Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 15:12

General

  • Target

    3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a.exe

  • Size

    6.2MB

  • MD5

    1999896087f7edc2d521787131d08fba

  • SHA1

    927a3a6874004049e0d6400eb218a6f377d67afb

  • SHA256

    3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

  • SHA512

    a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 7 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a.exe
    "C:\Users\Admin\AppData\Local\Temp\3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\System64\1rfusclient.exe
      "C:\Windows\System64\1rfusclient.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"
        3⤵
        • Runs .reg file with regedit
        PID:1712
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Windows\Zont911\Tupe.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\SysWOW64\chcp.com
          Chcp 1251
          4⤵
            PID:1772
          • C:\Windows\System64\svnhost.exe
            "C:\Windows\System64\svnhost.exe" /silentinstall
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1328
          • C:\Windows\System64\svnhost.exe
            "C:\Windows\System64\svnhost.exe" /firewall
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1028
          • C:\Windows\System64\svnhost.exe
            "C:\Windows\System64\svnhost.exe" /start
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:532
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\System64\*.*" +s +h
            4⤵
            • Drops file in Windows directory
            • Views/modifies file attributes
            PID:436
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\System64" +s +h
            4⤵
            • Drops file in Windows directory
            • Views/modifies file attributes
            PID:1352
    • C:\Windows\System64\svnhost.exe
      C:\Windows\System64\svnhost.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\System64\systemsmss.exe
        C:\Windows\System64\systemsmss.exe
        2⤵
        • Executes dropped EXE
        PID:320
      • C:\Windows\System64\systemsmss.exe
        C:\Windows\System64\systemsmss.exe /tray
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:576

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System64\1rfusclient.exe

      Filesize

      6.2MB

      MD5

      1999896087f7edc2d521787131d08fba

      SHA1

      927a3a6874004049e0d6400eb218a6f377d67afb

      SHA256

      3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

      SHA512

      a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

    • C:\Windows\System64\1rfusclient.exe

      Filesize

      6.2MB

      MD5

      1999896087f7edc2d521787131d08fba

      SHA1

      927a3a6874004049e0d6400eb218a6f377d67afb

      SHA256

      3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

      SHA512

      a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

    • C:\Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • C:\Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • C:\Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • C:\Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • C:\Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • C:\Windows\System64\systemsmss.exe

      Filesize

      5.1MB

      MD5

      bd458a26931f960f13958510e88a61a8

      SHA1

      be9fff29f269d649688e941e97ac03e669571837

      SHA256

      d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3

      SHA512

      afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7

    • C:\Windows\System64\systemsmss.exe

      Filesize

      5.1MB

      MD5

      bd458a26931f960f13958510e88a61a8

      SHA1

      be9fff29f269d649688e941e97ac03e669571837

      SHA256

      d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3

      SHA512

      afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7

    • C:\Windows\System64\systemsmss.exe

      Filesize

      5.1MB

      MD5

      bd458a26931f960f13958510e88a61a8

      SHA1

      be9fff29f269d649688e941e97ac03e669571837

      SHA256

      d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3

      SHA512

      afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7

    • C:\Windows\System64\vp8decoder.dll

      Filesize

      378KB

      MD5

      d43fa82fab5337ce20ad14650085c5d9

      SHA1

      678aa092075ff65b6815ffc2d8fdc23af8425981

      SHA256

      c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b

      SHA512

      103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d

    • C:\Windows\System64\vp8encoder.dll

      Filesize

      1.6MB

      MD5

      dab4646806dfca6d0e0b4d80fa9209d6

      SHA1

      8244dfe22ec2090eee89dad103e6b2002059d16a

      SHA256

      cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587

      SHA512

      aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7

    • C:\Windows\Zont911\Regedit.reg

      Filesize

      11KB

      MD5

      110f41f132ae62b14db7bb6a0258982d

      SHA1

      10edc42f23062e07a0bf2a0fae8f26a774da2a01

      SHA256

      928de2b9b85836eefa7de88b2c7f591cd6ca6c5a757770094d9eefd6946c97fb

      SHA512

      77de85ec7a5fd5e119b4458e35f269425274352f5a483d965982e183c199d7954b9c38b132852337046e7fef508644f15742e78ccdeafad7c3dbe1d531d63270

    • C:\Windows\Zont911\Tupe.bat

      Filesize

      357B

      MD5

      07927d892f3c03654acb767fa8c9af7e

      SHA1

      66f46d9983a2f62fcd9ed72fcc76236a11f0245e

      SHA256

      1ef9d404d5ab0ddb28724a412299d68aab327d318f5f193dfc5e175b3e45020a

      SHA512

      e2643d595f1ce7ed24bff3d9cd09f9456135c5ada6b3c49d4353994cf1dbc1505ac00db5d7b90e65f109180a9a1fa99aa1a80d93694ea9f60df83bda5ea4a532

    • \Windows\System64\1rfusclient.exe

      Filesize

      6.2MB

      MD5

      1999896087f7edc2d521787131d08fba

      SHA1

      927a3a6874004049e0d6400eb218a6f377d67afb

      SHA256

      3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

      SHA512

      a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

    • \Windows\System64\1rfusclient.exe

      Filesize

      6.2MB

      MD5

      1999896087f7edc2d521787131d08fba

      SHA1

      927a3a6874004049e0d6400eb218a6f377d67afb

      SHA256

      3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

      SHA512

      a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

    • \Windows\System64\1rfusclient.exe

      Filesize

      6.2MB

      MD5

      1999896087f7edc2d521787131d08fba

      SHA1

      927a3a6874004049e0d6400eb218a6f377d67afb

      SHA256

      3d72d9ba9f710fc9b83fe7ae88a0ba6fa84e4bf9e2a9b67b020aac73ea2f256a

      SHA512

      a16768a8fef18561f054b1846074feeaac4b77b60897bafca853b7641d7c06fac533b6d1f74342d068959264d4ff065bca4436742c18ec796f7fea1d4a2a9c15

    • \Windows\System64\svnhost.exe

      Filesize

      6.0MB

      MD5

      e437e8730f2163cba2552a5a374a885a

      SHA1

      514497f668ae7b80a698bd8cda6de2dcf104e450

      SHA256

      dde1cc7b34ad434fb515b4b315c2ec22a74e3b1b4d50fe83421fab4d6055b3a6

      SHA512

      e924929176c60f00bfd45f0ec991279d4bbb96be4f5f270e636594d4faad681c318cbc9374dd2126170e18f7b4e9db54b193c147b452655c2806921d8c76c445

    • \Windows\System64\systemsmss.exe

      Filesize

      5.1MB

      MD5

      bd458a26931f960f13958510e88a61a8

      SHA1

      be9fff29f269d649688e941e97ac03e669571837

      SHA256

      d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3

      SHA512

      afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7

    • \Windows\System64\systemsmss.exe

      Filesize

      5.1MB

      MD5

      bd458a26931f960f13958510e88a61a8

      SHA1

      be9fff29f269d649688e941e97ac03e669571837

      SHA256

      d295538301a5513d3e605e43586e48504ec22f87666a31ef06f697b5c9b611f3

      SHA512

      afe9e6209ade2846f31efb7b9977d42b28cd082eb0a4b9c4ba4b9c91d528afbc7efe748be0c78c938d042dc9d200c23d2f0552a7498ab23becac828df53245e7

    • memory/1180-54-0x0000000076C81000-0x0000000076C83000-memory.dmp

      Filesize

      8KB