Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 10:18
Static task
static1
Behavioral task
behavioral1
Sample
d864a0ac635e811332124e1df1458257.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d864a0ac635e811332124e1df1458257.exe
Resource
win10v2004-20231215-en
General
-
Target
d864a0ac635e811332124e1df1458257.exe
-
Size
10.4MB
-
MD5
d864a0ac635e811332124e1df1458257
-
SHA1
8d2e8e36ad08c6d7a38fdb3304ce25181586cd5c
-
SHA256
8edbedff95b25d5e437e4ff1ff5197c50ebce68020c9531ccaa09510c6f94a13
-
SHA512
f1cf8119708965ecf5052be88732e23031afc47676da3482227ce93b90f06064e363012448fb699ee4fdf1bd8643b3aad647de1b77d36ae0a74c6ff8f5ab0f1b
-
SSDEEP
196608:xoeZUtx0psIKcQEgNvR5ffalRn2amSNJiWa:xlqSsIiEgNvbfSlB2amSNJir
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d864a0ac635e811332124e1df1458257.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation d864a0ac635e811332124e1df1458257.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid Process 5000 regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d864a0ac635e811332124e1df1458257.exe"C:\Users\Admin\AppData\Local\Temp\d864a0ac635e811332124e1df1458257.exe"1⤵
- Checks computer location settings
PID:660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3FA9.tmp\1213.bat" "2⤵PID:632
-
C:\Windows\SysWOW64\rutserv.exe"C:\Windows\System32\rutserv.exe" /silentinstall3⤵PID:2384
-
-
C:\Windows\SysWOW64\rutserv.exe"C:\Windows\System32\rutserv.exe" /firewall3⤵PID:1356
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "settings.reg"3⤵
- Runs .reg file with regedit
PID:5000
-
-
C:\Windows\SysWOW64\rutserv.exe"C:\Windows\System32\rutserv.exe" /start3⤵PID:1800
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:2060
-
-
-
C:\Windows\SysWOW64\rutserv.exeC:\Windows\SysWOW64\rutserv.exe1⤵PID:4988
-
C:\Windows\SysWOW64\rfusclient.exeC:\Windows\SysWOW64\rfusclient.exe2⤵PID:2212
-
C:\Windows\SysWOW64\rfusclient.exeC:\Windows\SysWOW64\rfusclient.exe /tray3⤵PID:1256
-
-
-
C:\Windows\SysWOW64\rfusclient.exeC:\Windows\SysWOW64\rfusclient.exe /tray2⤵PID:3844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a1b4263a202c77f63141c716e836a4ab
SHA1f3859ca14556b04192ed95ff0d9876500a9ab52d
SHA2563c85a85ca0516b3763fa370e8347da94b65b047d194847756879c8f482d78231
SHA51264498944db72ca33ff2877d60f375e67f42fc5c9624a2b7617fe5b5776db06c66f4af3763b6bb2e3b6c654a1b148494e7397286e5d69f76aaa35e3abdfbf41bd
-
Filesize
144KB
MD530e269f850baf6ca25187815912e21c5
SHA1eb160de97d12b4e96f350dd0d0126d41d658afb3
SHA256379191bfd34d41e96760c7a539e2056a22be3d44bf0e8712b53e443f55aead90
SHA5129b86a4eefdcae46e605f85e752ef61e39fd0212a19b7fd4c35eb3ab99851a0b906d048d12d1e1e985a340a67a64d405b8cf803555865137278f0c19d686df5e7
-
Filesize
357KB
MD5bb1f3e716d12734d1d2d9219a3979a62
SHA10ef66eed2f2ae45ec2d478902833b830334109cb
SHA256d7e9c9043ed7df2af800d9b2a33e3efddf68b70f043e9717afc4b7dd4e13e077
SHA512bbc90747dd45a01b05f5c0b6fa58ffe18af894b05363267ac1cc9fe3262f5e65c8ae4e08dfd82d89b9112e86e42d24a12784b79f5ea30b6443015c19b6792c9c
-
Filesize
234KB
MD58e3f59b8c9dfc933fca30edefeb76186
SHA137a78089d5936d1bc3b60915971604c611a94dbd
SHA256528c0656751b336c10cb4c49b703eae9c3863f7f416d0e09b198b082cc54aeb8
SHA5123224c20c30556774fd4bed78909f451b9a5a46aa59271b5e88b1e0e60145d217802a8f1fda3d3fabcd8546ca7783e0c70f0c419a28efe6c5160a102553a3c91d
-
Filesize
3.9MB
MD5511ab5d90c2e370a942fc3b9077c38d3
SHA1a7d4f2dc7ab8ca93a4bec1bac2468166c0ed3f86
SHA2560f07353d08de0a6265d25b66a273fabeef807f868779ad79559cd17c203e313c
SHA51282861f55433d9bc6daeb9657c9b8c056fa7cfc7c09bc51d3e4cef7684e3ca4d78036ad1a07ad2336e5e49510bab41fa5a3888dae80ef674a7ff5c16305e240c4
-
Filesize
2.4MB
MD521367f2ba84f11ba517780876a3e462a
SHA1dcdddc5097630a491031ef19d211b77979ffb984
SHA2560ad6b6f39c0e049b07ba814d7af2f0daf397c212b9149ce9aec39a23ad51beff
SHA51291c223605a16cd8526a6fed2d6a5f9912de878fe6afa8c7ede95cd72233d1969c89c0b1d0074cee9bd572bb972036b4e79a017c037ac2075007623303f964915
-
Filesize
403KB
MD56f6bfe02e84a595a56b456f72debd4ee
SHA190bad3ae1746c7a45df2dbf44cd536eb1bf3c8e2
SHA2565e59b566eda7bb36f3f5d6dd39858bc9d6cf2c8d81deca4ea3c409804247da51
SHA512ed2a7402699a6d00d1eac52b0f2dea4475173be3320dfbad5ca58877f06638769533229bc12bce6650726d3166c0e5ebac2dad7171b77b29186d4d5e65818c50
-
Filesize
685KB
MD5c638bca1a67911af7f9ed67e7b501154
SHA10fd74d2f1bd78f678b897a776d8bce36742c39b7
SHA256519078219f7f6db542f747702422f902a21bfc3aef8c6e6c3580e1c5e88162b8
SHA512ca8133399f61a1f339a14e3fad3bfafc6fe3657801fd66df761c88c18b2dc23ceb02ba6faa536690986972933bec2808254ef143c2c22f881285facb4364659f
-
Filesize
894KB
MD594be18c279a7a9a5388e2e8f8d707c6b
SHA184bdef64fe915463e1e79de593b7fb4a6a6c4088
SHA2568f79398406c12e5ed81421b31e07d2643f8ccc69636db62e3d7f8f3c1c117e58
SHA512500cb1dc589b28eb8d62f3e2ace398168dfb89b972fa772627478b3768b2c755b340e0a737e321f6a90a00efecae5641fc47092cc6f4778cabfd87a247535343
-
Filesize
382KB
MD57d445b9beca2310df6fac7da74d9fc91
SHA1ab4c0911f506c844b7abbc5e62b156c95c4e4f64
SHA2564fd50c80e41f5b5da26295e2f7b15d54c48426d600e6ade41ca7049b758e615c
SHA512afaad2050b2394f471f4f94b36a2745b9da17f8965fc2998961aefc51cc2d6722d8bb7e891115c8c8101e81c2b5dc3e90fe0837bf8fa91bc6edfbd86cdf90cfa
-
Filesize
381KB
MD5f65821343b067e427c06e5b099bc0d4d
SHA100c55a877f85f0d17655d5e933d85c798bbbce90
SHA2568056e00ee570dd0818b73224d81c0bd5f75cc9c78eadc0624d10a6b4192a8dec
SHA512365e3b6ac4557aaece0b485ff56d84cee37da8db002987a6afd73a38b376fc9a2887e4c2cdaaa0a0f1ae3442d863fef281788d676ca43c559ae60dc49d891df4