General

  • Target

    officedeploymenttool_15330-20230.exe

  • Size

    4.4MB

  • Sample

    220831-c3y58ahca7

  • MD5

    ad65a509881ef712234bb07cb1165a46

  • SHA1

    519a968fe267b9bf77f7ff2ba1074e8e20202d60

  • SHA256

    98abbdc3e858ec0647826f9ea66624a15424e4b9c7e6a026341b41f0668f4423

  • SHA512

    eb584be09f95f292b9cf4197685ad8762f84e39c4308eb0dfbfde2b82482cb58f13cbbde6bd49d3ad5d52bf96a8fea068de3d960a06242f25eb85d933ca322fd

  • SSDEEP

    98304:HXz+89bq0C+fRXzclLI6bei3yTu8HsXwKcuj:3K8Bq0DfaN/3yTSAUj

Malware Config

Targets

    • Target

      officedeploymenttool_15330-20230.exe

    • Size

      4.4MB

    • MD5

      ad65a509881ef712234bb07cb1165a46

    • SHA1

      519a968fe267b9bf77f7ff2ba1074e8e20202d60

    • SHA256

      98abbdc3e858ec0647826f9ea66624a15424e4b9c7e6a026341b41f0668f4423

    • SHA512

      eb584be09f95f292b9cf4197685ad8762f84e39c4308eb0dfbfde2b82482cb58f13cbbde6bd49d3ad5d52bf96a8fea068de3d960a06242f25eb85d933ca322fd

    • SSDEEP

      98304:HXz+89bq0C+fRXzclLI6bei3yTu8HsXwKcuj:3K8Bq0DfaN/3yTSAUj

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks