Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:26
Behavioral task
behavioral1
Sample
79b940cedb20098990864f8f0a60372f.exe
Resource
win7-20241010-en
General
-
Target
79b940cedb20098990864f8f0a60372f.exe
-
Size
16.4MB
-
MD5
79b940cedb20098990864f8f0a60372f
-
SHA1
b763fd1a3f54bcdaacd7ab6b51387e49834225a7
-
SHA256
8c4a21abb710c7461e914ffaac2e0e0bd9f787ecea09c40eb6fcebee6c0b7459
-
SHA512
e0ae344de6303b75c9c880a5d897d305f1e6ab3e3588ddf3f6ba21e1a229ad2b72765667fb6ce11be0c66f55fda942ea395f6970d4f0c23f90a9cdb6cdc601bd
-
SSDEEP
393216:DfdMgv/raPXH/rv6VxoaPDpZwoCoOEjDl+6:DFMg3sXfWVxowl+oCoOz6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rfusclient.exerutserv.exerfusclient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\Geo\Nation rfusclient.exe Key value queried \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\Geo\Nation rutserv.exe Key value queried \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\Geo\Nation rfusclient.exe -
Processes:
resource yara_rule behavioral1/memory/1712-0-0x0000000000400000-0x0000000002842000-memory.dmp upx behavioral1/memory/1712-80-0x0000000000400000-0x0000000002842000-memory.dmp upx -
Executes dropped EXE 4 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid process 2800 rfusclient.exe 1904 rutserv.exe 1092 rutserv.exe 1864 rfusclient.exe -
Loads dropped DLL 9 IoCs
Processes:
79b940cedb20098990864f8f0a60372f.exerfusclient.exerutserv.exerutserv.exepid process 1712 79b940cedb20098990864f8f0a60372f.exe 2800 rfusclient.exe 2800 rfusclient.exe 2800 rfusclient.exe 2800 rfusclient.exe 1904 rutserv.exe 1904 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
79b940cedb20098990864f8f0a60372f.exerfusclient.exerutserv.exerutserv.exerfusclient.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b940cedb20098990864f8f0a60372f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
rfusclient.exerutserv.exerutserv.exerfusclient.exepid process 2800 rfusclient.exe 2800 rfusclient.exe 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1864 rfusclient.exe 1864 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rutserv.exerutserv.exedescription pid process Token: SeDebugPrivilege 1904 rutserv.exe Token: SeTakeOwnershipPrivilege 1092 rutserv.exe Token: SeTcbPrivilege 1092 rutserv.exe Token: SeTcbPrivilege 1092 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
rfusclient.exepid process 1864 rfusclient.exe 1864 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
rfusclient.exepid process 1864 rfusclient.exe 1864 rfusclient.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
rutserv.exerutserv.exepid process 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1904 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe 1092 rutserv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
79b940cedb20098990864f8f0a60372f.exerfusclient.exerutserv.exedescription pid process target process PID 1712 wrote to memory of 2800 1712 79b940cedb20098990864f8f0a60372f.exe rfusclient.exe PID 1712 wrote to memory of 2800 1712 79b940cedb20098990864f8f0a60372f.exe rfusclient.exe PID 1712 wrote to memory of 2800 1712 79b940cedb20098990864f8f0a60372f.exe rfusclient.exe PID 1712 wrote to memory of 2800 1712 79b940cedb20098990864f8f0a60372f.exe rfusclient.exe PID 2800 wrote to memory of 1904 2800 rfusclient.exe rutserv.exe PID 2800 wrote to memory of 1904 2800 rfusclient.exe rutserv.exe PID 2800 wrote to memory of 1904 2800 rfusclient.exe rutserv.exe PID 2800 wrote to memory of 1904 2800 rfusclient.exe rutserv.exe PID 1092 wrote to memory of 1864 1092 rutserv.exe rfusclient.exe PID 1092 wrote to memory of 1864 1092 rutserv.exe rfusclient.exe PID 1092 wrote to memory of 1864 1092 rutserv.exe rfusclient.exe PID 1092 wrote to memory of 1864 1092 rutserv.exe rfusclient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b940cedb20098990864f8f0a60372f.exe"C:\Users\Admin\AppData\Local\Temp\79b940cedb20098990864f8f0a60372f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rfusclient.exe" -run_agent2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rutserv.exe" -run_agent3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rutserv.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rutserv.exe" -run_agent -second4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rfusclient.exe"C:\Users\Admin\AppData\Roaming\Remote Utilities Agent\70020\A6AFDD2C25\rfusclient.exe" /tray /user5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5e6b99144ea133a583f2964fdaa0c514a
SHA1a9ab6b4ad60bd60c798e9909be801dad725497de
SHA256b137e38facdd1cdfc9730856675f4b531366d7af54b605209cb2158a58deb1ef
SHA512a4f6e9663163e7a85251e129983251698b2c98070d2044f6402804d92779d77e477cb63c703b72a6ea20e19fc0d443a2a4f7fcf9d181a1e0ef0c0276297bf072
-
Filesize
266B
MD5051121e848c114030034adc7c9f9813a
SHA19dfabda7d6becd94dc11abc9996f0ed426f0c1dd
SHA2568a7a693df9ef61c266cb09845adc3ba6d32c0892d99657f58cf393a9ca595544
SHA5127da342df13f8c197445b2969a19c753a734a5b93790104767348e09649b8f0de8b7e8b7306468946624f8de8f36b4f4e6baacd069bed48699309766dd36e881e
-
Filesize
51KB
MD5ca8a4346b37cdd0220792885c5937b30
SHA1eef05f4b7fb5f8aabfb93d10a6451cc77b489864
SHA256ccd5b9e5947f956e880bd2285a6091dc9f1ee9b0eb8df627ec4e72b451a1c745
SHA512c286b0fa9d24a85fe63d3a3d801f135d12409736742c4fc16ba1dc15529df136577dc8975736146437dd56467576fdedb4ac50cf05ab054547504f3dc5ca0c35
-
Filesize
1.3MB
MD50d51927274281007657c7f3e0df7becb
SHA16de3746d9d0980f5715cec6c676a8eb53b5efc49
SHA256dfc847405be60c29e86e3e3222e7f63c1ff584727d87d3c35c25c4893e19fda0
SHA512eef74088a94635184192d82bb6dcc0758749cb290c8deeff211881e8a280aec73a53334eff8846df618204b0f318e757eab23e76951a472ba6e086905000d9a5
-
Filesize
55KB
MD5fbf729a506d9166147f979d638aa1c68
SHA12660732295ee5d0b8bd46e9130408378e011a441
SHA2561fa4850154d140e3d8b61503ee56e561b7ce150383c14394c7cecc52e984754e
SHA5127de13333243c48519ab9c89992407c0a7746d3987d816b40d0b6dbc6d49ad95762f6a9b604a187a6812bd5ae2687cc05355a436b8dcbb88c21bc29a6880f30b4
-
Filesize
11.2MB
MD543cc976800c506662c325478eb8bf9ea
SHA16d18795469c3a0ac6e4b8bb0024fffba51c45c60
SHA25641ea3c0b8421ebdea1eb6a508a38e120b1fbb38b9a2e1379deabc5a167a87408
SHA512396a97698a815316b1bd1b927f089c1d4934ea9fb8b31be72941e46030059978f98866cc19c5daf36722d5a768af007434c875de53b3f3ab9497b6a2bcd9dd54
-
Filesize
18.0MB
MD56c6ba57be4b7b2fb661a99fea872f6b8
SHA1aa95f1662a80e2c31fc24e60a9168b6df93c42e7
SHA256ce5ba1e5d70d95d52b89a1b8278ff8dd4d1e25c38c90ca202b43bdc014795d78
SHA51215d89d9b89bf585acef483212c3e0cd37ee5c680e03d5e4e9f6ae73e058e5ece0ff6e52df36f695a2aed20c5115e1b1ab6eb6afa580e7349d4871ad4c079c37f
-
Filesize
8KB
MD5bac2c2cbe5f718da265725e1a1e1457b
SHA1cc8423e679b1ab1c7e8e48faccbafddda36c0cca
SHA256150d5d4cfe8932b380ea774cddbb4a7938af0adca2b5ab259792e8237165e674
SHA512730400bfffcded0a15ba8b621075743679fcfbfa9ce84ff965219414260a7f8b9f660f6d0da057be884143a9f3667adaeeb6114144542854334e1f2e81d89057
-
Filesize
337KB
MD5197da919e4c91125656bf905877c9b5a
SHA19574ec3e87bb0f7acce72d4d59d176296741aa83
SHA256303c78aba3b776472c245f17020f9aa5a53f09a6f6c1e4f34b8e18e33906b5ee
SHA51233c1b853181f83cab2f57f47fb7e093badf83963613e7328ebd23f0d62f59416d7a93063c6237435fbb6833a69bc44ebbc13aa585da010f491c680b2ea335c47
-
Filesize
380KB
MD541acd8b6d9d80a61f2f686850e3d676a
SHA138428a08915cf72dd2eca25b3d87613d9aa027dd
SHA25636993fc3312ce757c8adeca3e5969e1fcc11d5b51b12c458ba8d54d73b64d4e7
SHA512d174638965ec781cbcb2927ceafb295c3176dc78da8938467faca3e512a42fe71a9dc1070f23e1c95f0b7c157fff3b00a8b572c39e4670713564f1310360ed23
-
Filesize
1.6MB
MD52ac39d6990170ca37a735f2f15f970e8
SHA18148a9cdc6b3fe6492281ebad79636433a6064ab
SHA2560961d83cb25e1a50d5c0ec2f9fb0d17f2504dae0b22a865f6e1ea8e987e1c6fa
SHA5127e30fde909d5f8efd6c2e40e125525697267273163ac35cf53561a2bd32e5dad8e4fba32905f53e422c9c73b8ad9a0c151f8d36042c5f156b50bf42dc21a9cee
-
Filesize
260KB
MD58a683f90a78778fba037565588a6f752
SHA1011939c1fa7b73272db340c32386a13e140adc6a
SHA256bd520007864b44e0bda7a466384d12c3c3f328326cf3549ba1853a58ccdbc99d
SHA5129280fbb121f8b94f57560d1be3bcfe5e7c308d54dac278f13ea6c00256444fb9f17f543dd0d32c9844460818c1a50d83b26ce51c79698e9ca7a304652a3f5ea9
-
Filesize
365KB
MD5c9d412c1d30abb9d61151a10371f4140
SHA187120faa6b859f5e23f7344f9547b2fc228af15b
SHA256f3465ce8a23db5e8228eed5a60a6f7a096d1a9adf3012c39bc6d81d4e57e8e9e
SHA5121c020afa89cdae55f4dcb80a455dc1b352f40455142f3947ed29c3e3d51fbd465b6e0ea16cd103186c252783a3f2a7f7c417e4df5727d9b2db511b650308face
-
Filesize
860KB
MD5a59f69797c42324540e26c7c7998c18c
SHA17f7bc5bc62a8744f87a7d2e30cc6dd74c72e19b4
SHA25683e1c1eb55bfd0f2d85d41c1e4dee65046b064ccb263ec7f412a5f329c75cfd1
SHA512837f244e6b70658974506ac35bd3ee2d413b89fe4b26e75f4a61cc7bec63e999c9c2cffb690ad567f74962bab13f2f5471300cd0e0cfe61bb1084072cb55c38b