Resubmissions
10-03-2023 22:01
230310-1xerdshc7x 714-02-2023 16:10
230214-tmg1faee72 731-01-2023 07:47
230131-jmw49afe54 1026-12-2022 21:03
221226-zv36jaha4x 1024-12-2022 19:27
221224-x6gessdf7z 1013-12-2022 03:51
221213-eenexsgc4v 1012-12-2022 11:33
221212-npbnjsbc28 1006-12-2022 06:29
221206-g8658sca54 805-12-2022 06:17
221205-g19ldsgh7x 10Analysis
-
max time kernel
110s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 21:03
Static task
static1
Behavioral task
behavioral1
Sample
RustExternal_nls.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RustExternal_nls.exe
Resource
win10v2004-20220812-en
General
-
Target
RustExternal_nls.exe
-
Size
658KB
-
MD5
1ab8dbca5e2bba39723f00907d266de7
-
SHA1
729cb808637568f20ac886b3fac5f3cf5ff01dee
-
SHA256
c6dda31fa6cb4ce140f62c9ce604672fa4a9ba5d1792f2d77f3cfcb43b3227ac
-
SHA512
d1a31848eb9b683793afd36031ef8078ff962c2526272782cf2fca8db11afb71643a46b9ad6bce3ba8dba1b638672205726f6e96c7dd3e887228a2368ec08081
-
SSDEEP
12288:3oSO5i2eVUIvybKcEz4MM7S9HdKINesX7j6p9PI8GS0oN2:3ouTVUIvtH4H7aLeO23gRoY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 960 DEFENDERFILESECURITY.EXE -
resource yara_rule behavioral1/files/0x00140000000054ab-72.dat upx behavioral1/files/0x00140000000054ab-73.dat upx behavioral1/files/0x00140000000054ab-77.dat upx behavioral1/files/0x00140000000054ab-81.dat upx behavioral1/files/0x00140000000054ab-82.dat upx behavioral1/files/0x00140000000054ab-83.dat upx behavioral1/memory/960-84-0x000000013FB50000-0x000000013FCAF000-memory.dmp upx behavioral1/files/0x00140000000054ab-85.dat upx -
Loads dropped DLL 6 IoCs
pid Process 844 RegAsm.exe 844 RegAsm.exe 1808 WerFault.exe 1808 WerFault.exe 1808 WerFault.exe 1808 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 844 2000 RustExternal_nls.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1808 960 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 2000 wrote to memory of 844 2000 RustExternal_nls.exe 28 PID 844 wrote to memory of 960 844 RegAsm.exe 29 PID 844 wrote to memory of 960 844 RegAsm.exe 29 PID 844 wrote to memory of 960 844 RegAsm.exe 29 PID 844 wrote to memory of 960 844 RegAsm.exe 29 PID 960 wrote to memory of 1808 960 DEFENDERFILESECURITY.EXE 30 PID 960 wrote to memory of 1808 960 DEFENDERFILESECURITY.EXE 30 PID 960 wrote to memory of 1808 960 DEFENDERFILESECURITY.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 960 -s 2804⤵
- Loads dropped DLL
- Program crash
PID:1808
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
Filesize
532KB
MD584e6aa267c6970d2d777d60840390102
SHA1c97e555e98c5bec69bcad9607cf0153ff827a141
SHA25669f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
SHA51247184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc