Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:26
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe
Resource
win7-20240220-en
General
-
Target
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe
-
Size
16.4MB
-
MD5
2d49a6ce2ee81dc16d23b3a820ee87e0
-
SHA1
d0b2dab654a86a302c1a051c950b76c15ece69b1
-
SHA256
b50cf4ce1fbaa5ba67035c538d49b8a39f1c1f976bfde8ee1f4ee040c6d42591
-
SHA512
c4e2d5459315035df1f60117b03c8289c63b5d8c34bb4c23566b77a38fcd2c4d0967351c5f425839123f2bb4d030a4b6d14236610b066306028c2dda31e5359a
-
SSDEEP
393216:lfdu0pZ+MHgn6ttNkJI/Jt7RRfONkopbgbGq/jF8I6RLj:lFPpZ+MH5ttxRtVlONLp0yLj
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3036-0-0x0000000000400000-0x0000000002826000-memory.dmp upx behavioral1/memory/3036-70-0x0000000000400000-0x0000000002826000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rutserv.exerfusclient.exerfusclient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Executes dropped EXE 4 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid process 2376 rfusclient.exe 2816 rutserv.exe 1444 rutserv.exe 292 rfusclient.exe -
Loads dropped DLL 9 IoCs
Processes:
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exerfusclient.exerutserv.exerutserv.exepid process 3036 SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe 2376 rfusclient.exe 2376 rfusclient.exe 2376 rfusclient.exe 2376 rfusclient.exe 2816 rutserv.exe 2816 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid process 2376 rfusclient.exe 2376 rfusclient.exe 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 292 rfusclient.exe 292 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rutserv.exerutserv.exedescription pid process Token: SeDebugPrivilege 2816 rutserv.exe Token: SeTakeOwnershipPrivilege 1444 rutserv.exe Token: SeTcbPrivilege 1444 rutserv.exe Token: SeTcbPrivilege 1444 rutserv.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
rfusclient.exepid process 292 rfusclient.exe 292 rfusclient.exe 292 rfusclient.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
rfusclient.exepid process 292 rfusclient.exe 292 rfusclient.exe 292 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
rutserv.exerutserv.exepid process 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 2816 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe 1444 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exerfusclient.exerutserv.exedescription pid process target process PID 3036 wrote to memory of 2376 3036 SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe rfusclient.exe PID 3036 wrote to memory of 2376 3036 SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe rfusclient.exe PID 3036 wrote to memory of 2376 3036 SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe rfusclient.exe PID 3036 wrote to memory of 2376 3036 SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe rfusclient.exe PID 2376 wrote to memory of 2816 2376 rfusclient.exe rutserv.exe PID 2376 wrote to memory of 2816 2376 rfusclient.exe rutserv.exe PID 2376 wrote to memory of 2816 2376 rfusclient.exe rutserv.exe PID 2376 wrote to memory of 2816 2376 rfusclient.exe rutserv.exe PID 1444 wrote to memory of 292 1444 rutserv.exe rfusclient.exe PID 1444 wrote to memory of 292 1444 rutserv.exe rfusclient.exe PID 1444 wrote to memory of 292 1444 rutserv.exe rfusclient.exe PID 1444 wrote to memory of 292 1444 rutserv.exe rfusclient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe" -run_agent2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe" -run_agent3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe" /tray /user5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:292
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5e6b99144ea133a583f2964fdaa0c514a
SHA1a9ab6b4ad60bd60c798e9909be801dad725497de
SHA256b137e38facdd1cdfc9730856675f4b531366d7af54b605209cb2158a58deb1ef
SHA512a4f6e9663163e7a85251e129983251698b2c98070d2044f6402804d92779d77e477cb63c703b72a6ea20e19fc0d443a2a4f7fcf9d181a1e0ef0c0276297bf072
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
1.3MB
MD50d51927274281007657c7f3e0df7becb
SHA16de3746d9d0980f5715cec6c676a8eb53b5efc49
SHA256dfc847405be60c29e86e3e3222e7f63c1ff584727d87d3c35c25c4893e19fda0
SHA512eef74088a94635184192d82bb6dcc0758749cb290c8deeff211881e8a280aec73a53334eff8846df618204b0f318e757eab23e76951a472ba6e086905000d9a5
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
7KB
MD59747762406e1f1708107c6377b2ee6f8
SHA1c4d2cf11e3d2a2aed7a2e3d08baad370820e81d8
SHA256a02f875cdee319d72c187f14d9861e6825155097b5396137e7c8964a01bf7989
SHA512310be62d38d6d035587f7884f97d10a9388105732960cc5f5377ebb155f1403e206554e48ef09b50c275ad334a3723baaa00c56d5e04c09d5885f3debeed12c2
-
Filesize
337KB
MD5197da919e4c91125656bf905877c9b5a
SHA19574ec3e87bb0f7acce72d4d59d176296741aa83
SHA256303c78aba3b776472c245f17020f9aa5a53f09a6f6c1e4f34b8e18e33906b5ee
SHA51233c1b853181f83cab2f57f47fb7e093badf83963613e7328ebd23f0d62f59416d7a93063c6237435fbb6833a69bc44ebbc13aa585da010f491c680b2ea335c47
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
1.6MB
MD52ac39d6990170ca37a735f2f15f970e8
SHA18148a9cdc6b3fe6492281ebad79636433a6064ab
SHA2560961d83cb25e1a50d5c0ec2f9fb0d17f2504dae0b22a865f6e1ea8e987e1c6fa
SHA5127e30fde909d5f8efd6c2e40e125525697267273163ac35cf53561a2bd32e5dad8e4fba32905f53e422c9c73b8ad9a0c151f8d36042c5f156b50bf42dc21a9cee
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
365KB
MD5c9d412c1d30abb9d61151a10371f4140
SHA187120faa6b859f5e23f7344f9547b2fc228af15b
SHA256f3465ce8a23db5e8228eed5a60a6f7a096d1a9adf3012c39bc6d81d4e57e8e9e
SHA5121c020afa89cdae55f4dcb80a455dc1b352f40455142f3947ed29c3e3d51fbd465b6e0ea16cd103186c252783a3f2a7f7c417e4df5727d9b2db511b650308face
-
Filesize
860KB
MD5a59f69797c42324540e26c7c7998c18c
SHA17f7bc5bc62a8744f87a7d2e30cc6dd74c72e19b4
SHA25683e1c1eb55bfd0f2d85d41c1e4dee65046b064ccb263ec7f412a5f329c75cfd1
SHA512837f244e6b70658974506ac35bd3ee2d413b89fe4b26e75f4a61cc7bec63e999c9c2cffb690ad567f74962bab13f2f5471300cd0e0cfe61bb1084072cb55c38b