Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 00:09
Static task
static1
Behavioral task
behavioral1
Sample
312f8e61b64ea715d3cc42d685ac6b00.exe
Resource
win7-20231215-en
General
-
Target
312f8e61b64ea715d3cc42d685ac6b00.exe
-
Size
4.6MB
-
MD5
312f8e61b64ea715d3cc42d685ac6b00
-
SHA1
f3ae92ab4cdd0c0ae8d437dd1f5e9e86e11f33af
-
SHA256
32dad51822968a22b1a6be1150b9a60dedc106c2ee4d5c866a654972ea892d7f
-
SHA512
24140a815ea5bdda2e180625a1f0628cd26234e0b7bef4f07603c2d1c372308538338905e9b0a098296084a27150a6263da9e7644b5df83208075167b46abf3d
-
SSDEEP
98304:ilUZl606hI/0j1K+i5dkSKkADNpDn7l/qgNOCR+dp5B8sDCW:dl60XokxnkSK1pdN7+dXGsDB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral1/files/0x00060000000148b8-99.dat acprotect behavioral1/files/0x0006000000014852-98.dat acprotect -
Processes:
resource yara_rule behavioral1/files/0x0009000000014249-101.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
Processes:
test.sfx.exetest.exepid Process 2788 test.sfx.exe 1764 test.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exetest.sfx.exepid Process 2620 cmd.exe 2788 test.sfx.exe 2788 test.sfx.exe 2788 test.sfx.exe -
Processes:
resource yara_rule behavioral1/files/0x00060000000148b8-99.dat upx behavioral1/files/0x0006000000014852-98.dat upx -
Drops file in Program Files directory 21 IoCs
Processes:
312f8e61b64ea715d3cc42d685ac6b00.exetest.exedescription ioc Process File created C:\Program Files (x86)\System\__tmp_rar_sfx_access_check_259393938 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System\rutserv.exe test.exe File created C:\Program Files (x86)\System\1.bat 312f8e61b64ea715d3cc42d685ac6b00.exe File created C:\Program Files (x86)\System\test.sfx.exe 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System\test.sfx.exe 312f8e61b64ea715d3cc42d685ac6b00.exe File created C:\Program Files (x86)\System\rfusclient.exe test.exe File opened for modification C:\Program Files (x86)\System\vp8encoder.dll test.exe File created C:\Program Files (x86)\System\install.vbs test.exe File opened for modification C:\Program Files (x86)\System\install.vbs test.exe File created C:\Program Files (x86)\System\install.bat test.exe File opened for modification C:\Program Files (x86)\System\rfusclient.exe test.exe File created C:\Program Files (x86)\System\vp8decoder.dll test.exe File opened for modification C:\Program Files (x86)\System\vp8decoder.dll test.exe File created C:\Program Files (x86)\System\regedit.reg test.exe File opened for modification C:\Program Files (x86)\System\regedit.reg test.exe File opened for modification C:\Program Files (x86)\System 312f8e61b64ea715d3cc42d685ac6b00.exe File opened for modification C:\Program Files (x86)\System\1.bat 312f8e61b64ea715d3cc42d685ac6b00.exe File created C:\Program Files (x86)\System\__tmp_rar_sfx_access_check_259394328 test.exe File opened for modification C:\Program Files (x86)\System\install.bat test.exe File created C:\Program Files (x86)\System\rutserv.exe test.exe File created C:\Program Files (x86)\System\vp8encoder.dll test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1400 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 1008 taskkill.exe 2508 taskkill.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid Process 1676 regedit.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
312f8e61b64ea715d3cc42d685ac6b00.execmd.exetest.sfx.exedescription pid Process procid_target PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2520 wrote to memory of 2620 2520 312f8e61b64ea715d3cc42d685ac6b00.exe 28 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2620 wrote to memory of 2788 2620 cmd.exe 30 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31 PID 2788 wrote to memory of 1764 2788 test.sfx.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\312f8e61b64ea715d3cc42d685ac6b00.exe"C:\Users\Admin\AppData\Local\Temp\312f8e61b64ea715d3cc42d685ac6b00.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\System\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\System\test.sfx.exetest.sfx.exe -p123 -dC:\Program Files (x86)\System3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program\test.exe"C:\Program\test.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1764 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\System\install.vbs"5⤵PID:1488
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\System\install.bat" "6⤵PID:332
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe7⤵
- Kills process with taskkill
PID:1008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe7⤵
- Kills process with taskkill
PID:2508
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f7⤵PID:1776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 27⤵
- Delays execution with timeout.exe
PID:1400
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"7⤵
- Runs .reg file with regedit
PID:1676
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /silentinstall7⤵PID:1388
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /start7⤵PID:1928
-
-
C:\Program Files (x86)\System\rutserv.exerutserv.exe /firewall7⤵PID:916
-
-
-
-
-
-
-
C:\Program Files (x86)\System\rutserv.exe"C:\Program Files (x86)\System\rutserv.exe"1⤵PID:3064
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe"2⤵PID:3000
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray3⤵PID:2908
-
-
-
C:\Program Files (x86)\System\rfusclient.exe"C:\Program Files (x86)\System\rfusclient.exe" /tray2⤵PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5d8358028bdac35e2ffadaf5a72555024
SHA1f0bc2b6e0053fe721b690bffe93a04b549078267
SHA2568baf37cca76efbc4630116888bc69f3dda6f6246c726de8b3a1fa3dfe3b5f5ad
SHA512dd4fde1890ecc0fce974c62f03ed1ed64c68a943fdce17bf2453ae8f465089df8b9991bcb8866a8fbd8babf411ba0e34122321dc8c5b0952a3cfbcca5aa63aab
-
Filesize
290B
MD59dc2286281a11ee72985dd2041a58ee3
SHA1de55198aa0f697ed77e98e3e61deb4cb70ba3b03
SHA25667f0f1704add831bd00a4977a185a2c97198cc4b3299233f62c3a0820716268a
SHA512ce4443ec8482cdce28bae0169b0d7df688190a596b914df0bbf62ae2598312c9bfc703ffd2d9b6c548e170bf4cb60cef9d4f9494b0e6391cd8cf6d45affa05f6
-
Filesize
117B
MD565fc32766a238ff3e95984e325357dbb
SHA13ac16a2648410be8aa75f3e2817fbf69bb0e8922
SHA256a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420
SHA512621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608
-
Filesize
11KB
MD57f1faef6025d6a7521ef5db7af41fcf4
SHA10aa9a15c4e39fa9ec65beaea09c74db19bd8a4d2
SHA256b9e125a892681078c3795a4bcd16f0f7e14037f7084bf5fa9e6d30ca380f6fcb
SHA5129f373b7027fcd20dfea904d46a5e4b73bf54e46e561555bbf1bf1b196bf590e6982855af8a42468d2056236982290d9fee4ea5d47f12be42b7ee402e2ed6a47a
-
Filesize
1KB
MD517cd007fddb4873198905b163c463655
SHA1767eb90538ae5d7b131a62773f606c869ec2b7b8
SHA25636118d58c583d587b21c7f7db1a1dbd73163921e5222f388312cb6ddde059c34
SHA512999cd5ea1fdb2b16546e70e88d90a40c1fd4e12ae81ba37bae6a3b2e81482f8e89bb37e2b87c5e235bc1e7bd39d584ce99ff08e0824dc50c4631095e8cc1c9df
-
Filesize
3KB
MD5017b89fa6ee8e1fbe4c5e9e381d7681c
SHA1e2de513b30e9d98ce4a6c6c7d6394c440cc4b5e8
SHA2566ebac1dfa05f917b7e517e4a4e823f992c4eb7a13461ba5e0b2bdbaa1f8a2f49
SHA512008105b624e2fd610a0db04337461dccc0128b2b68d8be9a6cdf99da0ac5e8b00acfdf2f466674dff19023a346a72ca93ab4e0b2a07a83aa0b9f85ab9ff8eb22
-
Filesize
5KB
MD565c92d297f36209622c04eb89e38ac52
SHA1f764a3320ea2c000beaac505b7a0505129d47c73
SHA256ced0e2e7b31a0b33a6533841031deebfdb8a989eade789a2fde7bba8a83fab9d
SHA5128f34610c3d1aeaaca9cbdb672b746cfef8cd1d861b25ff326face74b5733564cb3c58aa8d579e828bce0d9a6421e7ba1913349a213f86a9c4ea186723460a094
-
Filesize
4KB
MD5610b15dfebb7f5c9c566f552ee520e9e
SHA1cdb09255bb958c5930d8d0daaeb63349e5abdcd0
SHA2566ab3b8df43d4f240d6a7cb7bc8d5368648e351264229f7a60105453c9ce44451
SHA5127ea2b087ae1dbe5d794bd2473b3690cfbb2fb3c0b964cdb2b74f1074355bd72bb0ecc0d2e5660c5e8d2dec111d28282305b5ba7065a9c66983c919c7b14fa3f8
-
Filesize
56KB
MD540d397544245db6c1d904b7ad6b7b5f7
SHA1cabb6123ba479b668acba009e9a30542cedb4472
SHA256f63b3511188a303089eaade2211bac995e51d050f58fb35f9300dcb792c7c6d7
SHA512190ba2f0d89089d9d9db17aaac2d1aede7f775fec25afb40be1738cd14276dd6286953b0af6c2fd4571eba372074f558461c9f4e74206dc4ae5e0dd2c2986f66
-
Filesize
63KB
MD59d32f8303965c9b8018a2a3857dba9fe
SHA13a37e30962b1a9c68f1154257d2d925824200308
SHA2564245472577f4795c6b18c68866e47196aaf912a9f75cccd2f6916a24255e36d1
SHA5127212107c8ad9a25ecc188786d17836b62fb4c678e1ee02d91dafe82ce59768178efe29ef57c5b578cb311c107d6bd9f023a8d60fcff381e853306ffedc8951ac
-
Filesize
99KB
MD575c1eb3912ae1b8dac84ff24bdfb5a5a
SHA168870ac1dd92cd1ff5af8214528daefd763f525d
SHA2565af5ce45c23ec7e08a7881a706d95a8c610f40809b607223e32af341e0c1a9bc
SHA5120b7cc7283c9e8ec9192cc58c2087b743e9c0c50fa7184bce9bdd9886f8311065e5853542fa20ad83f13771f6c85fa3e87b57991d24607233008c0274dd10844b
-
Filesize
15KB
MD5f2404ed1e1a3d95037169b03c5e8c831
SHA1aee29c63a12cfb268abd2cc051f2197949c0f9dc
SHA2560d6cdc4cbee1db34f1f332708c5a20b0c55203a39f56e9b5bd6b1d5f711117d7
SHA512e6932b8b41ade493b1ceecfed88b689f017458d12b6c764634ba920f616a7ade6b1c52da863ff91ea56427248810b8f2e3fe59b4df05b1785046c7beaa51a701
-
Filesize
66KB
MD5976d8160c5d7a102cda45f36c7707fcc
SHA185db1736decef2e2daf81e72b7e51e491de61316
SHA2565cd3e784c61601f44daaf69cb54ecd68f9b9124148afe47ef689692dbf10d9c7
SHA512420fb360c671f5f627456a6ee9670427e27ceb164af446abbb988cb9c3d0f62faf142a7a80c7dcfd6625e1d021ac1f6a0a6f8d62cb5f067588f7a9ad2bf5c0be
-
Filesize
186KB
MD5ce11f934a62674721d26b6187cc4d056
SHA15cd1bc9ba0991f0bcfc7b89f1d1686538dc34e46
SHA256bde91686c105214400adc4ddc0b747526c2c2a035a778e694780ea69030a4966
SHA51274683eaa9c70dfe495b61612fd6b9bc02536b196a41068ef041c219be51de8eed8524b16576d1fc45723a248b0f0b566583ca21f389d6ae48bfb2d494e58f44f
-
Filesize
196KB
MD5f721e3d7d8d861c24c7693b18c36c5ca
SHA13c46106f226af27adb1cf3c843fd6a7fbe47bd15
SHA25636ed135f6a03aaef084b24684bcbb6c92939849b224bcd893be412445cdd00fe
SHA5124c89e8465a98087097248876497c82138f2275a4b7c0826d282c609ee3c5d58df28820928f9e6cc38e1a930c33668aad64bc66f789f9cdcac0efe7dd3109f0cc
-
Filesize
25KB
MD5916f82d78d27fe753dca17ec2948968a
SHA1f4e9ad84ac937a82264d4c63b3748ef1f7efdece
SHA256ff1cf483d3c8ffeec099ac6a65fd45ae32c29b95e60972f11d83634a7a8da7b0
SHA5126099cd7e964682f20c72cea9cb3b3bb36f8fa4bd8ea71f0714a8be4bcc96478a518a66072402628773a817190b6fd6d12fdcabf3ef12bd8e875e9549cf4f9b89
-
Filesize
6KB
MD56e953e198270f22ef91ec25f2ef795fe
SHA17264a133a7fcad73150eab0eabc4bbd9fecbd9fe
SHA2566bd4cc439145747a5689a2da54026a38c910be5d4dd8b933a2e685e2d211a4a4
SHA512fc0d0a90bda9aa0dfd329cc764fdb3d62bf53b003d77ff85a1c6383b10f6ea1ae0ba78c0087eab7b9a975c8ff42da78f512aa714f93075ec91b057bc21e8967f
-
Filesize
133KB
MD59536ce24d4218c28ee024dc31f1ae54e
SHA159cee0dc6d0a908180c771694093a0f6822bdd5f
SHA256cb3cb76b814799de7751d2daac940e8fe4c6f62229dd7db99750232bb9cfcf5d
SHA5126ab8d49ac47abb2b42b33f15196a6fe05ba1fd85a4b29a090bb6df5ffe8fb104bbbbc362eeba9fa9defb1fea055f37a8a698fe402c890e02422bb2d8a859b5d0
-
Filesize
174KB
MD5276851a63184ec9ca544873da761da4c
SHA1fc53726364879772f39d544ab0f9ee7f7680e439
SHA256baa10074256a16cbe46900b522cf9bf425c1f399cfd9bee95b05d782eba09597
SHA5121a52125779bf281d814cde13395477971311eefb98491ef1164530403e050ebb80edc085f7e8ad3d39c227fc328361a6243eb8fe6d5c0cf23d4c4cabdb71e2d7
-
Filesize
164KB
MD5bdec810f3fe35938c47d6e3912455e0e
SHA19ac23a561d0c0edcc227b5a41ee309d0454f7475
SHA2563a5f4e812fdadeed8b8040162f1abaf51c082ff1954e93fe1c8ee1a055217af8
SHA512d1da105c5e0a4fe6f8c4c552b10167aa2c96e9a925c5676b52e8c4bc22da1a2253d01ec58cf5c4e114211e81cd02be84e425789ba49023f236faff47c426b957
-
Filesize
18KB
MD5b0f201af5e9a64ee131225f128cca059
SHA179184b9f37d667b786e2ce86adef4f064fd5a5e1
SHA25629da1ddda4c101ea885ab6b706dfc80ff1ac660bb31d0cb4c5a7a82ed0198b12
SHA51299974c228c1c211578887b0e64db3aea8d87dd422e337f8b4e6f468d4b56b0b1c9b6c32c74c9ffead046e5a875e35f8327a0d0707da061d5a4aac90c840866a1
-
Filesize
17KB
MD5953054465256ee9e6e5200f1a26765c3
SHA110865d4568f270d455d66b892eb6ae8791ddfefb
SHA2562e8a2abc2047289d170807b1206065faf2a0dbfbd2e9ac3a16461724036a541c
SHA5122960fe04b720259eaf55a9d800ecec5a509e10aad0b1f37710d34e1e1221374a6f3fcbe002424c3f3ff2a889170bd956810283793ec85e1852fbcc761f7788b3
-
Filesize
53KB
MD52b5d8e29cdcb8c3cc0415a0956fcaf56
SHA1e60edc25a3a636cb0a855265d7252d23a8182b29
SHA25611f10d88a15ac153ee517ff283fb3bd3a6d7f8859db4bf67924d73377742f6f4
SHA512787239629494873412dc95a9ae53f3691d34b15b525539243fa8b2564ded9a52561540b0698d5b3cdda2ee6d6dd8af7021f3e03330d55f45c7dab5dd2dddcd66
-
Filesize
91KB
MD575177bec822ab1a1e12d3a3537d9f7ab
SHA1a482d1bf3c1757d84d3a0102c4133a3a927f5a6c
SHA256e41ff1ffc1431053fbe3fd1bb02f5367931ff6098ef93e79d865ea20915328c1
SHA512d88ef11b785645395e84594ca8941668224f18d352fe61aae57547153fb6d1b3aa89340047934795c69a0c972baf9ba45182b0fe57871ed704e1b0fd924485da
-
Filesize
110KB
MD5d6b449932b325a3d21ca06349fb84076
SHA1314f1fd030250f500cf6148049f16f76f7c0027d
SHA25695c2e9a3e83b6cf6374b4ec15ba9b13784b478f0f70241975e01cb529d835e91
SHA512e9c2aac87300bb9ccf4a7707a15ae11b8b0b083d791ee75f040b78dff1229f0aaf3d8e636a7d8bd8e1688a5b049a66e60244ece670f8b06045d83a5d7ce44569
-
Filesize
127KB
MD5dc15c2601536ada1235761f26e607fc7
SHA1b568cd26a8852d1133a0c979f4c5aaa6dd61da3b
SHA256346260cb8faaf1ea647a8259b82e40ee7c17dc615595b9875deb533312e279c0
SHA512fc4163221d89e5a3c20529ab7d6ac222edb3f824681b770705c33715b3b6d9f12c3eceda5e956bb72472574a216a45ca11741a112deefd3e71977fa7bd93a59c
-
Filesize
182KB
MD572c4e7921d172259a391caa3b87e1790
SHA190526f78bfa5f0fb059e6cea3ee9d1b01069795e
SHA256619260b8f1e16ad0517f08a258b1f39f6e8b2e86fe99db84f78ddab2d7b87fee
SHA5126de1c53c1e9376925418557584a0ce3e2a98d5238c1dd2cbcbe387047c2ff5ef6da73cac112f82f1c8e45a55a87737ba2053ff71dd7dfcd89da765fd863ea582
-
Filesize
183KB
MD53e45bda925d71bc675110688355964c7
SHA14aa5074b8ed8ab886c92c7c2988b567c795e5132
SHA2569a66cec9786b00e0456622337f00c97ab2043d96446c462db2c22080b2a91eca
SHA512efe412397d008566779d6bbba77ac6b8a0676976ec1b631379b23fb5fdea0a1d626f0a3fe32aba6dfac6fcde346a9b740053ea12a24c855c9a910cd9ff332750
-
Filesize
177KB
MD509dc2d1788c585d69b300d9eeeb30b5e
SHA17f76cd5b6384df177ca551717b1a9add61278f9d
SHA25644e9e89598b748f9a3f05beba738e6e38b518c7ba2d6232979fed64fc51af91c
SHA512a9e91471b25dd312232d5d3ed57d7de3c3d5107f6bbd7a426591534c5cda7ff05aed6b615a51416dfd2d809a3011d1c403f37497f57beafb25960771927bc74c