Analysis

  • max time kernel
    201s
  • max time network
    266s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-05-2022 21:16

General

  • Target

    faf7b36afcd23116c4c15910fad9f3516d15bbfd32d5abb6349f1a433a19c253.exe

  • Size

    6.1MB

  • MD5

    271d2687fb8b495544eb73d3219acfc4

  • SHA1

    80d3310c738fa942853762aa312cdf1c9aeb887b

  • SHA256

    faf7b36afcd23116c4c15910fad9f3516d15bbfd32d5abb6349f1a433a19c253

  • SHA512

    e16ec9a444e0c78b2c9fa7342af011615531025c87180e5ad3122f07d1783433301e6d34549ef09011c1044d733063eb3b85928f3ed48fa725aa52ec6c25a849

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 7 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 6 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faf7b36afcd23116c4c15910fad9f3516d15bbfd32d5abb6349f1a433a19c253.exe
    "C:\Users\Admin\AppData\Local\Temp\faf7b36afcd23116c4c15910fad9f3516d15bbfd32d5abb6349f1a433a19c253.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\App\install.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -a -s -h "C:\ProgramData\App\install.bat" /S /D
        3⤵
        • Views/modifies file attributes
        PID:1132
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1360
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:980
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:732
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1872
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:680
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:272
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\SYSTEM\Remote Manipulator System" /f
        3⤵
          PID:1728
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKLM\SYSTEM\System Corporation Update" /f
          3⤵
            PID:1480
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s "regedit.reg"
            3⤵
            • Runs .reg file with regedit
            PID:300
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            3⤵
            • Delays execution with timeout.exe
            PID:1632
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /silentinstall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:644
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /firewall
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:652
          • C:\ProgramData\App\rutserv.exe
            rutserv.exe /start
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1292
          • C:\Windows\SysWOW64\sc.exe
            sc config RManService start= auto
            3⤵
              PID:976
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App" /S /D
              3⤵
              • Views/modifies file attributes
              PID:1724
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\rutserv.exe" /S /D
              3⤵
              • Views/modifies file attributes
              PID:1840
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\vp8encoder.dll" /S /D
              3⤵
              • Views/modifies file attributes
              PID:1060
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\vp8decoder.dll" /S /D
              3⤵
              • Views/modifies file attributes
              PID:1896
            • C:\Windows\SysWOW64\attrib.exe
              attrib +r +a +s +h "C:\ProgramData\App\rfusclient.exe" /S /D
              3⤵
              • Views/modifies file attributes
              PID:1424
        • C:\ProgramData\App\rutserv.exe
          C:\ProgramData\App\rutserv.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\ProgramData\App\rfusclient.exe
            C:\ProgramData\App\rfusclient.exe
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1664
            • C:\ProgramData\App\rfusclient.exe
              C:\ProgramData\App\rfusclient.exe /tray
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: SetClipboardViewer
              PID:1936
          • C:\ProgramData\App\rfusclient.exe
            C:\ProgramData\App\rfusclient.exe /tray
            2⤵
            • Executes dropped EXE
            PID:1360

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\App\install.bat

          Filesize

          857B

          MD5

          6ec51eea8e8ca78d0086df72e0b10228

          SHA1

          b7c5a2e76841bb1100a846490f79b5de5f90f128

          SHA256

          6d13d9ad28789125fb70e0fdbfa7ee0e1a1c99c7161c0cbeddeb25eb1d7f1498

          SHA512

          6cfefcedd2433afed69f02abc4d2259fd124730ddcb74444d41c1be827bc385ff89e1d8c4646615c73d0d2fa6681045100d2da3f03320628894310e4a7e6a105

        • C:\ProgramData\App\regedit.reg

          Filesize

          11KB

          MD5

          64c927360c077b3e766b1a4a9bdf8f3a

          SHA1

          0bb94ae83d4d4223f5908269a1ab6fdf79405a66

          SHA256

          f8abc166a4efc51f2c6066d7f989c34eb1bdfe95adda8a6c3766e8a956ab6fb9

          SHA512

          3cf275d0c741615b75197dc257d4b1d851ade9fa848eae64eeeb4412d431bd43c3fac21aa1ade8941f1b6d2d765d2413f97e2fd209b141dc2fe721f5fae97cd1

        • C:\ProgramData\App\rfusclient.exe

          Filesize

          1.8MB

          MD5

          5dd41537431207d6f0c8d7574b345edd

          SHA1

          2b3f1085e6a91e4afa454d8e21a9f6f8d1987545

          SHA256

          8f0a55d2cdd377c51902cbadaf372cd3a84afc393445eb3931ac53f43822886e

          SHA512

          b0ce40603e781aa767fa9640e157f384dc74d4434c0ab27998373c91241355f87744c06d3b89f2bd7336e9dc3f266fce5fbdce06828e2ca33902e5e09669bae4

        • C:\ProgramData\App\rfusclient.exe

          Filesize

          1.8MB

          MD5

          5dd41537431207d6f0c8d7574b345edd

          SHA1

          2b3f1085e6a91e4afa454d8e21a9f6f8d1987545

          SHA256

          8f0a55d2cdd377c51902cbadaf372cd3a84afc393445eb3931ac53f43822886e

          SHA512

          b0ce40603e781aa767fa9640e157f384dc74d4434c0ab27998373c91241355f87744c06d3b89f2bd7336e9dc3f266fce5fbdce06828e2ca33902e5e09669bae4

        • C:\ProgramData\App\rfusclient.exe

          Filesize

          1.8MB

          MD5

          5dd41537431207d6f0c8d7574b345edd

          SHA1

          2b3f1085e6a91e4afa454d8e21a9f6f8d1987545

          SHA256

          8f0a55d2cdd377c51902cbadaf372cd3a84afc393445eb3931ac53f43822886e

          SHA512

          b0ce40603e781aa767fa9640e157f384dc74d4434c0ab27998373c91241355f87744c06d3b89f2bd7336e9dc3f266fce5fbdce06828e2ca33902e5e09669bae4

        • C:\ProgramData\App\rfusclient.exe

          Filesize

          1.8MB

          MD5

          5dd41537431207d6f0c8d7574b345edd

          SHA1

          2b3f1085e6a91e4afa454d8e21a9f6f8d1987545

          SHA256

          8f0a55d2cdd377c51902cbadaf372cd3a84afc393445eb3931ac53f43822886e

          SHA512

          b0ce40603e781aa767fa9640e157f384dc74d4434c0ab27998373c91241355f87744c06d3b89f2bd7336e9dc3f266fce5fbdce06828e2ca33902e5e09669bae4

        • C:\ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • C:\ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • C:\ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • C:\ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • C:\ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • C:\ProgramData\App\vp8decoder.dll

          Filesize

          378KB

          MD5

          d43fa82fab5337ce20ad14650085c5d9

          SHA1

          678aa092075ff65b6815ffc2d8fdc23af8425981

          SHA256

          c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b

          SHA512

          103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d

        • C:\ProgramData\App\vp8encoder.dll

          Filesize

          1.6MB

          MD5

          dab4646806dfca6d0e0b4d80fa9209d6

          SHA1

          8244dfe22ec2090eee89dad103e6b2002059d16a

          SHA256

          cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587

          SHA512

          aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7

        • \ProgramData\App\rfusclient.exe

          Filesize

          1.8MB

          MD5

          5dd41537431207d6f0c8d7574b345edd

          SHA1

          2b3f1085e6a91e4afa454d8e21a9f6f8d1987545

          SHA256

          8f0a55d2cdd377c51902cbadaf372cd3a84afc393445eb3931ac53f43822886e

          SHA512

          b0ce40603e781aa767fa9640e157f384dc74d4434c0ab27998373c91241355f87744c06d3b89f2bd7336e9dc3f266fce5fbdce06828e2ca33902e5e09669bae4

        • \ProgramData\App\rutserv.exe

          Filesize

          2.0MB

          MD5

          ba2fb371384526b0f7fd3d6372560bce

          SHA1

          52f8bdd1486b4cdda984909d07d4bd4d32e4b8b2

          SHA256

          6dc1a8ff4f5eb116a4a492a6fd3ff9273480cc98813cfb4ba7d75b4facc12987

          SHA512

          a8a77097d7e59aac2309dfd6216529dec4174ab266c7751ac0cc10bd71b09a5241420efae0e17455667e28a9f289de79098e2add051bdd2184d2fc39ac79fe0e

        • memory/1776-56-0x0000000000400000-0x0000000001208000-memory.dmp

          Filesize

          14.0MB

        • memory/1776-54-0x0000000075721000-0x0000000075723000-memory.dmp

          Filesize

          8KB

        • memory/1776-57-0x0000000000400000-0x0000000001208000-memory.dmp

          Filesize

          14.0MB

        • memory/1776-58-0x0000000000400000-0x0000000001208000-memory.dmp

          Filesize

          14.0MB

        • memory/1776-55-0x0000000000400000-0x0000000001208000-memory.dmp

          Filesize

          14.0MB

        • memory/1776-106-0x0000000000400000-0x0000000001208000-memory.dmp

          Filesize

          14.0MB