Analysis

  • max time kernel
    6s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 07:05

General

  • Target

    Rustyz.exe

  • Size

    120KB

  • MD5

    72bcd7f24413629f6b194c718af7b39e

  • SHA1

    8495ab957722ea594b4a45a8a7522b9a24d23988

  • SHA256

    43a8ced5b270b43b025b166f5069446de5c15479dcb049034f7db073153ebce4

  • SHA512

    d5c9f01857e20fef93a8dc2e854bd3d18cf4c8d712eb6bf416f740c2e17eb14d9afa7eb9afb9241261bbfb07ab066447f6b22c9f78b815416d392329265a5213

  • SSDEEP

    1536:94WHOJOV+P1tMZw1pSqvarF8TfHlo6nu/dhIo7RkSQAVE4Zks:94nzHn1nHllnu/co7aGV3Zks

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rustyz.exe
    "C:\Users\Admin\AppData\Local\Temp\Rustyz.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Roaming\spoolsv.exe
      /d C:\Users\Admin\AppData\Local\Temp\Rustyz.exe
      2⤵
      • Modifies WinLogon for persistence
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:3248
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable
      2⤵
      • Modifies Windows Firewall
      PID:3932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ptBBMDMV

          Filesize

          39KB

          MD5

          297028ab5c72e48a035d43988169b3e9

          SHA1

          5e2f15be2ed928db836480dc8170b57a7d30bd6d

          SHA256

          3d792165057b6aed6ab6d0121a36cd56bb252b10f4e5cf107d013a21bf7bcdc9

          SHA512

          0e80a2edc2c002776dfb56c141829f85bcb4070b3a5a952537f606bb656aab5b55b905178025a6f2a03748e7c51bc16d6ad2d646a9333ce430d5966ec2d01b3e

        • C:\Users\Admin\AppData\Roaming\spoolsv.exe

          Filesize

          71KB

          MD5

          855396f6300e559c28eafe859cdda51b

          SHA1

          7763f8e57f166957a3aa81ce4a3752801ad39b42

          SHA256

          28900151b1af0375a50137726f7eb8d237b2674a1e82e9cb95902694254c660a

          SHA512

          f664b64b98c822042b19738ab7fbfc03448f026b6a99726b889e33d7d8a7fe2e55fc8f7e39d553aa8eca523d91db00a9153d20c8fd1d9e9a5acbcc050c141471

        • C:\Users\Admin\AppData\Roaming\spoolsv.exe

          Filesize

          39KB

          MD5

          089199b7528400fa3a1734a7b6b11909

          SHA1

          5a743a5ac23ed1b6b1ab77bb72e81f52cd4ba757

          SHA256

          491c0b3d721b3aa06bc1ef5e18cc27345d6c8026df8d232e65b67c91e56aed15

          SHA512

          3319132b2ee0e4a60645010dafd9981fbab58be351147a856ac8823ee2f0867e7b524249064053c4cd4171abf00792df8f815efd985787ab7d15463a66c5bc7b