Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 04:56

General

  • Target

    6679713eff98fb9688c93ea4fbf18b3e032951b87de9f92c78a72fce8ce01ce7.exe

  • Size

    2.0MB

  • MD5

    b116dea2cc37290ca470c0897b525003

  • SHA1

    fb949ccd1adc5588268fdb1e6664a6acdf05e2d7

  • SHA256

    6679713eff98fb9688c93ea4fbf18b3e032951b87de9f92c78a72fce8ce01ce7

  • SHA512

    e20d51db38fc449087737759f9898baff38c32cbec87a0b887d8cf30fae78f4c7622eaf52722c405fc96db233233d2d18673315125e423c09bf0243073ef9fac

  • SSDEEP

    49152:vcH5bKv+aDrXbxG6lHVXkHkTfdDer4kE+5cc1rHVXsKAT21GBxF37o:vcZq+aDrbxxHlckxqbE+5Z1rSe1Gf6

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6679713eff98fb9688c93ea4fbf18b3e032951b87de9f92c78a72fce8ce01ce7.exe
    "C:\Users\Admin\AppData\Local\Temp\6679713eff98fb9688c93ea4fbf18b3e032951b87de9f92c78a72fce8ce01ce7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im anvir.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3688
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4732
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3788
      • C:\Windows\SysWOW64\attrib.exe
        attrib +s +h +r "C:\Users\Admin\Birdsmade"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:3388
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t reg_dword /d 0 /f
        3⤵
          PID:5048
        • C:\Users\Admin\Birdsmade\svnhost.exe
          "C:\Users\Admin\Birdsmade\svnhost.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1452
          • C:\Users\Admin\Birdsmade\svnhost.exe
            C:\Users\Admin\Birdsmade\svnhost.exe -second
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3956
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3460

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Hidden Files and Directories

    2
    T1158

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Hidden Files and Directories

    2
    T1158

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\config.dll
      Filesize

      3KB

      MD5

      91a4ef42b6c599f58d8d6ea0292e4827

      SHA1

      4122ce1401f57573135db4143071064c057edd16

      SHA256

      4c37b23151365fb28fad4b446f93bb56839ebfbc5861c50ea59d25f0f01e022e

      SHA512

      3e53da527b22bce594cb01394aa388812f015a07f231c2edb3c73b8d16e7d4b17238b2fbf38e3daf1037749c5d14e7f4193e9a79e4b35737266e25fc16fb4bb4

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd
      Filesize

      798B

      MD5

      8db8a08ea64104c1fb0b5f9a30e56b0c

      SHA1

      767d987fdb887679cf7513aff01baf8fb23e393f

      SHA256

      2bda4135e21205fde780ccde8b54e458bf3249225389253d0c3f237649114008

      SHA512

      e37f1b2b7db1f1568d7a248921ba93df76f4459dccbef5975b92851caa27a358de177d235b540cfa5d91b6921213c22520c77fa15c9f43d8c63292c4f1cf2372

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rinit.dll
      Filesize

      105KB

      MD5

      7e4d2cb21c411c88b453b9aecd75efa0

      SHA1

      f1054531b5954921e0931453338322bb34816c1e

      SHA256

      fc4d3f734cd484d0514dcee814e4238bcba251b8735f618bbee415991360ef32

      SHA512

      98a0f241650c780866983ab0e24edd665c9c2761f48e847cad5b88b79c534434df1a561ae928d2a19ca476b603bbf3dcab4faccfd996754614a8650755379770

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\settings.ini
      Filesize

      224B

      MD5

      f2c16504259552b86120bd3b3bb8cb37

      SHA1

      679b943d4a9d80142aac4fabe5e8dccfdf23994e

      SHA256

      be56123b3196282d8440216aa5f7eb455fe41554d75bcdee016d98aef46b950a

      SHA512

      0a61fb87cfbd290b46f8d0f923ab0325f9af3f16172aadd1be5cc6855dc06a58677cef954342432972f43797c62f6fe0722a55e3f3ba475a5820dab90a282860

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\svnhost.exe
      Filesize

      5.6MB

      MD5

      9eaf8a765669acdc1bf3501006b801e0

      SHA1

      f582a4e8c29856650e99bbdd62dd985ea5827e08

      SHA256

      4c65d5cae34c6e912d65b0de98caa8eb8315dbc7d3e7d8094a4fa261389fc0f5

      SHA512

      603a9374edd90ed327a32c3bb25ed8dbe2884ffc282217ac3f247ef07958d80e448d27b8ec3f6889917fe7fdbbf6c7e56df87400814918a663dca2ecac88370f

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vp8decoder.dll
      Filesize

      403KB

      MD5

      6b04788094ecd05d610dbc0367fe49da

      SHA1

      23272fd3c0b4a808e94665e0e1b32dcdef31aa58

      SHA256

      efcb21b1caa11c8f876238beda8411b9acf4baf8a9acf946a679e120b75ad2d5

      SHA512

      e44bd76322df4c8cbd3a1633abe52f09732cbe1a83e80be5db7eb6b983b3898730451298df417788cda4392dfab83be3b7065e52fb43217fc5e5f719f5a3f68e

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vp8encoder.dll
      Filesize

      685KB

      MD5

      b5b4a8455605319035a6392015df9edd

      SHA1

      702b4f6cee4b4708b9a55d561fac45738b058484

      SHA256

      27e0311c8b709899a31f4f16f79e6dfa2e0a6922e8f3dad56d1ade26432d443b

      SHA512

      8a4d84c82c506fb06efde4d6d7c304a518d385c3371284b1fdbcda7a9945301ec970aad06e0d541a79c9843a2c73a31de7571580351a375b91538ec34179c666

    • C:\Users\Admin\Birdsmade\config.dll
      Filesize

      3KB

      MD5

      91a4ef42b6c599f58d8d6ea0292e4827

      SHA1

      4122ce1401f57573135db4143071064c057edd16

      SHA256

      4c37b23151365fb28fad4b446f93bb56839ebfbc5861c50ea59d25f0f01e022e

      SHA512

      3e53da527b22bce594cb01394aa388812f015a07f231c2edb3c73b8d16e7d4b17238b2fbf38e3daf1037749c5d14e7f4193e9a79e4b35737266e25fc16fb4bb4

    • C:\Users\Admin\Birdsmade\rinit.dll
      Filesize

      105KB

      MD5

      7e4d2cb21c411c88b453b9aecd75efa0

      SHA1

      f1054531b5954921e0931453338322bb34816c1e

      SHA256

      fc4d3f734cd484d0514dcee814e4238bcba251b8735f618bbee415991360ef32

      SHA512

      98a0f241650c780866983ab0e24edd665c9c2761f48e847cad5b88b79c534434df1a561ae928d2a19ca476b603bbf3dcab4faccfd996754614a8650755379770

    • C:\Users\Admin\Birdsmade\rinit.dll
      Filesize

      105KB

      MD5

      7e4d2cb21c411c88b453b9aecd75efa0

      SHA1

      f1054531b5954921e0931453338322bb34816c1e

      SHA256

      fc4d3f734cd484d0514dcee814e4238bcba251b8735f618bbee415991360ef32

      SHA512

      98a0f241650c780866983ab0e24edd665c9c2761f48e847cad5b88b79c534434df1a561ae928d2a19ca476b603bbf3dcab4faccfd996754614a8650755379770

    • C:\Users\Admin\Birdsmade\rinit.dll
      Filesize

      105KB

      MD5

      7e4d2cb21c411c88b453b9aecd75efa0

      SHA1

      f1054531b5954921e0931453338322bb34816c1e

      SHA256

      fc4d3f734cd484d0514dcee814e4238bcba251b8735f618bbee415991360ef32

      SHA512

      98a0f241650c780866983ab0e24edd665c9c2761f48e847cad5b88b79c534434df1a561ae928d2a19ca476b603bbf3dcab4faccfd996754614a8650755379770

    • C:\Users\Admin\Birdsmade\settings.ini
      Filesize

      224B

      MD5

      f2c16504259552b86120bd3b3bb8cb37

      SHA1

      679b943d4a9d80142aac4fabe5e8dccfdf23994e

      SHA256

      be56123b3196282d8440216aa5f7eb455fe41554d75bcdee016d98aef46b950a

      SHA512

      0a61fb87cfbd290b46f8d0f923ab0325f9af3f16172aadd1be5cc6855dc06a58677cef954342432972f43797c62f6fe0722a55e3f3ba475a5820dab90a282860

    • C:\Users\Admin\Birdsmade\svnhost.exe
      Filesize

      5.6MB

      MD5

      9eaf8a765669acdc1bf3501006b801e0

      SHA1

      f582a4e8c29856650e99bbdd62dd985ea5827e08

      SHA256

      4c65d5cae34c6e912d65b0de98caa8eb8315dbc7d3e7d8094a4fa261389fc0f5

      SHA512

      603a9374edd90ed327a32c3bb25ed8dbe2884ffc282217ac3f247ef07958d80e448d27b8ec3f6889917fe7fdbbf6c7e56df87400814918a663dca2ecac88370f

    • C:\Users\Admin\Birdsmade\svnhost.exe
      Filesize

      5.6MB

      MD5

      9eaf8a765669acdc1bf3501006b801e0

      SHA1

      f582a4e8c29856650e99bbdd62dd985ea5827e08

      SHA256

      4c65d5cae34c6e912d65b0de98caa8eb8315dbc7d3e7d8094a4fa261389fc0f5

      SHA512

      603a9374edd90ed327a32c3bb25ed8dbe2884ffc282217ac3f247ef07958d80e448d27b8ec3f6889917fe7fdbbf6c7e56df87400814918a663dca2ecac88370f

    • C:\Users\Admin\Birdsmade\svnhost.exe
      Filesize

      5.6MB

      MD5

      9eaf8a765669acdc1bf3501006b801e0

      SHA1

      f582a4e8c29856650e99bbdd62dd985ea5827e08

      SHA256

      4c65d5cae34c6e912d65b0de98caa8eb8315dbc7d3e7d8094a4fa261389fc0f5

      SHA512

      603a9374edd90ed327a32c3bb25ed8dbe2884ffc282217ac3f247ef07958d80e448d27b8ec3f6889917fe7fdbbf6c7e56df87400814918a663dca2ecac88370f

    • C:\Users\Admin\Birdsmade\vp8decoder.dll
      Filesize

      403KB

      MD5

      6b04788094ecd05d610dbc0367fe49da

      SHA1

      23272fd3c0b4a808e94665e0e1b32dcdef31aa58

      SHA256

      efcb21b1caa11c8f876238beda8411b9acf4baf8a9acf946a679e120b75ad2d5

      SHA512

      e44bd76322df4c8cbd3a1633abe52f09732cbe1a83e80be5db7eb6b983b3898730451298df417788cda4392dfab83be3b7065e52fb43217fc5e5f719f5a3f68e

    • C:\Users\Admin\Birdsmade\vp8encoder.dll
      Filesize

      685KB

      MD5

      b5b4a8455605319035a6392015df9edd

      SHA1

      702b4f6cee4b4708b9a55d561fac45738b058484

      SHA256

      27e0311c8b709899a31f4f16f79e6dfa2e0a6922e8f3dad56d1ade26432d443b

      SHA512

      8a4d84c82c506fb06efde4d6d7c304a518d385c3371284b1fdbcda7a9945301ec970aad06e0d541a79c9843a2c73a31de7571580351a375b91538ec34179c666

    • memory/1452-145-0x0000000000000000-mapping.dmp
    • memory/2328-132-0x0000000000000000-mapping.dmp
    • memory/3388-137-0x0000000000000000-mapping.dmp
    • memory/3688-134-0x0000000000000000-mapping.dmp
    • memory/3788-136-0x0000000000000000-mapping.dmp
    • memory/3956-182-0x0000000000000000-mapping.dmp
    • memory/4732-135-0x0000000000000000-mapping.dmp
    • memory/5048-144-0x0000000000000000-mapping.dmp