Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
06-09-2023 10:54
Static task
static1
General
-
Target
rutserv.exe
-
Size
8.9MB
-
MD5
adeefeeb4a80337e7bb1dcdb423b39ba
-
SHA1
ac9e1f3e656d1ddcdffc60b5c1fe86391a3ada2d
-
SHA256
d3e91dbdf26856b6bc5e885e75b093960a06c046d63807b693acb23aa4cdeb51
-
SHA512
dc2e45440f84537ce80094e532a8656fd7ecdc14ba96136f07a6c17f538deb6a81046150c6314a0f1130b784cb8867bc1232a935cef285e36d1603289f8b6515
-
SSDEEP
98304:5jwp9/qlkxz5HqVnebAG8Nb7sqQC4/G/10DB+CcDcBpxtCXXl4Xs8tD5wkG3vhOl:5A/UkqJyDfBp7XyBvAcb7M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rutserv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3229154902-1540650024-2860248029-1000\Control Panel\International\Geo\Nation rutserv.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
rutserv.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rutserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" rutserv.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
rutserv.exerutserv.exepid Process 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rutserv.exerutserv.exedescription pid Process Token: SeDebugPrivilege 5108 rutserv.exe Token: SeTakeOwnershipPrivilege 3332 rutserv.exe Token: SeTcbPrivilege 3332 rutserv.exe Token: SeTcbPrivilege 3332 rutserv.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
rutserv.exerutserv.exepid Process 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 5108 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe 3332 rutserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rutserv.exe"C:\Users\Admin\AppData\Local\Temp\rutserv.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\rutserv.exeC:\Users\Admin\AppData\Local\Temp\rutserv.exe -second2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3332
-