Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe
Resource
win7-20240903-en
General
-
Target
5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe
-
Size
2.3MB
-
MD5
634b9b275dc6beaae17b4bdebcea8080
-
SHA1
45158df97c438217892133074f1ddbb10f119e30
-
SHA256
5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706
-
SHA512
824f2ac9a9776c7fafba819fc6c16b08decac478673b7cae422daf812581d6642bc7bd2a048eb37250d8b702dc6b12087509148d76f565adb5828e3037217281
-
SSDEEP
49152:pAI+jA+6K5XPE/KaP7B6enfDhiO9djGmYQIubnx7TlUVKodrK:pAI+M+6KFIpnf0CFY8bnxnVUrK
Malware Config
Signatures
-
Rms family
-
Executes dropped EXE 2 IoCs
pid Process 2812 rutserv.exe 2796 rfusclient.exe -
Loads dropped DLL 4 IoCs
pid Process 3048 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe 2812 rutserv.exe 2812 rutserv.exe 2796 rfusclient.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\liko\HookDrv.dll 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe File opened for modification C:\Windows\liko\rfusclient.exe 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe File opened for modification C:\Windows\liko\rutserv.exe 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe File opened for modification C:\Windows\liko\rversionlib.dll 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe File opened for modification C:\Windows\liko\key.reg 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 rutserv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2812 rutserv.exe Token: SeTcbPrivilege 2812 rutserv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2796 rfusclient.exe 2796 rfusclient.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2796 rfusclient.exe 2796 rfusclient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2812 3048 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe 30 PID 3048 wrote to memory of 2812 3048 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe 30 PID 3048 wrote to memory of 2812 3048 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe 30 PID 3048 wrote to memory of 2812 3048 5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe 30 PID 2812 wrote to memory of 2796 2812 rutserv.exe 31 PID 2812 wrote to memory of 2796 2812 rutserv.exe 31 PID 2812 wrote to memory of 2796 2812 rutserv.exe 31 PID 2812 wrote to memory of 2796 2812 rutserv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe"C:\Users\Admin\AppData\Local\Temp\5158d871a7011e31c681f26a98d2b4215037261563500117875e4540c66f8706N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\liko\rutserv.exe"C:\Windows\liko\rutserv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\liko\rfusclient.exeC:\Windows\liko\rfusclient.exe /tray /user3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5513066a38057079e232f5f99baef2b94
SHA1a6da9e87415b8918447ec361ba98703d12b4ee76
SHA25602dbea75e8dbcdfc12c6b92a6c08efad83d4ca742ed7aee393ab26cab0c58f9e
SHA51283a074bef57f78ede2488dd586b963b92837e17eea77ebd1464f3da06954ae8ca07f040089af0c257e2836611ae39424574bd365aea4a6318a2707e031cd31a5
-
Filesize
2.8MB
MD5a90c6e72a9e2602560c521a1647664ad
SHA122f7f0ddb0af04df7109c3ddbb7027909041fa73
SHA256579e5984ad5eb6e5e4b004acd01c95f609a1330f3900cd9851562eb4ac879197
SHA512fbba623cab28c0648e8bdd03c99df9e2a84180d72ea8e63367e943f8b432ebc36a7e10a8bfce11ad1803e54a8514f1ded4fec72e680ee04386965b5eb6a5d6c2
-
Filesize
3.2MB
MD562dbd11dc36780e35af1aafaa6a8f0f1
SHA1dc6aaac7171b351be3397c3e0e1769dffa848723
SHA256b06604ee55206b081a8378f771f3501f48df1c0023b1d6edcbc5f781aa521f57
SHA512b7f311286387ab39a0a54ac3dbcb74d9db3de4e2657dd6f0e182e38e9ed5400e87f1000c7b978fd4bb34fc373dd99bcb18271296f03248366a9cb52afdaa695d
-
Filesize
310KB
MD53f95a06f40eaf51b86cef2bf036ebd7a
SHA164009c5f79661eb2f82c9a76a843c0d3a856695d
SHA2561eb88258b18b215b44620326e35c90a8589f384710e7b2d61abf4f59203bd82d
SHA5126f28b5de28026319bed198f06b5461f688ca401129f1125e9e9d3b58956cc0d546234c2d202827bd74b99afd2ead958a863a520a1f4b7e599d385a8a67062897