Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
8a05f342354841e0e0f699b15c2a3949.exe
Resource
win7-20231215-en
General
-
Target
8a05f342354841e0e0f699b15c2a3949.exe
-
Size
4.2MB
-
MD5
8a05f342354841e0e0f699b15c2a3949
-
SHA1
b20b1467a17b368aa93de9fb601e63ac6c7ba413
-
SHA256
da5e60ddad443e7c052a8b4db78daa05c3d80efe3935be53a2382a628c429dff
-
SHA512
c98e71875c5bf74b558920444c7494976456a61375cc8be5a4899a22cd4779144d004795c31da7dfc010848a11a513c85eb0a89a7d4ab3dcf914573530865efa
-
SSDEEP
98304:rWvqjk4t2Odw/rcYUkpUNHfHkwI4Bb+rhZBDm3fAZvjGFGX831:KckUtdw/4YvUN/BrBbyhjm3aKGMF
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000600000002320e-74.dat acprotect behavioral2/files/0x000600000002320d-73.dat acprotect -
resource yara_rule behavioral2/files/0x000600000002320c-39.dat aspack_v212_v242 behavioral2/files/0x000600000002320c-49.dat aspack_v212_v242 behavioral2/files/0x000600000002320c-57.dat aspack_v212_v242 behavioral2/files/0x000600000002320c-65.dat aspack_v212_v242 behavioral2/files/0x000700000002320b-75.dat aspack_v212_v242 behavioral2/files/0x000700000002320b-77.dat aspack_v212_v242 behavioral2/files/0x000700000002320b-76.dat aspack_v212_v242 behavioral2/files/0x000700000002320b-95.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 8a05f342354841e0e0f699b15c2a3949.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 123.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation Новая папка.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 9 IoCs
pid Process 4620 123.exe 4268 Новая папка.exe 3768 rutserv.exe 4716 rutserv.exe 4680 rutserv.exe 828 rutserv.exe 4656 rfusclient.exe 2980 rfusclient.exe 3672 rfusclient.exe -
resource yara_rule behavioral2/files/0x000600000002320e-74.dat upx behavioral2/files/0x000600000002320d-73.dat upx -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Windows\vp8decoder.dll Новая папка.exe File created C:\Program Files\Windows\vp8encoder.dll Новая папка.exe File opened for modification C:\Program Files\Windows\vp8encoder.dll Новая папка.exe File opened for modification C:\Program Files\Windows\install.bat Новая папка.exe File opened for modification C:\Program Files\Windows\install.vbs Новая папка.exe File opened for modification C:\Program Files\Windows\regedit.reg Новая папка.exe File opened for modification C:\Program Files\Windows\rfusclient.exe Новая папка.exe File created C:\Program Files\Windows\vp8decoder.dll Новая папка.exe File opened for modification C:\Program Files\Windows Новая папка.exe File opened for modification C:\Program Files\Windows\rutserv.exe Новая папка.exe File created C:\Program Files\Windows\install.bat Новая папка.exe File created C:\Program Files\Windows\install.vbs Новая папка.exe File created C:\Program Files\Windows\__tmp_rar_sfx_access_check_240599375 Новая папка.exe File created C:\Program Files\Windows\rfusclient.exe Новая папка.exe File created C:\Program Files\Windows\rutserv.exe Новая папка.exe File created C:\Program Files\Windows\regedit.reg Новая папка.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4112 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 1012 taskkill.exe 1748 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings Новая папка.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4532 regedit.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3768 rutserv.exe 3768 rutserv.exe 3768 rutserv.exe 3768 rutserv.exe 3768 rutserv.exe 3768 rutserv.exe 4716 rutserv.exe 4716 rutserv.exe 4680 rutserv.exe 4680 rutserv.exe 828 rutserv.exe 828 rutserv.exe 828 rutserv.exe 828 rutserv.exe 828 rutserv.exe 828 rutserv.exe 2980 rfusclient.exe 2980 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 3672 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 1748 taskkill.exe Token: SeDebugPrivilege 3768 rutserv.exe Token: SeDebugPrivilege 4680 rutserv.exe Token: SeTakeOwnershipPrivilege 828 rutserv.exe Token: SeTcbPrivilege 828 rutserv.exe Token: SeTcbPrivilege 828 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3768 rutserv.exe 4716 rutserv.exe 4680 rutserv.exe 828 rutserv.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2984 4812 8a05f342354841e0e0f699b15c2a3949.exe 90 PID 4812 wrote to memory of 2984 4812 8a05f342354841e0e0f699b15c2a3949.exe 90 PID 4812 wrote to memory of 2984 4812 8a05f342354841e0e0f699b15c2a3949.exe 90 PID 2984 wrote to memory of 4620 2984 cmd.exe 94 PID 2984 wrote to memory of 4620 2984 cmd.exe 94 PID 2984 wrote to memory of 4620 2984 cmd.exe 94 PID 4620 wrote to memory of 4268 4620 123.exe 95 PID 4620 wrote to memory of 4268 4620 123.exe 95 PID 4620 wrote to memory of 4268 4620 123.exe 95 PID 4268 wrote to memory of 1632 4268 Новая папка.exe 96 PID 4268 wrote to memory of 1632 4268 Новая папка.exe 96 PID 4268 wrote to memory of 1632 4268 Новая папка.exe 96 PID 1632 wrote to memory of 2076 1632 WScript.exe 98 PID 1632 wrote to memory of 2076 1632 WScript.exe 98 PID 1632 wrote to memory of 2076 1632 WScript.exe 98 PID 2076 wrote to memory of 1012 2076 cmd.exe 99 PID 2076 wrote to memory of 1012 2076 cmd.exe 99 PID 2076 wrote to memory of 1012 2076 cmd.exe 99 PID 2076 wrote to memory of 1748 2076 cmd.exe 101 PID 2076 wrote to memory of 1748 2076 cmd.exe 101 PID 2076 wrote to memory of 1748 2076 cmd.exe 101 PID 2076 wrote to memory of 1880 2076 cmd.exe 102 PID 2076 wrote to memory of 1880 2076 cmd.exe 102 PID 2076 wrote to memory of 1880 2076 cmd.exe 102 PID 2076 wrote to memory of 4532 2076 cmd.exe 103 PID 2076 wrote to memory of 4532 2076 cmd.exe 103 PID 2076 wrote to memory of 4532 2076 cmd.exe 103 PID 2076 wrote to memory of 4112 2076 cmd.exe 104 PID 2076 wrote to memory of 4112 2076 cmd.exe 104 PID 2076 wrote to memory of 4112 2076 cmd.exe 104 PID 2076 wrote to memory of 3768 2076 cmd.exe 107 PID 2076 wrote to memory of 3768 2076 cmd.exe 107 PID 2076 wrote to memory of 3768 2076 cmd.exe 107 PID 2076 wrote to memory of 4716 2076 cmd.exe 108 PID 2076 wrote to memory of 4716 2076 cmd.exe 108 PID 2076 wrote to memory of 4716 2076 cmd.exe 108 PID 2076 wrote to memory of 4680 2076 cmd.exe 109 PID 2076 wrote to memory of 4680 2076 cmd.exe 109 PID 2076 wrote to memory of 4680 2076 cmd.exe 109 PID 828 wrote to memory of 4656 828 rutserv.exe 111 PID 828 wrote to memory of 4656 828 rutserv.exe 111 PID 828 wrote to memory of 4656 828 rutserv.exe 111 PID 828 wrote to memory of 2980 828 rutserv.exe 112 PID 828 wrote to memory of 2980 828 rutserv.exe 112 PID 828 wrote to memory of 2980 828 rutserv.exe 112 PID 2980 wrote to memory of 3672 2980 rfusclient.exe 113 PID 2980 wrote to memory of 3672 2980 rfusclient.exe 113 PID 2980 wrote to memory of 3672 2980 rfusclient.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a05f342354841e0e0f699b15c2a3949.exe"C:\Users\Admin\AppData\Local\Temp\8a05f342354841e0e0f699b15c2a3949.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\123.exe123.exe -p1234 -dC:\Users\Admin\AppData\Local\Temp3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Новая папка.exe"C:\Users\Admin\AppData\Local\Temp\Новая папка.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\Windows\install.vbs"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Windows\install.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:1880
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:4532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:4112
-
-
C:\Program Files\Windows\rutserv.exerutserv.exe /silentinstall7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3768
-
-
C:\Program Files\Windows\rutserv.exerutserv.exe /firewall7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4716
-
-
C:\Program Files\Windows\rutserv.exerutserv.exe /start7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4680
-
-
-
-
-
-
-
C:\Program Files\Windows\rutserv.exe"C:\Program Files\Windows\rutserv.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files\Windows\rfusclient.exe"C:\Program Files\Windows\rfusclient.exe" /tray2⤵
- Executes dropped EXE
PID:4656
-
-
C:\Program Files\Windows\rfusclient.exe"C:\Program Files\Windows\rfusclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Windows\rfusclient.exe"C:\Program Files\Windows\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:3672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290B
MD59dc2286281a11ee72985dd2041a58ee3
SHA1de55198aa0f697ed77e98e3e61deb4cb70ba3b03
SHA25667f0f1704add831bd00a4977a185a2c97198cc4b3299233f62c3a0820716268a
SHA512ce4443ec8482cdce28bae0169b0d7df688190a596b914df0bbf62ae2598312c9bfc703ffd2d9b6c548e170bf4cb60cef9d4f9494b0e6391cd8cf6d45affa05f6
-
Filesize
117B
MD565fc32766a238ff3e95984e325357dbb
SHA13ac16a2648410be8aa75f3e2817fbf69bb0e8922
SHA256a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420
SHA512621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608
-
Filesize
11KB
MD50fbccea003f08e7195040bc1070b2b54
SHA133b53a13d6d9aed1938e643bc7a2f49c63182b83
SHA256245899c8fa1f54d56d8446a3d4a40299113af9eeff5734091a7ee26298dc9a94
SHA512d25f9c172ff489e4090b529ff50f9a7567b44eb86932e388278154f5f9410803aca7d2c1197377697534d031980bfedd1a001a8ee5b6dda3fe9248735656b1bd
-
Filesize
46KB
MD5ba546b98c3b5198839c5f497615ad085
SHA1055ffd2291e6cf0f9d2351e4695e4e24beb29a54
SHA25677ac8f80bc3b4f5a0727692c412ed68eba1d569a6021e81e5dc49cb5c06450a6
SHA5127683fc78b216e22f1644224613204ad9a5554b094fb678dceef3684ec483a7aa19e25df5afa25572fea374930228f72a1b37943250c869833bf0cf76c59fc741
-
Filesize
129KB
MD5be8c9c43a7b260b703be130417727c0e
SHA17f7b0f94b78d6f739da0c70fbddb03b4cdc65062
SHA256eac317d30e87282a2996fc699c6cfa4764f1fa3fc3bc9acf2e4ec0343e3eba6f
SHA512c715acb3a6fc0c058d79e509b27a0bdd621268740ac4bef26c077df0377598262701e2c8c34b1133ec63c52a124833e133355a544649e470482a1709f3e2ceaf
-
Filesize
85KB
MD54addfbe6dfaebdc90bec46334821e1d4
SHA12c3f5f7611ec06bcd7f69e53e78ac4ca994a4e65
SHA2565920c9581e1238fc1a7dba76d8b9768c465b78c54e477c6a9931d4d4ddebeabc
SHA5127675eca2b7281e122df228cf7be7144741fd4066289560ab376203a3b1e69a4b824fbed76dd24d304005a314a058ba514fc68c9469041cdbb0c7146683c1993b
-
Filesize
57KB
MD55655a58779081750116714ab9d112934
SHA1af1e669f994f165f5dbc436cbd7058fef47a47f9
SHA256028e13031bb8ccda17c8d4a4d37ca02b1e785376163ee736a94bb9f753248582
SHA512f7ce5ba8b636cba1f0dff5363974215deb687250deac58a3c996519544e40a288c2cdbf4d359180da79e854886fe8848fae74213cdf8d35770b40aded2218436
-
Filesize
1.7MB
MD537a8802017a212bb7f5255abc7857969
SHA1cb10c0d343c54538d12db8ed664d0a1fa35b6109
SHA2561699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6
SHA5124e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0
-
Filesize
840KB
MD561703f4b0dfcb3b995514315e47881fc
SHA137a83e8fd3896f3971d0102021874fa55df3605b
SHA256a666114f5174911737879a7e3c958b8b773cd55a171392a33bc4a85a49e0b542
SHA51283c51b3b0f5cb9df077840f45b126a18dfc52ddf84a4e6ec2ac839a572bc77390c784de039a68eb46cee50f1f129e277545a2abf5a3f9c06d9d35837b99e4f19
-
Filesize
488KB
MD50956a25651f63b8cf4c5d6627e04a108
SHA11b22b11e3e6c29db1900143fb78ed92a35a1cf8a
SHA2565e7aec7c53ec15e1df62dde406b4f81bd6e7deb809a8b37aa6bdfb89a9f3a8a7
SHA5121da8dc0420f94644c1cfada6b57bac9ecaef0748d3935c0f67598656c4f94948d9b6c125465aca8c2c2b20f87c8f351ba433019818c2b6efb8255f02324f120f
-
Filesize
188KB
MD52fa6767333bcbeae723c89e4d9ab8395
SHA124d9a3f087dd952c26c2e497fb4a5e5fe5185dc5
SHA256d3e1897c80036ce7ed7e40925634b634883e76e24a73d7c3563b70e71d068291
SHA512dc4062724afa155f9e169943f4b2daa8a8b72afd2f16ba1b167c2df7bd230787ba8de85d0f36115106993a40149cc6bd2b473716c3a6605d90768e171579d2ae
-
Filesize
155KB
MD588318158527985702f61d169434a4940
SHA13cc751ba256b5727eb0713aad6f554ff1e7bca57
SHA2564c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74
SHA5125d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff
-
Filesize
224KB
MD52d7f20757339833599344a2fcc1fdb59
SHA1c908042820c69af6e5daa64b502082c46785483f
SHA25600aa3ec22f65212e920d8fa9c2bb1f2ac79d0a603f6b0db94acf08aa815f148e
SHA512c5c3703dfea04eedc0d83fc4b84f41558d11f4b99c10b52e997358f4fe2780bd2515bdb78c389a14570137a3ac02a06343f25f28543fb2cd55738686ed323cc3
-
Filesize
23B
MD5c2f47681be70d25c47c467cd1ff554c0
SHA10b3e508f9bfc9f8d371667bf4adfef32bfa5e7c0
SHA2563701824d2aebfc1a891ef96660477ea8e6877f3c5ce66443d1fb0b6a968a63a0
SHA5128e87d5c86a0d3f8b86655c351fe0ce4e1877b56b8ba35755394f8ccc9578ec0ec016736e6854810d4ec0a5dbd4a2f2aeabd504f4c4ee6168d4d0b9c7455e924f
-
Filesize
2.2MB
MD516d2de94fc76683864811e9099c9c1e3
SHA16dbbdd0275a5d803c83a626302c12171408f2c5e
SHA256370ac113382399f98da69a41ea23491281fd275786de9728c68e4fbaad093c59
SHA512826d265f477ab8a17aaea1622f616ab7f0d28fd02da0f0d771aa91d46c999b21ff5d1da637cca3bec703707dc51399ed5809eb22657ab986fb8a1d0e9ad9304f
-
Filesize
2.0MB
MD51c88d3f746e4367fd8b292734e84eecd
SHA1738a365f9fcd0f4095372fd28a171836e306d02c
SHA2564a6ad0204a5f5ef1f66fce3bca7668e0617f45aa67613db9e7dede906ce9b5f1
SHA512bfa1de688347980a341b118ea1f808ac68020de333710ec18c667db9292761f67254c55f456181669b76a45fcbdbc36be2d7bbb47422058289e43af023e14c20
-
Filesize
1.2MB
MD5bab9d3e42a9ac0216afb01c35f178183
SHA14f67bcab8cb269dc1cca3c7f5fe31b7afac0d690
SHA2565e44448cccdbc1c79949535a4700c55b897a2950eed6b4cac5eb78e69485361f
SHA5129f729cc823437b2eb18aa772428aa3848f8b36161169a53c1fb40e18c58e690fd5081e79f9bcf8397dce5c4ddaeaad25d68e7599bd4e149c78b7c238025132c5
-
Filesize
554KB
MD5345560440c28535946763120a855ac13
SHA1f176c974e48d25456d491320198e50a20f6849b5
SHA256aea15f6526ec7581267f4cc05ddd2afdda79c5bdbd895f9ac881a654e53c9748
SHA51206f3ff0ddff5ca84dff012049738e6346dd37ba8628ddd1e45967dc6f31fa1d85bbbfe7ef3bd1ef03267465c37c8d06e982db4bd59dc5c143bb6dfe7a506f59a
-
Filesize
624KB
MD583955879b4f9bab57cd9840fb6db98c9
SHA1f83b0374bb7c2bcb65bc144fc6ceb85e3595689d
SHA2567790efb966f98b69a69b0d98abb8e89c5db785854ba0a5f46fcfa4cb0bc99d35
SHA51243075531f01aaeb53aa3641184a9d779c71feba5291b63921418efc4a3bb7de555c53f84cdbee93403a061b1a45dc2b8f8fdaaec2e81c546d0fc0bf46846ae06