Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 23:38

General

  • Target

    fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe

  • Size

    7.3MB

  • MD5

    6b6702acef95453426afa2f1d2520bb2

  • SHA1

    47293a57769289aa4070f04f22f7d9fcc77c9682

  • SHA256

    fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3

  • SHA512

    e93652d097c7cb45c46acb5926cf59ad87741ee9a795c4294d4bbed43827aecde27e34520102da717073d4a197b6c5d4addd581ee2ae7c4020f5415cb93f9c5c

  • SSDEEP

    196608:W15XKNCDOtv1BCkrxlpJ8EAnOsjnkrciwzSQ2Y:WrXov6sxDiEAOsjo2X2Y

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 58 IoCs
  • Drops file in Windows directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe
    "C:\Users\Admin\AppData\Local\Temp\fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:1996
        • C:\Windows\SysWOW64\msiexec.exe
          MsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /qn REBOOT=ReallySuppress
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2000
        • C:\Windows\SysWOW64\msiexec.exe
          MsiExec /x {54067864-C0E7-47DB-A0C1-D6C874CE6BD8} /qn REBOOT=ReallySuppress
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2016
        • C:\Windows\SysWOW64\msiexec.exe
          MsiExec /I "rms.host5.5ru.msi" /qn
          3⤵
            PID:684
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 8E81C20E56D0B620032229F852FE36C1
          2⤵
          • Loads dropped DLL
          PID:1148
        • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
          "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1324
        • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
          "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /firewall
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:692
        • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
          "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /printerinstall
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\uninstall.cmd" "
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe
              srvinst_x64.exe stop
              4⤵
              • Executes dropped EXE
              PID:1396
            • C:\Windows\SysWOW64\PING.EXE
              ping localhost
              4⤵
              • Runs ping.exe
              PID:1784
            • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe
              setupdrv.exe uninstall
              4⤵
              • Executes dropped EXE
              PID:1660
            • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe
              srvinst_x64.exe uninstall
              4⤵
              • Executes dropped EXE
              PID:1716

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\uninstall.cmd

        Filesize

        87B

        MD5

        24837286ab8b5537ea3967e0a7905238

        SHA1

        4f3dc09d2f0c9ede72577154b9954621dd30604b

        SHA256

        f6ebaa2bc59841b72aaf3c03c7bfea91c75ec1f982f497d6b3d7fb7271cacdf6

        SHA512

        6b0cfd707fbab7034ef45b4864329a9ad01f649216fe13aede6bf6488b50020da65f8a3776c1b125eebe08aef6a848d04a33de8277a2ad3827c8869af1368c00

      • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe

        Filesize

        5.7MB

        MD5

        84abcb8cc5427479c3e4ebe66300c78a

        SHA1

        4227f7850eaebf08f18aa6a2769a600a05bfbf70

        SHA256

        a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd

        SHA512

        2f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a

      • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe

        Filesize

        5.7MB

        MD5

        84abcb8cc5427479c3e4ebe66300c78a

        SHA1

        4227f7850eaebf08f18aa6a2769a600a05bfbf70

        SHA256

        a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd

        SHA512

        2f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a

      • C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe

        Filesize

        5.7MB

        MD5

        84abcb8cc5427479c3e4ebe66300c78a

        SHA1

        4227f7850eaebf08f18aa6a2769a600a05bfbf70

        SHA256

        a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd

        SHA512

        2f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a

      • C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll

        Filesize

        21KB

        MD5

        91b769ba7d48157f452bd26be72160ec

        SHA1

        b61e2369084235ebc0bc277c16d3a56ac20a95b9

        SHA256

        58e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9

        SHA512

        1c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd

        Filesize

        686B

        MD5

        71b49822e6941d131840c3902d61b940

        SHA1

        9bd095ae0ef802bae85f659a22c7f343814c9a9d

        SHA256

        903cebb868adeea505be095cbc5bff92fa66ffd848a171d3b1208efa8ed6d66b

        SHA512

        ce0a42fe81f21547cdf95f3141319c167449a81228ff50599f1e2483543f6c9291e0f1b60157fb495de64526d62a4499b07bedf218c73392b739bbef935322df

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms.host5.5ru.msi

        Filesize

        7.9MB

        MD5

        f63f70f82fa77f0e2f771c7fc10b3985

        SHA1

        d6db70a31267811aa5553058a32f0382532f1b12

        SHA256

        4e079967632c04b3981197fc54c925bab1a7b9a1edf9a3c282374563a481dfc2

        SHA512

        792eb27d03d67574938429f3177e7b896d9ef96e2b24002f5a6d5a6c077451ec0f4dd8d0c88e09a625e4d04e516450739583c35a3377b8cc741bf3b33197d889

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\winmm.dll

        Filesize

        21KB

        MD5

        91b769ba7d48157f452bd26be72160ec

        SHA1

        b61e2369084235ebc0bc277c16d3a56ac20a95b9

        SHA256

        58e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9

        SHA512

        1c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2

      • C:\Windows\Installer\MSIB208.tmp

        Filesize

        125KB

        MD5

        b0bcc622f1fff0eec99e487fa1a4ddd9

        SHA1

        49aa392454bd5869fa23794196aedc38e8eea6f5

        SHA256

        b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

        SHA512

        1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe

        Filesize

        64KB

        MD5

        3e2d738baf89f2df0f677453b641b00f

        SHA1

        ba3db6e032a2a9ca7197459c9485ae05a31e6214

        SHA256

        ea746fa2f55af75aea2f476a5a8371e2446b4c993b668468566734ca4172e98b

        SHA512

        1a721f3a4bca6c32dbcbbc408c41bb52bd42f9d4abea4a663daf5d8553cba7b3907b4ef147cdf3d4725eab6410218c587383192a640a89738a781978b59e3896

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • \Program Files (x86)\Remote Manipulator System - Host\Printer\x64\srvinst_x64.exe

        Filesize

        39KB

        MD5

        8d5c6130f1ac7bbc63a5ca7bfdbe0b86

        SHA1

        65c5870581d5ecccda95e8cd7988ed296e1b13bf

        SHA256

        00dbd31fb64d0c908f174c7f028e7beb287f2ac25e2ddf6109df910cf2900205

        SHA512

        dcaf1d6d3e6d87f7f6eed0ecb2b16156048589a37c0528d3dc1d0f691e831cfe6d82a7122d52429e94b694802ec8b50893eb86d25ea660d6b397d47cdcd761c9

      • \Program Files (x86)\Remote Manipulator System - Host\winmm.dll

        Filesize

        21KB

        MD5

        91b769ba7d48157f452bd26be72160ec

        SHA1

        b61e2369084235ebc0bc277c16d3a56ac20a95b9

        SHA256

        58e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9

        SHA512

        1c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2

      • \Program Files (x86)\Remote Manipulator System - Host\winmm.dll

        Filesize

        21KB

        MD5

        91b769ba7d48157f452bd26be72160ec

        SHA1

        b61e2369084235ebc0bc277c16d3a56ac20a95b9

        SHA256

        58e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9

        SHA512

        1c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2

      • \Program Files (x86)\Remote Manipulator System - Host\winmm.dll

        Filesize

        21KB

        MD5

        91b769ba7d48157f452bd26be72160ec

        SHA1

        b61e2369084235ebc0bc277c16d3a56ac20a95b9

        SHA256

        58e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9

        SHA512

        1c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2

      • \Windows\Installer\MSIB208.tmp

        Filesize

        125KB

        MD5

        b0bcc622f1fff0eec99e487fa1a4ddd9

        SHA1

        49aa392454bd5869fa23794196aedc38e8eea6f5

        SHA256

        b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081

        SHA512

        1572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7

      • memory/692-83-0x0000000073D10000-0x0000000073D17000-memory.dmp

        Filesize

        28KB

      • memory/1052-61-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

        Filesize

        8KB

      • memory/1324-78-0x0000000073D00000-0x0000000073D07000-memory.dmp

        Filesize

        28KB

      • memory/1604-54-0x0000000075601000-0x0000000075603000-memory.dmp

        Filesize

        8KB

      • memory/1748-88-0x0000000073D00000-0x0000000073D07000-memory.dmp

        Filesize

        28KB