Analysis
-
max time kernel
115s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:17
Static task
static1
Behavioral task
behavioral1
Sample
65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe
Resource
win10v2004-20220812-en
General
-
Target
65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe
-
Size
4.4MB
-
MD5
a4ef524bb21b66a9e6267ed8bc871cef
-
SHA1
4363f160e06afea785f43261c69ea2c3d11b3207
-
SHA256
65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e
-
SHA512
eba6c78c3c2b1ce195b4a16f75c332c35001b860a359bd1182277580347d6c0825fdba109ab1644b61b2ab3c0e4f403d12554af2807dceda6aa944503e0086a8
-
SSDEEP
98304:FXKa77HBa1WujIh01MeYvMHXEWxXV4cVYs:F3lFh0KTEEWxXnWs
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4880 7z.exe 3656 rutserv.exe 1784 rutserv.exe 2340 rutserv.exe -
Loads dropped DLL 8 IoCs
pid Process 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 4880 7z.exe 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 3656 rutserv.exe 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 1784 rutserv.exe 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 2340 rutserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft® Maintenance Scheduler = "C:\\Windows\\system32\\sysfiles\\dllhost.exe" 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysfiles\RIPCServer.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\winmm.dll 7z.exe File created C:\Windows\SysWOW64\7z.exe 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File created C:\Windows\SysWOW64\7z.dll 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File created C:\Windows\SysWOW64\sysfiles\English.lg 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\gdiplus.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\hideprlib.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\msvcp90.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\winmm.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles.7z 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File opened for modification C:\Windows\SysWOW64\sysfiles\rfusclient.exe 7z.exe File created C:\Windows\SysWOW64\sysfiles\dsfVorbisDecoder.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\msvcp90.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\vp8decoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\vp8encoder.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles.7z 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File opened for modification C:\Windows\SysWOW64\sysfiles\Microsoft.VC90.CRT.manifest 7z.exe File created C:\Windows\SysWOW64\sysfiles\ProcessList.txt 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\English.lg 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\dsfVorbisEncoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\RWLN.dll 7z.exe File opened for modification C:\Windows\SysWOW64\7z.exe 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File created C:\Windows\SysWOW64\sysfiles\Russian.lg 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\Russian.lg 7z.exe File created C:\Windows\SysWOW64\sysfiles\RIPCServer.dll 7z.exe File opened for modification C:\Windows\SysWOW64\7z.dll 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe File created C:\Windows\SysWOW64\sysfiles\dsfVorbisEncoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\hideprlib.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\Logs 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\vp8encoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\Microsoft.VC90.CRT.manifest 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\ProcessList.txt 7z.exe File created C:\Windows\SysWOW64\sysfiles\rfusclient.exe 7z.exe File created C:\Windows\SysWOW64\sysfiles\msvcr90.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\msvcr90.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\vp8decoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\rutserv.exe 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\rutserv.exe 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\dsfVorbisDecoder.dll 7z.exe File created C:\Windows\SysWOW64\sysfiles\gdiplus.dll 7z.exe File opened for modification C:\Windows\SysWOW64\sysfiles\RWLN.dll 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3656 rutserv.exe 3656 rutserv.exe 1784 rutserv.exe 1784 rutserv.exe 2340 rutserv.exe 2340 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4880 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 81 PID 4804 wrote to memory of 4880 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 81 PID 4804 wrote to memory of 4880 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 81 PID 4804 wrote to memory of 3656 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 83 PID 4804 wrote to memory of 3656 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 83 PID 4804 wrote to memory of 3656 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 83 PID 4804 wrote to memory of 1784 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 84 PID 4804 wrote to memory of 1784 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 84 PID 4804 wrote to memory of 1784 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 84 PID 4804 wrote to memory of 2340 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 85 PID 4804 wrote to memory of 2340 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 85 PID 4804 wrote to memory of 2340 4804 65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe"C:\Users\Admin\AppData\Local\Temp\65e4497f14b0945a2144f28fb14364aa379b642512f6f09a1e6138a9ac2b365e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\7z.exe"7z.exe" x -p1234 sysfiles.7z2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4880
-
-
C:\Windows\SysWOW64\sysfiles\rutserv.exe"C:\Windows\system32\sysfiles\rutserv.exe" /silentinstall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\SysWOW64\sysfiles\rutserv.exe"C:\Windows\system32\sysfiles\rutserv.exe" /firewall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\SysWOW64\sysfiles\rutserv.exe"C:\Windows\system32\sysfiles\rutserv.exe" /start2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
893KB
MD504ad4b80880b32c94be8d0886482c774
SHA1344faf61c3eb76f4a2fb6452e83ed16c9cce73e0
SHA256a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338
SHA5123e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb
-
Filesize
893KB
MD504ad4b80880b32c94be8d0886482c774
SHA1344faf61c3eb76f4a2fb6452e83ed16c9cce73e0
SHA256a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338
SHA5123e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb
-
Filesize
160KB
MD5a51d90f2f9394f5ea0a3acae3bd2b219
SHA120fea1314dbed552d5fedee096e2050369172ee1
SHA256ac9674feb8f2fad20c1e046de67f899419276ae79a60e8cc021a4bf472ae044f
SHA512c11f981136db7d9bde01046b1953fd924ff29447d41257da09dd762451e27390cea9b69e43206a8fff825ebcd4ddec5a6247bb502aefbd6e8285622caa985bf6
-
Filesize
160KB
MD5a51d90f2f9394f5ea0a3acae3bd2b219
SHA120fea1314dbed552d5fedee096e2050369172ee1
SHA256ac9674feb8f2fad20c1e046de67f899419276ae79a60e8cc021a4bf472ae044f
SHA512c11f981136db7d9bde01046b1953fd924ff29447d41257da09dd762451e27390cea9b69e43206a8fff825ebcd4ddec5a6247bb502aefbd6e8285622caa985bf6
-
Filesize
3.9MB
MD53bc1615336a0b00af88d4810f1e647ba
SHA1ee5b26ad9122a40eb557bc28d20b641166046c72
SHA256ba2570baf4bef06059419affb7c6658ad79726c4e044e4b7ac11b6fd796d6010
SHA5124ec61c411df3b24fdecacc0a899014955783f6cb8b0a43b972679bef8d26d54bb45f32ff33ebd0ec11ffdf3aa58002a67575d7df45627b79d9efda1b562a8c42
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
5.7MB
MD584abcb8cc5427479c3e4ebe66300c78a
SHA14227f7850eaebf08f18aa6a2769a600a05bfbf70
SHA256a0487ebd599580d2364bafcd8990970436e40e4979021e02866d0652067d6dbd
SHA5122f3c5dcba1ea204e7abe9dcc47c40097a2d3ddd52b979a8bdd773977e64195a3b71cb5bd2bdb196e5c55071a918326bed34dadc48f1927067b9011bb3633039a
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2
-
Filesize
21KB
MD591b769ba7d48157f452bd26be72160ec
SHA1b61e2369084235ebc0bc277c16d3a56ac20a95b9
SHA25658e401bfbd9387d65571afda2ffc28d290d9d21843aa06a6ceca4f9457d357e9
SHA5121c1a87690486d22007f6f0e5c101575a78f1a17255d4cf6a79df7f5c5b2b4c3e8ec01bf5df33515ea888df12d52a5cd959bd7df6dfb0acceb34b411e97f8f0c2