961545fb0cd9cfa0b58b1
-
Filesize
47KB
MD572dbf6cda53dd026be0ca832806643cd
SHA17a884b324ef4b48d9429f7c3f255f0e27d998028
SHA256bf08cecf114a34535c1b06df9675eb8d6b8ce56d925d1d536cb2c3edaa07dcd0
SHA512a6c2bdc00d6447aa234bc6c8b65dc3d2214e26d2fd5f6f07cb5db63ce1c4d4a06824743c3239eb60555a488c10735239892ec6658a358881326ff5e57f42603f
-
Filesize
46KB
MD57f79e44686ec67fa03f5eb2157be0e95
SHA1b0788205f8e134d4d8bf8b9510da4fdf71f203ed
SHA256d080ad158a8b083ddccb18f9ea5177bc5da11ab01112b04b14ef3917f8f53d9f
SHA512f6528df47bfce981ab8a54e617111667cf10fb39022e05c2718fa767503316b89379319c8a535d7342f47342b470dd739c5f4bd2da936d2e59b63ff7a2c6742a
-
Filesize
46KB
MD52099795cc874ddb6bc22f34f1f6ff8f0
SHA1fa423d8db42d6dabe58efacc6bd38bf6b9a25800
SHA256beeb4409dbb580bf5246b2a5739b253513239dca62621a1c9e92041cd223bca0
SHA512363a7ff773de9ce898b98d8c666e5b66f4c59acccbcfeed5ab313b7506f59c1d554345cb492fbe720e187ee8a6f8205ce6e34808663a0cd1383f3a88c9e9ba73
-
Filesize
28B
MD567ed43e7fe3cc719848a6884d2b35cee
SHA1a0d3880042021ff670bea4a58349ea7f2c6e7926
SHA2565043121594629631615d724543fdf1984fe816c0c791dc987d5cae6d1e773c44
SHA512ff1835ba0e3d1978a5d4cf5b56e2a7134966a29662eb14528bebf65ba73a206be4bbead751dfb8950bdf4ac058181e2a13b808e50de1694e2b84bb23a9834e7c
-
Filesize
4.9MB
MD529814c31df7701109ac7d00342230c26
SHA1cff2d4f97888cba55d844a382120d1a5633314fd
SHA256b8fa4366b00f88b352161e3bce04d80111698baca71b3f919feb7f627be1b2cd
SHA5126f96c018842963a0fae9121db24a8d9a44fb3baca1bb01c612fc7d9b42f14439091a009fde243fb7431a4a56c92fe441c58decab95ff5203e2c40022aa0b3ec2
-
Filesize
4.9MB
MD529814c31df7701109ac7d00342230c26
SHA1cff2d4f97888cba55d844a382120d1a5633314fd
SHA256b8fa4366b00f88b352161e3bce04d80111698baca71b3f919feb7f627be1b2cd
SHA5126f96c018842963a0fae9121db24a8d9a44fb3baca1bb01c612fc7d9b42f14439091a009fde243fb7431a4a56c92fe441c58decab95ff5203e2c40022aa0b3ec2
-
Filesize
4.9MB
MD529814c31df7701109ac7d00342230c26
SHA1cff2d4f97888cba55d844a382120d1a5633314fd
SHA256b8fa4366b00f88b352161e3bce04d80111698baca71b3f919feb7f627be1b2cd
SHA5126f96c018842963a0fae9121db24a8d9a44fb3baca1bb01c612fc7d9b42f14439091a009fde243fb7431a4a56c92fe441c58decab95ff5203e2c40022aa0b3ec2
-
Filesize
7.9MB
MD56af0dc4d2dc4919959eb5463e5622170
SHA1a135f878e614db389bbc75d151e2fe60973cefc2
SHA25606916f5abd4bac06070cc5cd4599f96febdc817b489e94107d3b6cc397c83f5d
SHA51221b229c74ececcb00fc8849df25e553edb90bbcca4672cd059c13489340b5fd9f4e36d3eca2afd1af1b129cfe47309250a066ff81ea5ed5dd4316e214dd663f1
-
Filesize
7.9MB
MD56af0dc4d2dc4919959eb5463e5622170
SHA1a135f878e614db389bbc75d151e2fe60973cefc2
SHA25606916f5abd4bac06070cc5cd4599f96febdc817b489e94107d3b6cc397c83f5d
SHA51221b229c74ececcb00fc8849df25e553edb90bbcca4672cd059c13489340b5fd9f4e36d3eca2afd1af1b129cfe47309250a066ff81ea5ed5dd4316e214dd663f1
-
Filesize
7.9MB
MD56af0dc4d2dc4919959eb5463e5622170
SHA1a135f878e614db389bbc75d151e2fe60973cefc2
SHA25606916f5abd4bac06070cc5cd4599f96febdc817b489e94107d3b6cc397c83f5d
SHA51221b229c74ececcb00fc8849df25e553edb90bbcca4672cd059c13489340b5fd9f4e36d3eca2afd1af1b129cfe47309250a066ff81ea5ed5dd4316e214dd663f1
-
Filesize
381KB
MD5db341183e1224abf99eac3094adfb456
SHA1a899f5156692ae2389d034d27527d790f093843e
SHA25612d3367d85227176305661fb218c2e16d1d9eb44f5cae0d3278852671feab9a8
SHA5127bdd3ffab318ca44949299a384dadf3b3edcaf0950a2f1f60a001a7be5509e9bd43d5f7ac539c6d802ad50e76b9c1a61d007b089ad43e51940b2b650b899fee7
-
Filesize
1.6MB
MD52f0ee2662d890f999afd2d642dabbf03
SHA10919e17a73b6d4a065406057e2a5f90b6a33c78b
SHA256d73256de77b9175e61a879d427821575925b4c906becc0951cc4b4ce8080dfb1
SHA51212aa9018797237b02bdda8b70e873d93a96756a15ebb0b55532b168bf08e52d2047a07df50baf4eebe3854d7a347af723064d1c58e2fc93ea011863d8c0e8859
-
Filesize
261KB
MD5603e7f3aa5cb17e60b243514ad2d88e5
SHA13a9edb2075eede21125a4e5f6550c1d99476f57e
SHA25676617176e21d3d97b0141f06240600d3ba7388453103e52e2255b151283c3d26
SHA51200d667e59e14da5a05155239fdc6587960c40cca871a8642195e5363938c1167b04c0c9b1a11858dea97d9844e94c5530380a3cbf44faa92f5c64da1a25159b5
-
Filesize
366KB
MD5723fba3735a3aa043af97f23146e2c30
SHA1bd9ed3fc278f1cfa6e11fb06db5543f7ccf31978
SHA256713e711686a687468a8ebae60bf7c2c42390afae806e608479086b128dd7c195
SHA51228fd8327d70926bc9a9c6c9f18c82f53a477745e2cd3ca1749cdec71058d6ff8a9592062d4f115559b4eb64e07027339bd51cf4d599cde57c009909b46d12161
-
Filesize
861KB
MD581a002118267fcc903e3cb6c1f65a614
SHA11e19def262a902c79eb6188aa255d355039c9d20
SHA25634be39343d13792e68531b393ce368ceef3d911413eb74db6c3f20ac321aa869
SHA5125b642cc602181a704166bd4d79f3e53a68ac7775bed1a42164d7b72d113ee04ac1fb9fe2aa7dedc02649b252f81c829ea225909989812aaa373c5cd992df7bba