Resubmissions
10-03-2023 22:01
230310-1xerdshc7x 714-02-2023 16:10
230214-tmg1faee72 731-01-2023 07:47
230131-jmw49afe54 1026-12-2022 21:03
221226-zv36jaha4x 1024-12-2022 19:27
221224-x6gessdf7z 1013-12-2022 03:51
221213-eenexsgc4v 1012-12-2022 11:33
221212-npbnjsbc28 1006-12-2022 06:29
221206-g8658sca54 805-12-2022 06:17
221205-g19ldsgh7x 10Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
RustExternal_nls.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RustExternal_nls.exe
Resource
win10v2004-20220812-en
General
-
Target
RustExternal_nls.exe
-
Size
658KB
-
MD5
1ab8dbca5e2bba39723f00907d266de7
-
SHA1
729cb808637568f20ac886b3fac5f3cf5ff01dee
-
SHA256
c6dda31fa6cb4ce140f62c9ce604672fa4a9ba5d1792f2d77f3cfcb43b3227ac
-
SHA512
d1a31848eb9b683793afd36031ef8078ff962c2526272782cf2fca8db11afb71643a46b9ad6bce3ba8dba1b638672205726f6e96c7dd3e887228a2368ec08081
-
SSDEEP
12288:3oSO5i2eVUIvybKcEz4MM7S9HdKINesX7j6p9PI8GS0oN2:3ouTVUIvtH4H7aLeO23gRoY
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1716 DEFENDERFILESECURITY.EXE 1868 0.exe -
resource yara_rule behavioral2/files/0x0006000000022e11-142.dat upx behavioral2/files/0x0006000000022e11-141.dat upx behavioral2/memory/1716-144-0x00007FF758220000-0x00007FF75837F000-memory.dmp upx behavioral2/memory/1716-146-0x00007FF758220000-0x00007FF75837F000-memory.dmp upx behavioral2/files/0x0006000000022e15-148.dat upx behavioral2/files/0x0006000000022e15-149.dat upx behavioral2/memory/1868-150-0x00007FF7CB820000-0x00007FF7CB983000-memory.dmp upx behavioral2/memory/1868-151-0x00007FF7CB820000-0x00007FF7CB983000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 1016 1308 RustExternal_nls.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 208 1868 WerFault.exe 88 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings RegAsm.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 RustExternal_nls.exe 1308 RustExternal_nls.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 RustExternal_nls.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 OpenWith.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1308 wrote to memory of 524 1308 RustExternal_nls.exe 80 PID 1308 wrote to memory of 524 1308 RustExternal_nls.exe 80 PID 1308 wrote to memory of 524 1308 RustExternal_nls.exe 80 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1308 wrote to memory of 1016 1308 RustExternal_nls.exe 81 PID 1016 wrote to memory of 1716 1016 RegAsm.exe 82 PID 1016 wrote to memory of 1716 1016 RegAsm.exe 82 PID 1716 wrote to memory of 4840 1716 DEFENDERFILESECURITY.EXE 86 PID 1716 wrote to memory of 4840 1716 DEFENDERFILESECURITY.EXE 86 PID 4840 wrote to memory of 1868 4840 cmd.exe 88 PID 4840 wrote to memory of 1868 4840 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵PID:524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe5⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1868 -s 4406⤵
- Program crash
PID:208
-
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4212
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1868 -ip 18681⤵PID:4084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537KB
MD52ce459cbd15f96b92c6b411b9eaeb24c
SHA1d4ef5e179d1e4510141537bd59dca1d6fdb83a6a
SHA256bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31
SHA512f5385c52c7945cfb2196edbda6aebd7007d383fc837712585c501387704709f9882f36559736b0804455a5c9eb09015d4f6e88135339c340c643554b0d4cb53c
-
Filesize
537KB
MD52ce459cbd15f96b92c6b411b9eaeb24c
SHA1d4ef5e179d1e4510141537bd59dca1d6fdb83a6a
SHA256bb57c20116377a50473e83604488f1935311dbf93a419cdeb41cf051ffd22b31
SHA512f5385c52c7945cfb2196edbda6aebd7007d383fc837712585c501387704709f9882f36559736b0804455a5c9eb09015d4f6e88135339c340c643554b0d4cb53c
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc