Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2023 13:03

General

  • Target

    reg1.reg

  • Size

    12KB

  • MD5

    4dc0fba4595ad8fe1f010f9079f59dd3

  • SHA1

    b3a54e99afc124c64978d48afca2544d75e69da5

  • SHA256

    b2fd919e2acd61601c3341179a20ce1d0c2074e8907692dc83d55ba6c6b3eb3a

  • SHA512

    fb0855ad6a33a3efc44453f2a5624e0fc87818bf10d13a87d168be3e9c69b7c8dffb39a34193ab134f42b0af527566e74bada71742c09f90ffd60334ba5143b8

  • SSDEEP

    192:PX7frQHvJDzF/aQBeDUnQbwCUuq+36X69XOwBmimxNl7RO8HZHkhdxNw+oc0:PrfrYh9iynQbwCUnKdmimxNXN5Ehdxh0

Score
10/10

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Windows security bypass 2 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs

Processes

  • C:\Windows\regedit.exe
    regedit.exe "C:\Users\Admin\AppData\Local\Temp\reg1.reg"
    1⤵
    • Windows security bypass
    • Runs .reg file with regedit
    PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-0-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB