Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 11:43

General

  • Target

    $77_loader.exe

  • Size

    397KB

  • MD5

    aff57ee1a4f3731c2036046910f78fb4

  • SHA1

    ef9627c0cadff85a3dfaab6aef0b7c885f03b186

  • SHA256

    3826953ded758361f9783d67242e4ba87092d637d72bcf81c649e52665c57de4

  • SHA512

    5ae93c6dae61782a7ac2fa2079df7006e0655d73e32fd7df1a5c1d44e47fd7dd2da225ea6f93e9d3dcb09be5f84b5dab2130bb4f2d5b0e05d95e866ebde0163f

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Sets file execution options in registry 2 TTPs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 3 IoCs
  • Modifies powershell logging option 1 TTPs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 6 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$77_loader.exe
    "C:\Users\Admin\AppData\Local\Temp\$77_loader.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qg2xtijr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF98D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF98C.tmp"
        3⤵
          PID:1820
      • C:\Windows\system32\chcp.com
        "C:\Windows\system32\chcp.com" 437
        2⤵
          PID:1636
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" interface portproxy show all
          2⤵
            PID:456
          • C:\Windows\system32\NETSTAT.EXE
            "C:\Windows\system32\NETSTAT.EXE" -na
            2⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:540
          • C:\Windows\system32\NETSTAT.EXE
            "C:\Windows\system32\NETSTAT.EXE" -na
            2⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:1004
          • C:\Windows\system32\NETSTAT.EXE
            "C:\Windows\system32\NETSTAT.EXE" -na
            2⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:768
          • C:\Windows\system32\netsh.exe
            "C:\Windows\system32\netsh.exe" interface portproxy reset
            2⤵
              PID:1516
            • C:\Windows\system32\netsh.exe
              "C:\Windows\system32\netsh.exe" interface portproxy show all
              2⤵
                PID:1348
              • C:\Windows\system32\netsh.exe
                "C:\Windows\system32\netsh.exe" interface portproxy add v4tov4 listenport=757 connectport=443 connectaddress=msupdate.info
                2⤵
                  PID:1652
                • C:\Windows\system32\netsh.exe
                  "C:\Windows\system32\netsh.exe" interface portproxy show all
                  2⤵
                    PID:108
                  • C:\Windows\system32\netsh.exe
                    "C:\Windows\system32\netsh.exe" interface portproxy show all
                    2⤵
                      PID:1604
                    • C:\Windows\system32\NETSTAT.EXE
                      "C:\Windows\system32\NETSTAT.EXE" -na
                      2⤵
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1440
                    • C:\Windows\system32\NETSTAT.EXE
                      "C:\Windows\system32\NETSTAT.EXE" -na
                      2⤵
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1436
                    • C:\Windows\system32\NETSTAT.EXE
                      "C:\Windows\system32\NETSTAT.EXE" -na
                      2⤵
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1896
                    • C:\Users\Admin\AppData\Local\Temp\RMS.exe
                      "C:\Users\Admin\AppData\Local\Temp\RMS.exe"
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1080
                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe
                        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe" /rsetup
                        3⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:660
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms.host6.3ru_mod.msi" /qn
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1636
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1300
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                    • Blocklisted process makes network request
                    • Enumerates connected drives
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1440
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding 22DF1517ADC071A0F5FCE18138FC5424
                      2⤵
                      • Loads dropped DLL
                      PID:1004
                    • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                      "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall
                      2⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      PID:2000

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe

                    Filesize

                    6.0MB

                    MD5

                    c9704931d887685d96ce92d637d84045

                    SHA1

                    0875a71e9118ded121d92f3f46a3af1ec8380f8b

                    SHA256

                    0448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826

                    SHA512

                    3b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260

                  • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe

                    Filesize

                    6.0MB

                    MD5

                    c9704931d887685d96ce92d637d84045

                    SHA1

                    0875a71e9118ded121d92f3f46a3af1ec8380f8b

                    SHA256

                    0448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826

                    SHA512

                    3b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    ffa32b2c4ac7359fcb9b7d40f0c2200d

                    SHA1

                    c5b6af15326b79ac727bd4635496473a41da9595

                    SHA256

                    44c067437cd47c9450ee58a1a738d43587ac66563f9be5cebb558374acf2940a

                    SHA512

                    bd1c5d53349060f2a43702d0a0319aa079af3f3844e9b407b8af9e6016eba6923a49918d335ca5201f4008098c19801b2d85757f21171fd337bf26d20cda8cbe

                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe

                    Filesize

                    6.0MB

                    MD5

                    c9704931d887685d96ce92d637d84045

                    SHA1

                    0875a71e9118ded121d92f3f46a3af1ec8380f8b

                    SHA256

                    0448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826

                    SHA512

                    3b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260

                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe

                    Filesize

                    6.0MB

                    MD5

                    c9704931d887685d96ce92d637d84045

                    SHA1

                    0875a71e9118ded121d92f3f46a3af1ec8380f8b

                    SHA256

                    0448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826

                    SHA512

                    3b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260

                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms.host6.3ru_mod.msi

                    Filesize

                    7.4MB

                    MD5

                    73e578a44265558d3ace212869d43cbb

                    SHA1

                    d2c15578def8996ed0ae4a44754055b774b095a7

                    SHA256

                    8a6945ead42d78d963d6f2e126eebb89c0e82b02c389d4badcaa837ff49bf7f4

                    SHA512

                    fe661e19899a6f749a180e5b312fcebb2963acc92720d1c6cabba22b0ffd250f1930c9dac62f789cd4b99aff86ef0f3944ae52a583e2c1be57c9fca391be9bf4

                  • C:\Users\Admin\AppData\Local\Temp\RESF98D.tmp

                    Filesize

                    1KB

                    MD5

                    1b8727dfe0a568a64e11979c5e2ce69b

                    SHA1

                    5d03c42e44ac50c56dc01dded80ce6c480ddd12f

                    SHA256

                    aed53210daea24de370b52c4794b71651312d9d7e1d7763474062221cac0e21b

                    SHA512

                    1429be297045447a238547f806e9c1c302a54bfe3e74a1551bd1fe7f4f90415442b0e6bb0ee6f6f1482f2f35b7f2a418935ad87c0c927d6c5c8b31b35a289469

                  • C:\Users\Admin\AppData\Local\Temp\RMS.exe

                    Filesize

                    8.3MB

                    MD5

                    73f351beae5c881fafe36f42cde9a47c

                    SHA1

                    dc1425cfd5569bd59f5d56432df875b59da9300b

                    SHA256

                    a028816d9741540c6184091b4ae3c4e42b104f90fe3b17a55d0e4aa4c4c43824

                    SHA512

                    f484b1260e73b3717603cfcfd62e820502480d8be57a7570e6c38612c9ea86b9335c6a42742fbdb369a37fcd5ec4c2b06f426a075582c39639128ad7be92da66

                  • C:\Users\Admin\AppData\Local\Temp\RMS.exe

                    Filesize

                    8.3MB

                    MD5

                    73f351beae5c881fafe36f42cde9a47c

                    SHA1

                    dc1425cfd5569bd59f5d56432df875b59da9300b

                    SHA256

                    a028816d9741540c6184091b4ae3c4e42b104f90fe3b17a55d0e4aa4c4c43824

                    SHA512

                    f484b1260e73b3717603cfcfd62e820502480d8be57a7570e6c38612c9ea86b9335c6a42742fbdb369a37fcd5ec4c2b06f426a075582c39639128ad7be92da66

                  • C:\Users\Admin\AppData\Local\Temp\qg2xtijr.dll

                    Filesize

                    3KB

                    MD5

                    74941c8583ed5c0a682f20be1ad18190

                    SHA1

                    702aeb34229b060e27ba0a1c319ee5ff3b0d980b

                    SHA256

                    0477a4aaa92012340954c758e403d13d93f6fb72af9e3fd68039c487e4dbd345

                    SHA512

                    7aaf4d65e1f40f2ff9560af85e54d70c96e92c89854d0525ae19e1c7154e2217e440d081b8f16febb1eae514522d9ae84668b0e704f5ae32c991d414b9ff4976

                  • C:\Users\Admin\AppData\Local\Temp\qg2xtijr.pdb

                    Filesize

                    11KB

                    MD5

                    55147b5a6ae0d76626d8fd06694b7fd5

                    SHA1

                    506e53ad9ec02537c9ca40ab116e0fe025753c60

                    SHA256

                    4a42ef2a930144119efc77085a2b7620faa657032e5303f859355201db44a172

                    SHA512

                    f1948ee3571591b22ed5e03ab2b008eda01d714618cb56183a281d79dd59f86d7eaa063808f92d9ef932efdc7ab2bb34c34340cd59f74eb495cbe701a6a38893

                  • C:\Windows\Installer\MSIEDF2.tmp

                    Filesize

                    125KB

                    MD5

                    b0bcc622f1fff0eec99e487fa1a4ddd9

                    SHA1

                    49aa392454bd5869fa23794196aedc38e8eea6f5

                    SHA256

                    b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

                    SHA512

                    1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF98C.tmp

                    Filesize

                    652B

                    MD5

                    6279b84bf5d837ad8d2397d7f6263abb

                    SHA1

                    affd6a002661ac90eaefc5b0f7bdf5939e4f65a5

                    SHA256

                    d28bb344e4b49bcfaca73092b0d2ca90d7016a5029eb7a0cad8ef3ff414b151d

                    SHA512

                    ead58029e9a99c77b64db0605ea324c9538e4ee7d6216271d34c1d87c2d7696a9e9a998441e79693b228472dce9993170684191b6c0adb7f159aa38cce32300c

                  • \??\c:\Users\Admin\AppData\Local\Temp\qg2xtijr.0.cs

                    Filesize

                    447B

                    MD5

                    1640a04633fee0dfdc7e22c4f4063bf6

                    SHA1

                    3cb525c47b5dd37f8ee45b034c9452265fba5476

                    SHA256

                    55e16d2ca3e65ce6c62cd5be2af5d7264445c5d7e1b5f3be7149acfb47ae42a0

                    SHA512

                    85c5103dda738d6003d39b0b619e68942965ddb9d6e08e544abf377224fdb29c6cd1501a549e99e57875954cea44b5bdefd7cace018c8123e7bfb717ae0e973d

                  • \??\c:\Users\Admin\AppData\Local\Temp\qg2xtijr.cmdline

                    Filesize

                    309B

                    MD5

                    bafbf2e40cec8a40fb534c74190a83cb

                    SHA1

                    6c55d60ef66bb7df66df6734a115b3f67b4c427c

                    SHA256

                    df36189e8ffc0bfdae8c05529faf864319d787481bbf652b3b83f0636ae6314d

                    SHA512

                    c94efd3bf83a3c0abc73c49cd3cbc058bc4ed284992572a926e83c1b01d78dc042228e3d779e093bb3d50ca178084f66a1387dc93b0b9bbfbaf9293c10a84230

                  • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\installer.exe

                    Filesize

                    6.0MB

                    MD5

                    c9704931d887685d96ce92d637d84045

                    SHA1

                    0875a71e9118ded121d92f3f46a3af1ec8380f8b

                    SHA256

                    0448c45cb43585409002e01ef53442cb9f6ad58f211f5deb3ad2ca8b8d535826

                    SHA512

                    3b739394f69ec9f26ef607a0d481f1ad3d107462220c2281cbc300f16886ab3d857bee9af59b8857c7e7ae5b04e6a849eaa5e304d6935957a0a15e462375c260

                  • \Windows\Installer\MSIEDF2.tmp

                    Filesize

                    125KB

                    MD5

                    b0bcc622f1fff0eec99e487fa1a4ddd9

                    SHA1

                    49aa392454bd5869fa23794196aedc38e8eea6f5

                    SHA256

                    b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

                    SHA512

                    1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

                  • memory/1080-87-0x00000000751C1000-0x00000000751C3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1228-84-0x000000001B120000-0x000000001B139000-memory.dmp

                    Filesize

                    100KB

                  • memory/1228-54-0x000007FEF2CE0000-0x000007FEF3D76000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/1228-55-0x000007FEF1FF0000-0x000007FEF2B4D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/1300-65-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

                    Filesize

                    8KB