Analysis
-
max time kernel
301s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe
Resource
win7-20220414-en
General
-
Target
94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe
-
Size
16.4MB
-
MD5
54a57c4a0b4891ad3ea90bdf833beed7
-
SHA1
7c9bf87daa9c7f894dcfdaa19e75808938db9f51
-
SHA256
94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f
-
SHA512
1750105257b095c3c97d2a45a9eede594caebdce4f5c7791c008b782067844ae9519deed0bd5358f87bf9a3d3fa06c543a23a81c9a63bf456e4357546f9b3d18
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1524 rfusclient.exe 864 rutserv.exe 544 rutserv.exe 1168 rfusclient.exe -
resource yara_rule behavioral1/memory/1340-55-0x0000000000400000-0x000000000282D000-memory.dmp upx behavioral1/memory/1340-61-0x0000000000400000-0x000000000282D000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Loads dropped DLL 9 IoCs
pid Process 1340 94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe 1524 rfusclient.exe 1524 rfusclient.exe 1524 rfusclient.exe 1524 rfusclient.exe 864 rutserv.exe 864 rutserv.exe 544 rutserv.exe 544 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1524 rfusclient.exe 1524 rfusclient.exe 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe 1168 rfusclient.exe 1168 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 864 rutserv.exe Token: SeTakeOwnershipPrivilege 544 rutserv.exe Token: SeTcbPrivilege 544 rutserv.exe Token: SeTcbPrivilege 544 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1168 rfusclient.exe 1168 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1168 rfusclient.exe 1168 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 864 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe 544 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1524 1340 94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe 27 PID 1340 wrote to memory of 1524 1340 94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe 27 PID 1340 wrote to memory of 1524 1340 94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe 27 PID 1340 wrote to memory of 1524 1340 94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe 27 PID 1524 wrote to memory of 864 1524 rfusclient.exe 28 PID 1524 wrote to memory of 864 1524 rfusclient.exe 28 PID 1524 wrote to memory of 864 1524 rfusclient.exe 28 PID 1524 wrote to memory of 864 1524 rfusclient.exe 28 PID 544 wrote to memory of 1168 544 rutserv.exe 30 PID 544 wrote to memory of 1168 544 rutserv.exe 30 PID 544 wrote to memory of 1168 544 rutserv.exe 30 PID 544 wrote to memory of 1168 544 rutserv.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe"C:\Users\Admin\AppData\Local\Temp\94e4d5fcc31fc37aa29b3d042bc2c0295b66592f33730e05e2889a9a69f32f5f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rfusclient.exe" -run_agent2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rutserv.exe" -run_agent3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\FE96E5193D\rfusclient.exe" /tray /user5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1168
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
674B
MD554e5a8d26aaad70d18f61bf532129d8b
SHA1a81a63d06570dcea8820dc5e028ac0b18c31d151
SHA256dedb9c33b36b950dcd2e4492301e48491136e95e19d058b8458752f019befd0a
SHA512090b50bb609712e89298bc96c74f0f0a708475e8554b855440dca3e0837888ecb75a9310be9fbe3ca73829293c6021f67ea9f7a5fc552c0a840b36e596be1e02
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
1.3MB
MD50d51927274281007657c7f3e0df7becb
SHA16de3746d9d0980f5715cec6c676a8eb53b5efc49
SHA256dfc847405be60c29e86e3e3222e7f63c1ff584727d87d3c35c25c4893e19fda0
SHA512eef74088a94635184192d82bb6dcc0758749cb290c8deeff211881e8a280aec73a53334eff8846df618204b0f318e757eab23e76951a472ba6e086905000d9a5
-
Filesize
11KB
MD58c65c32c734d988de2d3d690e9a208fa
SHA1c12426d7a7d3387565c894224819c70b5991d3cc
SHA256900f787d7bcc774df9df32d65a04494faa6e30c9647d81657c946f3e19f4ecdf
SHA512000dee71d9c9b0e721a6a9f6a19e32dcc4b0c2ce5b4d6479a1ae36d4194319092573befe6b28552d9b5279430322e71582e9e2edcabde715e389b1860c1645a0
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
11KB
MD5f4852a3bdf6147b8b0dcbcf3baec90a8
SHA10b8d32a627bd52b0f84cc043d220c4261aec5ad0
SHA256a702e2b289f0b1af87c0d4f4af07aa8acbe06b2d5b5d28aee7cd587ef423046e
SHA512a7eecf297b6d868ad7dfc6bd4929f8b7ffcda44ebbee81f9acd92e8c39f65b25fd7be744f6ade73017c86d4d4c6098f11f364d70fb6a5d605ba57ce8d19af75e
-
Filesize
337KB
MD5197da919e4c91125656bf905877c9b5a
SHA19574ec3e87bb0f7acce72d4d59d176296741aa83
SHA256303c78aba3b776472c245f17020f9aa5a53f09a6f6c1e4f34b8e18e33906b5ee
SHA51233c1b853181f83cab2f57f47fb7e093badf83963613e7328ebd23f0d62f59416d7a93063c6237435fbb6833a69bc44ebbc13aa585da010f491c680b2ea335c47
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
1.6MB
MD52ac39d6990170ca37a735f2f15f970e8
SHA18148a9cdc6b3fe6492281ebad79636433a6064ab
SHA2560961d83cb25e1a50d5c0ec2f9fb0d17f2504dae0b22a865f6e1ea8e987e1c6fa
SHA5127e30fde909d5f8efd6c2e40e125525697267273163ac35cf53561a2bd32e5dad8e4fba32905f53e422c9c73b8ad9a0c151f8d36042c5f156b50bf42dc21a9cee
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
365KB
MD5c9d412c1d30abb9d61151a10371f4140
SHA187120faa6b859f5e23f7344f9547b2fc228af15b
SHA256f3465ce8a23db5e8228eed5a60a6f7a096d1a9adf3012c39bc6d81d4e57e8e9e
SHA5121c020afa89cdae55f4dcb80a455dc1b352f40455142f3947ed29c3e3d51fbd465b6e0ea16cd103186c252783a3f2a7f7c417e4df5727d9b2db511b650308face
-
Filesize
860KB
MD5a59f69797c42324540e26c7c7998c18c
SHA17f7bc5bc62a8744f87a7d2e30cc6dd74c72e19b4
SHA25683e1c1eb55bfd0f2d85d41c1e4dee65046b064ccb263ec7f412a5f329c75cfd1
SHA512837f244e6b70658974506ac35bd3ee2d413b89fe4b26e75f4a61cc7bec63e999c9c2cffb690ad567f74962bab13f2f5471300cd0e0cfe61bb1084072cb55c38b
-
Filesize
1.3MB
MD50d51927274281007657c7f3e0df7becb
SHA16de3746d9d0980f5715cec6c676a8eb53b5efc49
SHA256dfc847405be60c29e86e3e3222e7f63c1ff584727d87d3c35c25c4893e19fda0
SHA512eef74088a94635184192d82bb6dcc0758749cb290c8deeff211881e8a280aec73a53334eff8846df618204b0f318e757eab23e76951a472ba6e086905000d9a5
-
Filesize
1.3MB
MD50d51927274281007657c7f3e0df7becb
SHA16de3746d9d0980f5715cec6c676a8eb53b5efc49
SHA256dfc847405be60c29e86e3e3222e7f63c1ff584727d87d3c35c25c4893e19fda0
SHA512eef74088a94635184192d82bb6dcc0758749cb290c8deeff211881e8a280aec73a53334eff8846df618204b0f318e757eab23e76951a472ba6e086905000d9a5
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
337KB
MD5197da919e4c91125656bf905877c9b5a
SHA19574ec3e87bb0f7acce72d4d59d176296741aa83
SHA256303c78aba3b776472c245f17020f9aa5a53f09a6f6c1e4f34b8e18e33906b5ee
SHA51233c1b853181f83cab2f57f47fb7e093badf83963613e7328ebd23f0d62f59416d7a93063c6237435fbb6833a69bc44ebbc13aa585da010f491c680b2ea335c47
-
Filesize
337KB
MD5197da919e4c91125656bf905877c9b5a
SHA19574ec3e87bb0f7acce72d4d59d176296741aa83
SHA256303c78aba3b776472c245f17020f9aa5a53f09a6f6c1e4f34b8e18e33906b5ee
SHA51233c1b853181f83cab2f57f47fb7e093badf83963613e7328ebd23f0d62f59416d7a93063c6237435fbb6833a69bc44ebbc13aa585da010f491c680b2ea335c47