Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
78db881af6d41d8ce120db6dfe104f24.exe
Resource
win7-20231129-en
General
-
Target
78db881af6d41d8ce120db6dfe104f24.exe
-
Size
2.4MB
-
MD5
78db881af6d41d8ce120db6dfe104f24
-
SHA1
1519b9fcc1f17b90a88acbfc089b5d2f76f21bad
-
SHA256
b644b71318ac3f1a5c01249c65bcc490ef7cffe13925c1e8e200eecd91df6c9c
-
SHA512
ea19d704961651c5fdac730f47b1470a9816dad13d9a3b67c6116eb6a778d8823a479d930676105172cea9fe235dd45f9993e12a228b984a43b5299a18866f58
-
SSDEEP
49152:d7K+TDiZtK4JnUTTbd7xnXTPTntYmzZfv+3nmRVHdA0IyDmAHA5Z4/:deLtKzRpX/tzVc0bIyawA5Z4/
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 8 IoCs
pid Process 2184 netsh.exe 3064 netsh.exe 4284 netsh.exe 1796 netsh.exe 4064 netsh.exe 2688 netsh.exe 2900 netsh.exe 4384 netsh.exe -
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3188 attrib.exe 1040 attrib.exe 5096 attrib.exe 3060 attrib.exe 2336 attrib.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 78db881af6d41d8ce120db6dfe104f24.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 8 IoCs
pid Process 4140 setup.exe 2784 rutserv.exe 1532 rutserv.exe 1872 rutserv.exe 5004 rutserv.exe 2904 rfusclient.exe 4968 rfusclient.exe 2236 rfusclient.exe -
Loads dropped DLL 14 IoCs
pid Process 2784 rutserv.exe 2784 rutserv.exe 1532 rutserv.exe 1532 rutserv.exe 1872 rutserv.exe 1872 rutserv.exe 5004 rutserv.exe 5004 rutserv.exe 2904 rfusclient.exe 2904 rfusclient.exe 4968 rfusclient.exe 4968 rfusclient.exe 2236 rfusclient.exe 2236 rfusclient.exe -
Drops file in System32 directory 35 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\catroot3\RWLN.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\set.reg cmd.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\catroot3\HookDrv.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\RWLN.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\Microsoft.VC80.CRT.manifest cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\msvcp80.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\msvcr80.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\RIPCServer.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\rutserv.exe cmd.exe File created C:\Windows\SysWOW64\catroot3\rversionlib.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\dsfVorbisEncoder.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\HookDrv.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\dsfOggMux.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\set.reg cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\rfusclient.exe cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\RIPCServer.dll cmd.exe File created C:\Windows\SysWOW64\RWLN.dll rutserv.exe File opened for modification C:\Windows\SysWOW64\catroot3\dsfOggMux.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\rfusclient.exe cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\PushSource.ax cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\dsfTheoraEncoder.dll cmd.exe File created C:\Windows\SysWOW64\catroot3\msvcp80.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\dsfVorbisEncoder.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\Microsoft.VC80.CRT.manifest cmd.exe File created C:\Windows\SysWOW64\catroot3\PushSource.ax cmd.exe File created C:\Windows\SysWOW64\catroot3\rutserv.exe cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\rversionlib.dll cmd.exe File opened for modification C:\Windows\SysWOW64\RWLN.dll rutserv.exe File opened for modification C:\Windows\SysWOW64\catroot3 attrib.exe File created C:\Windows\SysWOW64\catroot3\dsfTheoraEncoder.dll cmd.exe File opened for modification C:\Windows\SysWOW64\catroot3\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File created C:\Windows\SysWOW64\catroot3\msvcr80.dll cmd.exe File opened for modification C:\Windows\SysWOW64\rutserv.pdb rutserv.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\setup.exe 78db881af6d41d8ce120db6dfe104f24.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\setup.exe setup.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 5 IoCs
pid Process 728 taskkill.exe 4648 taskkill.exe 2904 taskkill.exe 4928 taskkill.exe 3568 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings setup.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3752 reg.exe 4684 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3640 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5004 rutserv.exe 5004 rutserv.exe 5004 rutserv.exe 5004 rutserv.exe 2904 rfusclient.exe 2904 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 728 taskkill.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 4928 taskkill.exe Token: SeDebugPrivilege 3568 taskkill.exe Token: SeDebugPrivilege 2784 rutserv.exe Token: SeDebugPrivilege 1872 rutserv.exe Token: SeTakeOwnershipPrivilege 5004 rutserv.exe Token: SeTcbPrivilege 5004 rutserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4140 4996 78db881af6d41d8ce120db6dfe104f24.exe 90 PID 4996 wrote to memory of 4140 4996 78db881af6d41d8ce120db6dfe104f24.exe 90 PID 4996 wrote to memory of 4140 4996 78db881af6d41d8ce120db6dfe104f24.exe 90 PID 4140 wrote to memory of 3564 4140 setup.exe 92 PID 4140 wrote to memory of 3564 4140 setup.exe 92 PID 4140 wrote to memory of 3564 4140 setup.exe 92 PID 3564 wrote to memory of 3532 3564 WScript.exe 93 PID 3564 wrote to memory of 3532 3564 WScript.exe 93 PID 3564 wrote to memory of 3532 3564 WScript.exe 93 PID 4140 wrote to memory of 2452 4140 setup.exe 95 PID 4140 wrote to memory of 2452 4140 setup.exe 95 PID 4140 wrote to memory of 2452 4140 setup.exe 95 PID 3532 wrote to memory of 728 3532 cmd.exe 97 PID 3532 wrote to memory of 728 3532 cmd.exe 97 PID 3532 wrote to memory of 728 3532 cmd.exe 97 PID 3532 wrote to memory of 4648 3532 cmd.exe 99 PID 3532 wrote to memory of 4648 3532 cmd.exe 99 PID 3532 wrote to memory of 4648 3532 cmd.exe 99 PID 3532 wrote to memory of 4712 3532 cmd.exe 100 PID 3532 wrote to memory of 4712 3532 cmd.exe 100 PID 3532 wrote to memory of 4712 3532 cmd.exe 100 PID 3532 wrote to memory of 5096 3532 cmd.exe 101 PID 3532 wrote to memory of 5096 3532 cmd.exe 101 PID 3532 wrote to memory of 5096 3532 cmd.exe 101 PID 3532 wrote to memory of 1040 3532 cmd.exe 108 PID 3532 wrote to memory of 1040 3532 cmd.exe 108 PID 3532 wrote to memory of 1040 3532 cmd.exe 108 PID 3532 wrote to memory of 3188 3532 cmd.exe 107 PID 3532 wrote to memory of 3188 3532 cmd.exe 107 PID 3532 wrote to memory of 3188 3532 cmd.exe 107 PID 3532 wrote to memory of 2336 3532 cmd.exe 106 PID 3532 wrote to memory of 2336 3532 cmd.exe 106 PID 3532 wrote to memory of 2336 3532 cmd.exe 106 PID 3532 wrote to memory of 3060 3532 cmd.exe 102 PID 3532 wrote to memory of 3060 3532 cmd.exe 102 PID 3532 wrote to memory of 3060 3532 cmd.exe 102 PID 3532 wrote to memory of 3056 3532 cmd.exe 103 PID 3532 wrote to memory of 3056 3532 cmd.exe 103 PID 3532 wrote to memory of 3056 3532 cmd.exe 103 PID 3056 wrote to memory of 4792 3056 net.exe 104 PID 3056 wrote to memory of 4792 3056 net.exe 104 PID 3056 wrote to memory of 4792 3056 net.exe 104 PID 3532 wrote to memory of 2904 3532 cmd.exe 105 PID 3532 wrote to memory of 2904 3532 cmd.exe 105 PID 3532 wrote to memory of 2904 3532 cmd.exe 105 PID 3532 wrote to memory of 4928 3532 cmd.exe 109 PID 3532 wrote to memory of 4928 3532 cmd.exe 109 PID 3532 wrote to memory of 4928 3532 cmd.exe 109 PID 3532 wrote to memory of 3568 3532 cmd.exe 110 PID 3532 wrote to memory of 3568 3532 cmd.exe 110 PID 3532 wrote to memory of 3568 3532 cmd.exe 110 PID 3532 wrote to memory of 1688 3532 cmd.exe 111 PID 3532 wrote to memory of 1688 3532 cmd.exe 111 PID 3532 wrote to memory of 1688 3532 cmd.exe 111 PID 3532 wrote to memory of 3288 3532 cmd.exe 112 PID 3532 wrote to memory of 3288 3532 cmd.exe 112 PID 3532 wrote to memory of 3288 3532 cmd.exe 112 PID 3532 wrote to memory of 1492 3532 cmd.exe 113 PID 3532 wrote to memory of 1492 3532 cmd.exe 113 PID 3532 wrote to memory of 1492 3532 cmd.exe 113 PID 3532 wrote to memory of 736 3532 cmd.exe 114 PID 3532 wrote to memory of 736 3532 cmd.exe 114 PID 3532 wrote to memory of 736 3532 cmd.exe 114 PID 3532 wrote to memory of 5052 3532 cmd.exe 115 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2336 attrib.exe 1040 attrib.exe 2100 attrib.exe 3208 attrib.exe 736 attrib.exe 5096 attrib.exe 3288 attrib.exe 736 attrib.exe 1740 attrib.exe 3060 attrib.exe 3188 attrib.exe 1688 attrib.exe 1492 attrib.exe 5052 attrib.exe 3312 attrib.exe 1508 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78db881af6d41d8ce120db6dfe104f24.exe"C:\Users\Admin\AppData\Local\Temp\78db881af6d41d8ce120db6dfe104f24.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Company\NewProduct\setup.exe"C:\Program Files (x86)\Company\NewProduct\setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\stop.js"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "4⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im RManServer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f5⤵PID:4712
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\System32\catroot3"5⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:5096
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\install.bat"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3060
-
-
C:\Windows\SysWOW64\net.exenet stop rserver35⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop rserver36⤵PID:4792
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rserver3.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\stop.js"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2336
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp/realip.exe"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3188
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp/block_reader.sys"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im r_server.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cam_server.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\system32\cam_server.exe"5⤵
- Views/modifies file attributes
PID:1688
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\SysWOW64\cam_server.exe"5⤵
- Views/modifies file attributes
PID:3288
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Windows\system32\rserver30"5⤵
- Views/modifies file attributes
PID:1492
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Windows\SysWOW64\rserver30"5⤵
- Views/modifies file attributes
PID:736
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\system32\r_server.exe"5⤵
- Views/modifies file attributes
PID:5052
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\SysWOW64\r_server.exe"5⤵
- Views/modifies file attributes
PID:1740
-
-
C:\Windows\SysWOW64\net.exenet stop Telnet5⤵PID:2632
-
-
C:\Windows\SysWOW64\sc.exesc config tlntsvr start= disabled5⤵
- Launches sc.exe
PID:5088
-
-
C:\Windows\SysWOW64\net.exenet stop "Service Host Controller"5⤵PID:1408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Service Host Controller"6⤵PID:3264
-
-
-
C:\Windows\SysWOW64\net.exenet user HelpAssistant /delete5⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpAssistant /delete6⤵PID:4360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn security /f5⤵PID:3896
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="RealIP"5⤵
- Modifies Windows Firewall
PID:2688
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Microsoft Outlook Express"5⤵
- Modifies Windows Firewall
PID:2900
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Service Host Controller"5⤵
- Modifies Windows Firewall
PID:4384
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="ò«ßΓ-»α«µÑßß ñ½∩ ß½πªí Windows"5⤵
- Modifies Windows Firewall
PID:2184
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="ò«ßΓ-»α«µÑßß ñ½∩ ºáñáτ Windows"5⤵
- Modifies Windows Firewall
PID:3064
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete portopening tcp 570095⤵
- Modifies Windows Firewall
PID:4284
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="cam_server"5⤵
- Modifies Windows Firewall
PID:1796
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete portopening tcp 57011 all5⤵
- Modifies Windows Firewall
PID:4064
-
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v "Ä»Ñαᵿ«¡¡á∩ ß¿ßΓѼá Microsoft Windows" /f5⤵
- Modifies registry key
PID:3752
-
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v "Service Host Controller" /f5⤵
- Modifies registry key
PID:4684
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v HelpAssistant /f5⤵PID:700
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "cam_server.exe" /f5⤵PID:1272
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\System\CurrentControlSet\Services\RServer3" /f5⤵PID:4140
-
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /silentinstall5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /firewall5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s set.reg5⤵
- Runs .reg file with regedit
PID:3640
-
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /start5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/realip.exe"5⤵
- Views/modifies file attributes
PID:2100
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp\stop.js"5⤵
- Views/modifies file attributes
PID:3312
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp\install.bat"5⤵
- Views/modifies file attributes
PID:3208
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/HookLib.dll"5⤵
- Views/modifies file attributes
PID:736
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/block_reader.sys"5⤵
- Views/modifies file attributes
PID:1508
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "3⤵PID:2452
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Telnet1⤵PID:3576
-
C:\Windows\SysWOW64\catroot3\rutserv.exeC:\Windows\SysWOW64\catroot3\rutserv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236
-
-
-
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe /tray2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD550657a7200b9070b2cd4c2f683164b26
SHA15232acec938a88d249b6a50909f8757db8b14b84
SHA2565065fbb828b01e89e01719ece8221e915286ef7e8dec1559c495adb387ff718c
SHA51276c224caad7651bc1d594d19c22c4d36bf66c61233322ddcebfbb4932867bb7fe746d68b5ed3abefa8a3ff2635fc50a60e10befcc65960ce447fd26a02135ef8
-
Filesize
198B
MD5ae03f2c3c24e31238d7c7c51766e8e7c
SHA1fbe46630368375e5b61b66bc64d15f44adc8ab1f
SHA256248e01e6260e83ccede66fe4bc9192360c190eb9096d794d2363b02fcfb9c7a8
SHA51202e7a25453c1f8cb10b2df2690a419f2a6e2a15087b9a24b62ec3e6760a723bb57c2ecbd0f74ffe0d59145c650b588bf8a47f582ac93a49d3daf90b7afd3ab30
-
Filesize
144KB
MD5513066a38057079e232f5f99baef2b94
SHA1a6da9e87415b8918447ec361ba98703d12b4ee76
SHA25602dbea75e8dbcdfc12c6b92a6c08efad83d4ca742ed7aee393ab26cab0c58f9e
SHA51283a074bef57f78ede2488dd586b963b92837e17eea77ebd1464f3da06954ae8ca07f040089af0c257e2836611ae39424574bd365aea4a6318a2707e031cd31a5
-
Filesize
1KB
MD5d34b3da03c59f38a510eaa8ccc151ec7
SHA141b978588a9902f5e14b2b693973cb210ed900b2
SHA256a50941352cb9d8f7ba6fbf7db5c8af95fb5ab76fc5d60cfd0984e558678908cc
SHA512231a97761d652a0fc133b930abba07d456ba6cd70703a632fd7292f6ee00e50ef28562159e54acc3fc6cc118f766ea3f2f8392579ae31cc9c0c1c0dd761d36f7
-
Filesize
448KB
MD5d7eb741be9c97a6d1063102f0e4ca44d
SHA1bf8bdca7f56ed39fb96141ae9593dec497f4e2c8
SHA2560914ab04bfd258008fec4605c3fa0e23c0d5111b9cfc374cfa4eaa1b4208dff7
SHA512cbcaedf5aca641313ba2708e4be3ea0d18dd63e4543f2c2fdcbd31964a2c01ff42724ec666da24bf7bf7b8faaa5eceae761edf82c71919753d42695c9588e65e
-
Filesize
96KB
MD5329354f10504d225384e19c8c1c575db
SHA19ef0b6256f3c5bbeb444cb00ee4b278847e8aa66
SHA25624735b40df2cdac4da4e3201fc597eed5566c5c662aa312fa491b7a24e244844
SHA512876585dd23f799f1b7cef365d3030213338b3c88bc2b20174e7c109248319bb5a3feaef43c0b962f459b2f4d90ff252c4704d6f1a0908b087e24b4f03eba9c0e
-
Filesize
325KB
MD5cf6ce6b13673dd11f0cd4b597ac56edb
SHA12017888be6edbea723b9b888ac548db5115df09e
SHA2567bda291b7f50049088ea418b5695929b9be11cc014f6ec0f43f495285d1d6f74
SHA512e5b69b4ee2ff8d9682913a2f846dc2eca8223d3100d626aea9763653fe7b8b35b8e6dc918f4c32e8ae2fc1761611dcd0b16d623ede954f173db33216b33f49dc
-
Filesize
84KB
MD565889701199e41ae2abee652a232af6e
SHA13f76c39fde130b550013a4f13bfea2862b5628cf
SHA256ef12a65d861a14aed28480946bc56fce479a21e9beac2983239eac6551d4f32e
SHA512edbb1a1541a546d69e3fd64047a20613b47b3c08f2b639a53160b825c4a1462c4cc08a7bf417aa2db814f412fb16619c6c0d9364e21cc1c6d753ecf81f1d30f5
-
Filesize
240KB
MD55f2fc8a0d96a1e796a4daae9465f5dd6
SHA1224f13f3cbaa441c0cb6d6300715fda7136408ea
SHA256f8686d8752801bb21c3d94ebe743758d79b9b59f33589ec8620e75a949d1871f
SHA512da866275159b434205f259176c3937b7c77b14ed95d052152b05b984909e094bbd3b2702d3e874a4a1e1bc02fc5a8476ea43df8aee43542d56e832eacc8f54ad
-
Filesize
1.6MB
MD5086a9fd9179aad7911561eeff08cf7e2
SHA1d390c28376e08769a06a4a8b46609b3a668f728b
SHA2562cede6701b73a4ddd6422fde157ea54644a3a9598b3ba217cf2b30b595cf6282
SHA512a98f593a306208da49e57e265daf37d6b1bd9f190fba45d65dd6cfa08801b760f540ea5cc443f9a1512eb5ddc01b1e4e28fc8ddecb9c0f1d42c884c4efaa7193
-
Filesize
4KB
MD58df90cf16db8cca10642e6bfabd37e4f
SHA1d5de18dbc5d9718162d553914c01f6ac929526da
SHA2564e710a193a4cf02fc8068a03b2a3cb758e7d4b5b731c83031f1776acc13227a6
SHA512bc364225aa8be575e9d9aead935a30c0c5e490f852916cb38c01abe1e694537c75da80641a6e76c9ee962a37b746a73b42c412df76860099256eebbe6ac989d9
-
Filesize
541KB
MD58c53ccd787c381cd535d8dcca12584d8
SHA1bc7ce60270a58450596aa3e3e5d0a99f731333d9
SHA256384aaee2a103f7ed5c3ba59d4fb2ba22313aaa1fbc5d232c29dbc14d38e0b528
SHA512e86c1426f1ad62d8f9bb1196dee647477f71b9aacafabb181f35e639c105779f95f1576b72c0a9216e876430383b8d44f27748b13c25e0548c254a0f641e4755
-
Filesize
617KB
MD51169436ee42f860c7db37a4692b38f0e
SHA14ccd15bf2c1b1d541ac883b0f42497e8ced6a5a3
SHA2569382aaed2db19cd75a70e38964f06c63f19f63c9dfb5a33b0c2d445bb41b6e46
SHA512e06064eb95a2ab9c3343672072f5b3f5983fc8ea9e5c92f79e50ba2e259d6d5fa8ed97170dea6d0d032ea6c01e074eefaab850d28965c7522fb7e03d9c65eae0
-
Filesize
2.8MB
MD5a90c6e72a9e2602560c521a1647664ad
SHA122f7f0ddb0af04df7109c3ddbb7027909041fa73
SHA256579e5984ad5eb6e5e4b004acd01c95f609a1330f3900cd9851562eb4ac879197
SHA512fbba623cab28c0648e8bdd03c99df9e2a84180d72ea8e63367e943f8b432ebc36a7e10a8bfce11ad1803e54a8514f1ded4fec72e680ee04386965b5eb6a5d6c2
-
Filesize
3.2MB
MD562dbd11dc36780e35af1aafaa6a8f0f1
SHA1dc6aaac7171b351be3397c3e0e1769dffa848723
SHA256b06604ee55206b081a8378f771f3501f48df1c0023b1d6edcbc5f781aa521f57
SHA512b7f311286387ab39a0a54ac3dbcb74d9db3de4e2657dd6f0e182e38e9ed5400e87f1000c7b978fd4bb34fc373dd99bcb18271296f03248366a9cb52afdaa695d
-
Filesize
310KB
MD53f95a06f40eaf51b86cef2bf036ebd7a
SHA164009c5f79661eb2f82c9a76a843c0d3a856695d
SHA2561eb88258b18b215b44620326e35c90a8589f384710e7b2d61abf4f59203bd82d
SHA5126f28b5de28026319bed198f06b5461f688ca401129f1125e9e9d3b58956cc0d546234c2d202827bd74b99afd2ead958a863a520a1f4b7e599d385a8a67062897
-
Filesize
14KB
MD577c8f244537598b4e97df70217e344f9
SHA1cd84b589fcf6b999b6aa02311044f3c95a47cf0a
SHA25631fed19631457b45b54b36c6a34cd354d390c9bfb55e2686cdaa76f940a6646a
SHA512da7c6ad837652d5604c7010cfeef26cd2041b219477d39bd6b56cf1dd470a75b493a90e60d0751d92f9aca47f212074079ef4da6e09c48108969e5a922d62b5b
-
Filesize
215B
MD5804b35ef108ec9839eb6a9335add8ca1
SHA1bf91e6645c4a1c8cab2d20388469da9ed0a82d56
SHA256fe111b7ea4e14ab7ba5004aea52b10030e0282bb5c40d4ba55761a2c5be59406
SHA512822a3ec5e0e353058d4355bc01a44440dafe8d16c57744a3dcbc962eb110ed3f6843556568616bfc5dc7fad5f5832cd27d6591dc50105f2c79fc16c33919936d
-
Filesize
1024KB
MD5607eca846a3c8c7b5a3901cf93e81c74
SHA13e131ee56c488877b4fd00144251b1084703c418
SHA25612a8fe716c65de45cd46b85318fef57a9d38b1b96f877aa0a7b864f802fe99c9
SHA512fec6c734d2de1ad4a6e3afe78018cb3474c85ea6e6ae5e5197ae2f433027c800523b7521a407e12fda9d10395213251dddd2bf48838416bbd46ed7a5f60e68f4