Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe
Resource
win7-20220414-en
General
-
Target
84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe
-
Size
8.9MB
-
MD5
dc586ad2525632b7febeabf20aec7bd7
-
SHA1
39ff748b2e7549af9c75baf434ff4829fb3bd98b
-
SHA256
84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add
-
SHA512
75acebdaa24ce7b1910e710a0d984bf2b942b35a4ca059668841a7b543dcf1b103c053e90288d4b977e9087e0379566b8f0afbb953efaa62e0cfff7d758b171d
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
resource yara_rule behavioral2/files/0x000700000002314c-147.dat aspack_v212_v242 behavioral2/files/0x000700000002314c-148.dat aspack_v212_v242 behavioral2/files/0x000700000002314c-156.dat aspack_v212_v242 behavioral2/files/0x000700000002314c-164.dat aspack_v212_v242 behavioral2/files/0x000700000002314c-170.dat aspack_v212_v242 behavioral2/files/0x000700000002314b-178.dat aspack_v212_v242 behavioral2/files/0x000700000002314b-182.dat aspack_v212_v242 behavioral2/files/0x000700000002314b-181.dat aspack_v212_v242 behavioral2/files/0x000700000002314b-201.dat aspack_v212_v242 -
Executes dropped EXE 7 IoCs
pid Process 4928 rutserv.exe 2104 rutserv.exe 2936 rutserv.exe 3188 rutserv.exe 1716 rfusclient.exe 4668 rfusclient.exe 2608 rfusclient.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1040 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 740 taskkill.exe 624 taskkill.exe 4408 taskkill.exe 4196 taskkill.exe 404 taskkill.exe 4792 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 224 regedit.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 4928 rutserv.exe 4928 rutserv.exe 4928 rutserv.exe 4928 rutserv.exe 4928 rutserv.exe 4928 rutserv.exe 2104 rutserv.exe 2104 rutserv.exe 2936 rutserv.exe 2936 rutserv.exe 3188 rutserv.exe 3188 rutserv.exe 3188 rutserv.exe 3188 rutserv.exe 3188 rutserv.exe 3188 rutserv.exe 4668 rfusclient.exe 4668 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 2608 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 740 taskkill.exe Token: SeDebugPrivilege 624 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe Token: SeDebugPrivilege 4196 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeDebugPrivilege 4928 rutserv.exe Token: SeDebugPrivilege 2936 rutserv.exe Token: SeTakeOwnershipPrivilege 3188 rutserv.exe Token: SeTcbPrivilege 3188 rutserv.exe Token: SeTcbPrivilege 3188 rutserv.exe Token: SeBackupPrivilege 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 4928 rutserv.exe 2104 rutserv.exe 2936 rutserv.exe 3188 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3544 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 81 PID 2824 wrote to memory of 3544 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 81 PID 2824 wrote to memory of 3544 2824 84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe 81 PID 3544 wrote to memory of 824 3544 cmd.exe 83 PID 3544 wrote to memory of 824 3544 cmd.exe 83 PID 3544 wrote to memory of 824 3544 cmd.exe 83 PID 3544 wrote to memory of 740 3544 cmd.exe 84 PID 3544 wrote to memory of 740 3544 cmd.exe 84 PID 3544 wrote to memory of 740 3544 cmd.exe 84 PID 3544 wrote to memory of 624 3544 cmd.exe 85 PID 3544 wrote to memory of 624 3544 cmd.exe 85 PID 3544 wrote to memory of 624 3544 cmd.exe 85 PID 3544 wrote to memory of 4408 3544 cmd.exe 86 PID 3544 wrote to memory of 4408 3544 cmd.exe 86 PID 3544 wrote to memory of 4408 3544 cmd.exe 86 PID 3544 wrote to memory of 4196 3544 cmd.exe 87 PID 3544 wrote to memory of 4196 3544 cmd.exe 87 PID 3544 wrote to memory of 4196 3544 cmd.exe 87 PID 3544 wrote to memory of 404 3544 cmd.exe 88 PID 3544 wrote to memory of 404 3544 cmd.exe 88 PID 3544 wrote to memory of 404 3544 cmd.exe 88 PID 3544 wrote to memory of 4792 3544 cmd.exe 89 PID 3544 wrote to memory of 4792 3544 cmd.exe 89 PID 3544 wrote to memory of 4792 3544 cmd.exe 89 PID 3544 wrote to memory of 4760 3544 cmd.exe 90 PID 3544 wrote to memory of 4760 3544 cmd.exe 90 PID 3544 wrote to memory of 4760 3544 cmd.exe 90 PID 3544 wrote to memory of 100 3544 cmd.exe 92 PID 3544 wrote to memory of 100 3544 cmd.exe 92 PID 3544 wrote to memory of 100 3544 cmd.exe 92 PID 3544 wrote to memory of 224 3544 cmd.exe 91 PID 3544 wrote to memory of 224 3544 cmd.exe 91 PID 3544 wrote to memory of 224 3544 cmd.exe 91 PID 3544 wrote to memory of 1040 3544 cmd.exe 93 PID 3544 wrote to memory of 1040 3544 cmd.exe 93 PID 3544 wrote to memory of 1040 3544 cmd.exe 93 PID 3544 wrote to memory of 4928 3544 cmd.exe 94 PID 3544 wrote to memory of 4928 3544 cmd.exe 94 PID 3544 wrote to memory of 4928 3544 cmd.exe 94 PID 3544 wrote to memory of 2104 3544 cmd.exe 95 PID 3544 wrote to memory of 2104 3544 cmd.exe 95 PID 3544 wrote to memory of 2104 3544 cmd.exe 95 PID 3544 wrote to memory of 2936 3544 cmd.exe 96 PID 3544 wrote to memory of 2936 3544 cmd.exe 96 PID 3544 wrote to memory of 2936 3544 cmd.exe 96 PID 3188 wrote to memory of 4668 3188 rutserv.exe 98 PID 3188 wrote to memory of 4668 3188 rutserv.exe 98 PID 3188 wrote to memory of 4668 3188 rutserv.exe 98 PID 3188 wrote to memory of 1716 3188 rutserv.exe 99 PID 3188 wrote to memory of 1716 3188 rutserv.exe 99 PID 3188 wrote to memory of 1716 3188 rutserv.exe 99 PID 3544 wrote to memory of 4932 3544 cmd.exe 101 PID 3544 wrote to memory of 4932 3544 cmd.exe 101 PID 3544 wrote to memory of 4932 3544 cmd.exe 101 PID 3544 wrote to memory of 2728 3544 cmd.exe 103 PID 3544 wrote to memory of 2728 3544 cmd.exe 103 PID 3544 wrote to memory of 2728 3544 cmd.exe 103 PID 3544 wrote to memory of 756 3544 cmd.exe 106 PID 3544 wrote to memory of 756 3544 cmd.exe 106 PID 3544 wrote to memory of 756 3544 cmd.exe 106 PID 3544 wrote to memory of 2200 3544 cmd.exe 107 PID 3544 wrote to memory of 2200 3544 cmd.exe 107 PID 3544 wrote to memory of 2200 3544 cmd.exe 107 PID 3544 wrote to memory of 4972 3544 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 2200 attrib.exe 4972 attrib.exe 2872 attrib.exe 824 attrib.exe 2728 attrib.exe 756 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe"C:\Users\Admin\AppData\Local\Temp\84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\App\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\attrib.exeattrib -r -a -s -h "C:\ProgramData\App\install.bat" /S /D3⤵
- Views/modifies file attributes
PID:824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:4760
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"3⤵
- Runs .reg file with regedit
PID:224
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\System Corporation Update" /f3⤵PID:100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1040
-
-
C:\ProgramData\App\rutserv.exerutserv.exe /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\ProgramData\App\rutserv.exerutserv.exe /firewall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2104
-
-
C:\ProgramData\App\rutserv.exerutserv.exe /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
C:\Windows\SysWOW64\sc.exesc config RManService start= auto3⤵PID:4932
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\ProgramData\App" /S /D3⤵
- Views/modifies file attributes
PID:2728
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\ProgramData\App\rutserv.exe" /S /D3⤵
- Views/modifies file attributes
PID:756
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\ProgramData\App\rfusclient.exe" /S /D3⤵
- Views/modifies file attributes
PID:2200
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\ProgramData\App\vp8decoder.dll" /S /D3⤵
- Views/modifies file attributes
PID:4972
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\ProgramData\App\vp8encoder.dll" /S /D3⤵
- Views/modifies file attributes
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config RManService start= auto2⤵PID:4164
-
C:\Windows\SysWOW64\sc.exesc config RManService start= auto3⤵PID:32
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config RManService start= auto2⤵PID:4816
-
C:\Windows\SysWOW64\sc.exesc config RManService start= auto3⤵PID:4872
-
-
-
C:\ProgramData\App\rutserv.exeC:\ProgramData\App\rutserv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\ProgramData\App\rfusclient.exeC:\ProgramData\App\rfusclient.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\ProgramData\App\rfusclient.exeC:\ProgramData\App\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:2608
-
-
-
C:\ProgramData\App\rfusclient.exeC:\ProgramData\App\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857B
MD56ec51eea8e8ca78d0086df72e0b10228
SHA1b7c5a2e76841bb1100a846490f79b5de5f90f128
SHA2566d13d9ad28789125fb70e0fdbfa7ee0e1a1c99c7161c0cbeddeb25eb1d7f1498
SHA5126cfefcedd2433afed69f02abc4d2259fd124730ddcb74444d41c1be827bc385ff89e1d8c4646615c73d0d2fa6681045100d2da3f03320628894310e4a7e6a105
-
Filesize
11KB
MD564c927360c077b3e766b1a4a9bdf8f3a
SHA10bb94ae83d4d4223f5908269a1ab6fdf79405a66
SHA256f8abc166a4efc51f2c6066d7f989c34eb1bdfe95adda8a6c3766e8a956ab6fb9
SHA5123cf275d0c741615b75197dc257d4b1d851ade9fa848eae64eeeb4412d431bd43c3fac21aa1ade8941f1b6d2d765d2413f97e2fd209b141dc2fe721f5fae97cd1
-
Filesize
1.4MB
MD50930e28f2efa09ff724051b0ffee2517
SHA197180a268f10d37c4e331edb0201a03ad9de6083
SHA256a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e
SHA512e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f
-
Filesize
1.4MB
MD50930e28f2efa09ff724051b0ffee2517
SHA197180a268f10d37c4e331edb0201a03ad9de6083
SHA256a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e
SHA512e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f
-
Filesize
1.4MB
MD50930e28f2efa09ff724051b0ffee2517
SHA197180a268f10d37c4e331edb0201a03ad9de6083
SHA256a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e
SHA512e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f
-
Filesize
1.4MB
MD50930e28f2efa09ff724051b0ffee2517
SHA197180a268f10d37c4e331edb0201a03ad9de6083
SHA256a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e
SHA512e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f
-
Filesize
1.7MB
MD55c4b2152e37d7c74df6e5267a8d0dd61
SHA1711ab9242b93cf065aa19f79388f090d07ee35b4
SHA256200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5
SHA512743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a
-
Filesize
1.7MB
MD55c4b2152e37d7c74df6e5267a8d0dd61
SHA1711ab9242b93cf065aa19f79388f090d07ee35b4
SHA256200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5
SHA512743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a
-
Filesize
1.7MB
MD55c4b2152e37d7c74df6e5267a8d0dd61
SHA1711ab9242b93cf065aa19f79388f090d07ee35b4
SHA256200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5
SHA512743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a
-
Filesize
1.7MB
MD55c4b2152e37d7c74df6e5267a8d0dd61
SHA1711ab9242b93cf065aa19f79388f090d07ee35b4
SHA256200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5
SHA512743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a
-
Filesize
1.7MB
MD55c4b2152e37d7c74df6e5267a8d0dd61
SHA1711ab9242b93cf065aa19f79388f090d07ee35b4
SHA256200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5
SHA512743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7