Resubmissions
10-03-2023 22:01
230310-1xerdshc7x 714-02-2023 16:10
230214-tmg1faee72 731-01-2023 07:47
230131-jmw49afe54 1026-12-2022 21:03
221226-zv36jaha4x 1024-12-2022 19:27
221224-x6gessdf7z 1013-12-2022 03:51
221213-eenexsgc4v 1012-12-2022 11:33
221212-npbnjsbc28 1006-12-2022 06:29
221206-g8658sca54 805-12-2022 06:17
221205-g19ldsgh7x 10Analysis
-
max time kernel
35s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13-12-2022 03:51
Static task
static1
Behavioral task
behavioral1
Sample
RustExternal_nls.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RustExternal_nls.exe
Resource
win10v2004-20221111-en
General
-
Target
RustExternal_nls.exe
-
Size
658KB
-
MD5
1ab8dbca5e2bba39723f00907d266de7
-
SHA1
729cb808637568f20ac886b3fac5f3cf5ff01dee
-
SHA256
c6dda31fa6cb4ce140f62c9ce604672fa4a9ba5d1792f2d77f3cfcb43b3227ac
-
SHA512
d1a31848eb9b683793afd36031ef8078ff962c2526272782cf2fca8db11afb71643a46b9ad6bce3ba8dba1b638672205726f6e96c7dd3e887228a2368ec08081
-
SSDEEP
12288:3oSO5i2eVUIvybKcEz4MM7S9HdKINesX7j6p9PI8GS0oN2:3ouTVUIvtH4H7aLeO23gRoY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 268 DEFENDERFILESECURITY.EXE -
resource yara_rule behavioral1/files/0x000800000001483c-72.dat upx behavioral1/files/0x000800000001483c-73.dat upx behavioral1/files/0x000800000001483c-75.dat upx behavioral1/memory/268-77-0x000000013FE70000-0x000000013FFCF000-memory.dmp upx behavioral1/files/0x000800000001483c-79.dat upx behavioral1/files/0x000800000001483c-80.dat upx behavioral1/files/0x000800000001483c-81.dat upx behavioral1/files/0x000800000001483c-82.dat upx behavioral1/memory/268-83-0x000000013FE70000-0x000000013FFCF000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1968 RegAsm.exe 1968 RegAsm.exe 1872 WerFault.exe 1872 WerFault.exe 1872 WerFault.exe 1872 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 1968 2020 RustExternal_nls.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1872 268 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 2020 wrote to memory of 1968 2020 RustExternal_nls.exe 27 PID 1968 wrote to memory of 268 1968 RegAsm.exe 28 PID 1968 wrote to memory of 268 1968 RegAsm.exe 28 PID 1968 wrote to memory of 268 1968 RegAsm.exe 28 PID 1968 wrote to memory of 268 1968 RegAsm.exe 28 PID 268 wrote to memory of 1872 268 DEFENDERFILESECURITY.EXE 29 PID 268 wrote to memory of 1872 268 DEFENDERFILESECURITY.EXE 29 PID 268 wrote to memory of 1872 268 DEFENDERFILESECURITY.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 268 -s 2804⤵
- Loads dropped DLL
- Program crash
PID:1872
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc