Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-05-2022 03:37

General

  • Target

    84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe

  • Size

    8.9MB

  • MD5

    dc586ad2525632b7febeabf20aec7bd7

  • SHA1

    39ff748b2e7549af9c75baf434ff4829fb3bd98b

  • SHA256

    84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add

  • SHA512

    75acebdaa24ce7b1910e710a0d984bf2b942b35a4ca059668841a7b543dcf1b103c053e90288d4b977e9087e0379566b8f0afbb953efaa62e0cfff7d758b171d

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 7 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 6 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe
    "C:\Users\Admin\AppData\Local\Temp\84c8997a3415bb0a8bddeaecfd0452140575aba26ba2bb1d124a3781e8c42add.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\App\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3544
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -a -s -h "C:\ProgramData\App\install.bat" /S /D
        3⤵
        • Views/modifies file attributes
        PID:824
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:740
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:624
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4196
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:404
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
        3⤵
          PID:4760
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "regedit.reg"
          3⤵
          • Runs .reg file with regedit
          PID:224
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKLM\SYSTEM\System Corporation Update" /f
          3⤵
            PID:100
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            3⤵
            • Delays execution with timeout.exe
            PID:1040
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /silentinstall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4928
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /firewall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2104
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /start
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2936
          • C:\Windows\SysWOW64\sc.exe
            sc config RManService start= auto
            3⤵
              PID:4932
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App" /S /D
              3⤵
              • Views/modifies file attributes
              PID:2728
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\rutserv.exe" /S /D
              3⤵
              • Views/modifies file attributes
              PID:756
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\rfusclient.exe" /S /D
              3⤵
              • Views/modifies file attributes
              PID:2200
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\vp8decoder.dll" /S /D
              3⤵
              • Views/modifies file attributes
              PID:4972
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\vp8encoder.dll" /S /D
              3⤵
              • Views/modifies file attributes
              PID:2872
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc config RManService start= auto
            2⤵
              PID:4164
              • C:\Windows\SysWOW64\sc.exe
                sc config RManService start= auto
                3⤵
                  PID:32
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc config RManService start= auto
                2⤵
                  PID:4816
                  • C:\Windows\SysWOW64\sc.exe
                    sc config RManService start= auto
                    3⤵
                      PID:4872
                • C:\ProgramData\App\rutserv.exe
                  C:\ProgramData\App\rutserv.exe
                  1⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3188
                  • C:\ProgramData\App\rfusclient.exe
                    C:\ProgramData\App\rfusclient.exe
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4668
                    • C:\ProgramData\App\rfusclient.exe
                      C:\ProgramData\App\rfusclient.exe /tray
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: SetClipboardViewer
                      PID:2608
                  • C:\ProgramData\App\rfusclient.exe
                    C:\ProgramData\App\rfusclient.exe /tray
                    2⤵
                    • Executes dropped EXE
                    PID:1716

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\App\install.bat

                  Filesize

                  857B

                  MD5

                  6ec51eea8e8ca78d0086df72e0b10228

                  SHA1

                  b7c5a2e76841bb1100a846490f79b5de5f90f128

                  SHA256

                  6d13d9ad28789125fb70e0fdbfa7ee0e1a1c99c7161c0cbeddeb25eb1d7f1498

                  SHA512

                  6cfefcedd2433afed69f02abc4d2259fd124730ddcb74444d41c1be827bc385ff89e1d8c4646615c73d0d2fa6681045100d2da3f03320628894310e4a7e6a105

                • C:\ProgramData\App\regedit.reg

                  Filesize

                  11KB

                  MD5

                  64c927360c077b3e766b1a4a9bdf8f3a

                  SHA1

                  0bb94ae83d4d4223f5908269a1ab6fdf79405a66

                  SHA256

                  f8abc166a4efc51f2c6066d7f989c34eb1bdfe95adda8a6c3766e8a956ab6fb9

                  SHA512

                  3cf275d0c741615b75197dc257d4b1d851ade9fa848eae64eeeb4412d431bd43c3fac21aa1ade8941f1b6d2d765d2413f97e2fd209b141dc2fe721f5fae97cd1

                • C:\ProgramData\App\rfusclient.exe

                  Filesize

                  1.4MB

                  MD5

                  0930e28f2efa09ff724051b0ffee2517

                  SHA1

                  97180a268f10d37c4e331edb0201a03ad9de6083

                  SHA256

                  a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e

                  SHA512

                  e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f

                • C:\ProgramData\App\rfusclient.exe

                  Filesize

                  1.4MB

                  MD5

                  0930e28f2efa09ff724051b0ffee2517

                  SHA1

                  97180a268f10d37c4e331edb0201a03ad9de6083

                  SHA256

                  a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e

                  SHA512

                  e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f

                • C:\ProgramData\App\rfusclient.exe

                  Filesize

                  1.4MB

                  MD5

                  0930e28f2efa09ff724051b0ffee2517

                  SHA1

                  97180a268f10d37c4e331edb0201a03ad9de6083

                  SHA256

                  a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e

                  SHA512

                  e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f

                • C:\ProgramData\App\rfusclient.exe

                  Filesize

                  1.4MB

                  MD5

                  0930e28f2efa09ff724051b0ffee2517

                  SHA1

                  97180a268f10d37c4e331edb0201a03ad9de6083

                  SHA256

                  a506b37e9f01a908481f685ef1f75feb7cb3270abe2deede292299ad0829a14e

                  SHA512

                  e46982c6abf5328faa447065f532b7b6e1dddb53f31856da9b174a1f483f6b7b6f2c2bc19257dfa3148d3bbb55f2c02b095b6ef1318a1a7f952ae55f63837a0f

                • C:\ProgramData\App\rutserv.exe

                  Filesize

                  1.7MB

                  MD5

                  5c4b2152e37d7c74df6e5267a8d0dd61

                  SHA1

                  711ab9242b93cf065aa19f79388f090d07ee35b4

                  SHA256

                  200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5

                  SHA512

                  743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a

                • C:\ProgramData\App\rutserv.exe

                  Filesize

                  1.7MB

                  MD5

                  5c4b2152e37d7c74df6e5267a8d0dd61

                  SHA1

                  711ab9242b93cf065aa19f79388f090d07ee35b4

                  SHA256

                  200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5

                  SHA512

                  743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a

                • C:\ProgramData\App\rutserv.exe

                  Filesize

                  1.7MB

                  MD5

                  5c4b2152e37d7c74df6e5267a8d0dd61

                  SHA1

                  711ab9242b93cf065aa19f79388f090d07ee35b4

                  SHA256

                  200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5

                  SHA512

                  743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a

                • C:\ProgramData\App\rutserv.exe

                  Filesize

                  1.7MB

                  MD5

                  5c4b2152e37d7c74df6e5267a8d0dd61

                  SHA1

                  711ab9242b93cf065aa19f79388f090d07ee35b4

                  SHA256

                  200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5

                  SHA512

                  743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a

                • C:\ProgramData\App\rutserv.exe

                  Filesize

                  1.7MB

                  MD5

                  5c4b2152e37d7c74df6e5267a8d0dd61

                  SHA1

                  711ab9242b93cf065aa19f79388f090d07ee35b4

                  SHA256

                  200693ef7ea77607661536c9f1193ce6d9f77d3a949fbbdd3e7163dbc66ebdf5

                  SHA512

                  743ca60ebffe70bc7fc52eceacc01c887d377e8a8259bac39d1877e83e86eb9dc4e519a986d08db9e07438ca858e7b9f1c930f89642f06788b93c603437e2b0a

                • C:\ProgramData\App\vp8decoder.dll

                  Filesize

                  378KB

                  MD5

                  d43fa82fab5337ce20ad14650085c5d9

                  SHA1

                  678aa092075ff65b6815ffc2d8fdc23af8425981

                  SHA256

                  c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b

                  SHA512

                  103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d

                • C:\ProgramData\App\vp8encoder.dll

                  Filesize

                  1.6MB

                  MD5

                  dab4646806dfca6d0e0b4d80fa9209d6

                  SHA1

                  8244dfe22ec2090eee89dad103e6b2002059d16a

                  SHA256

                  cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587

                  SHA512

                  aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7

                • memory/1716-193-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1716-188-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1716-191-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1716-185-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1716-186-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2104-160-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2104-159-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2104-158-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2104-161-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2104-157-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2104-162-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2608-205-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2608-203-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2608-204-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2608-202-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2608-206-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2608-207-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2824-130-0x0000000077440000-0x00000000775E3000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2824-131-0x0000000000400000-0x0000000001718000-memory.dmp

                  Filesize

                  19.1MB

                • memory/2936-169-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2936-166-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2936-165-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2936-167-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2936-168-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2936-183-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-171-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-172-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-173-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-212-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-175-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3188-174-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4668-184-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4668-190-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4668-192-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4668-189-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4668-187-0x0000000000400000-0x00000000009B6000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4928-149-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4928-150-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4928-151-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4928-152-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4928-153-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB

                • memory/4928-154-0x0000000000400000-0x0000000000AB9000-memory.dmp

                  Filesize

                  6.7MB