Analysis
-
max time kernel
271s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 14:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://distribs.buhphone.com/work_4571/rutserv.exe
Resource
win7-20220812-en
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1508 rutserv.exe 1148 rutserv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation rutserv.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e01a9fe386f3d801 iexplore.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000b825db3f1291e4718452b4b802a09cd420daeb397bb4def535993febc73ec329000000000e8000000002000020000000190ba359f89553bbb0915ddaabbc20e73e13ae3d3dad38f1d30779f358413d8f2000000042217eb59be0a1a107fc610b9d7f9be240aae7c8c279f096e585cad5da62fe4b400000007771c8a5dab226ec62fc4a0aa50dc87e1685caf77ad702cdff9c57c807b638912b2a134530b14ed5d109c44b86896ab6b76da55b9dd793b34afea780adc6c70f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374686332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000b81803e933e125ab98996b6ba1ce122e65d02cdffe4702cbe3c9fcdb683952bd000000000e8000000002000020000000e5677936c4327eb4c9796e4c4743b06e82f7298909385ceea96758f4f293d56790000000168b96572977965824027f8327516f5d7610ff986cd01e6db1dabafc7a1e16743a3702e34be15380f4de59ae267e1b866070bb405b18de4e230869d2e89aa9ce230265fb559f4c367ad1d61eb47093aeb7fdf22ed878e04973328fcb4bb7d0c4fe9f9d1261243aee4ed3cf6a880857aad02ab020895313478d1160a99f8eacc6d08afcf996bde0444aa5e713cdb3da4440000000406019b9b56423a652fc422f7d2bb77994bf3f21cd646eca2ad96f483c1011e52c408afb9050d9d7654cd9ed6d88e4cb889e351bd8276309775e85f8a9d7f871 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{194451B1-5F7A-11ED-9738-7E4CDA66D2DC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802ab0f586f3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1508 rutserv.exe 1508 rutserv.exe 1508 rutserv.exe 1508 rutserv.exe 1508 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1508 rutserv.exe Token: SeTakeOwnershipPrivilege 1148 rutserv.exe Token: SeTcbPrivilege 1148 rutserv.exe Token: SeTcbPrivilege 1148 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1508 rutserv.exe 1508 rutserv.exe 1508 rutserv.exe 1508 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe 1148 rutserv.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1944 1608 iexplore.exe 27 PID 1608 wrote to memory of 1944 1608 iexplore.exe 27 PID 1608 wrote to memory of 1944 1608 iexplore.exe 27 PID 1608 wrote to memory of 1944 1608 iexplore.exe 27 PID 1608 wrote to memory of 1508 1608 iexplore.exe 29 PID 1608 wrote to memory of 1508 1608 iexplore.exe 29 PID 1608 wrote to memory of 1508 1608 iexplore.exe 29 PID 1608 wrote to memory of 1508 1608 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://distribs.buhphone.com/work_4571/rutserv.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe" -second3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe
Filesize8.9MB
MD5c805f814be968f1405a1144d02e8034d
SHA1600b70c9565f138232a2f72a247381703ee2ba79
SHA256b9b5bf758928b1e68a6d3e8001a71572076ddad8b46765dfec25c4947daac87d
SHA5126916d0d3fb71228c2750a25e6c7d44da68589477d1b1c2f303b3878e8a4a0f599853383c62e1d73124eed14a43c2610a1fa2ec141df4ed77969b5567157a99e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe
Filesize8.9MB
MD5c805f814be968f1405a1144d02e8034d
SHA1600b70c9565f138232a2f72a247381703ee2ba79
SHA256b9b5bf758928b1e68a6d3e8001a71572076ddad8b46765dfec25c4947daac87d
SHA5126916d0d3fb71228c2750a25e6c7d44da68589477d1b1c2f303b3878e8a4a0f599853383c62e1d73124eed14a43c2610a1fa2ec141df4ed77969b5567157a99e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\rutserv.exe.zfau0s8.partial
Filesize8.9MB
MD5c805f814be968f1405a1144d02e8034d
SHA1600b70c9565f138232a2f72a247381703ee2ba79
SHA256b9b5bf758928b1e68a6d3e8001a71572076ddad8b46765dfec25c4947daac87d
SHA5126916d0d3fb71228c2750a25e6c7d44da68589477d1b1c2f303b3878e8a4a0f599853383c62e1d73124eed14a43c2610a1fa2ec141df4ed77969b5567157a99e5
-
Filesize
595B
MD5f411628d2097e75c57c3c430d0df4234
SHA16063ead4dcc7fe6f1294e04ecb1398f409edd6d4
SHA256745c9919315dbb9ef9a70aa5870a75a6ee32be1f24a1c2201071814fb5e3d220
SHA512da30752c5078bc5bbc81843570f23ea169efeeecabdb10fffe84497df9f3cea34c0c2d403647d69855560756124931a29c7e72ad8f0dea79c66faf137e4a9a2e