Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2025 05:55

General

  • Target

    3237ff81fe1982520a0bb7675a156a419d3271971a024.exe

  • Size

    11.2MB

  • MD5

    f93499ce9eb23c0b97103eee80f0b0fe

  • SHA1

    97aaa325e3b606f786f87ec93e51ee2f6861c001

  • SHA256

    3237ff81fe1982520a0bb7675a156a419d3271971a024ae43b3e5aabaf10f6ef

  • SHA512

    4c63307cabf80070ad6b25262e51770e5a3e5cb25d171c6391fc7f10d03ee4c7e5363fc8d48ded7db06d374d97b8ee48ebf1716f3ec79019f2492dad5fac8398

  • SSDEEP

    196608:GoP6UE87qwv0Mne7D8wDBoJmcBhMAiExrcRsP/3rVmEBFdExO12Ib3:Goz7qwc/P8wDBo8cBSA1R3r0E6O4Ib3

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Rms family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3237ff81fe1982520a0bb7675a156a419d3271971a024.exe
    "C:\Users\Admin\AppData\Local\Temp\3237ff81fe1982520a0bb7675a156a419d3271971a024.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rfusclient.exe
      "C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rfusclient.exe" -run_agent
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rutserv.exe
        "C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rutserv.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1736
        • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rutserv.exe
          "C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rutserv.exe" -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rfusclient.exe
            "C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rfusclient.exe" /tray /user
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\EULA.rtf

    Filesize

    114KB

    MD5

    c3d7db3461db0dbb8a1d2a937b1d6252

    SHA1

    35fafe6c6812f20454c709b0a43a21bf7e9f66bf

    SHA256

    cf8e39ce145e36d672cb2a140b3f33e0a1337975d7840e1d6a1920ce560bba46

    SHA512

    9759895e5d4f289e6227f65f46b24ad7f2607443bebd9b039f1cf42bd74c986a597d5de4bef70510c4463874a01695ca2f7ccbd231d6ef5316250d7492c48675

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\English.lg

    Filesize

    58KB

    MD5

    246286feb0ed55eaf4251e256d2fe47e

    SHA1

    bc76b013918e4c1bd6dff44708a760496d8c717c

    SHA256

    64c70065830cc623be55c73a940aa3da57c134ee459afbd983ff17960dc57c27

    SHA512

    900e670259fb3b5762c0242236ce86fcdd04300407fc4d79959edfed99bbec58b4e10048a2b9ef54e709d00717870bf09c7b5fb2f5fa3cfe844682d2bb36f12f

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\Russian.lg

    Filesize

    64KB

    MD5

    ff01d823419a6c243257aedfba479030

    SHA1

    00d307827b42c4ca7180c52f2f79000bfc274cd3

    SHA256

    b4fb1ae9896834dae6f20a1d79ca07ce0d6096eff589e2b48f1a5464995e96c1

    SHA512

    768c5dc72ed3700795fc985f1ebe60906d738471b35aadfc542994d960ff3f4fe7d35b3ebd7134dc3e0e35d8e10ebec4c0f7a382c3741ef87de5783766ad7c6a

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\libeay32.dll

    Filesize

    1.3MB

    MD5

    4cb2e1b9294ddae1bf7dcaaf42b365d1

    SHA1

    a225f53a8403d9b73d77bcbb075194520cce5a14

    SHA256

    a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

    SHA512

    46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rfusclient.exe

    Filesize

    6.3MB

    MD5

    cc0e82ce66ebf0f5fd7fe222731aa7d6

    SHA1

    e8e33ff4e0c6768add1ebb8faee3ac86351a20c5

    SHA256

    d284ddda27eb89d873286e8d72e6613ee01c9c799d6532733a81c383143242ec

    SHA512

    374ac7a867a7f646570eea65198675ce946b54904dc8262f479009c2cf732ecb3fb20b3bfc61a80f4bda9bdda24d76c76423a345da33cc9c0206b33bb7013637

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\rutserv.exe

    Filesize

    12.5MB

    MD5

    c13556a6c7ea9539becff13e11c22586

    SHA1

    c4780408f3ea282d66ed1cfec12e3b4326e94664

    SHA256

    d811dd3978dc7ef94aaf7256c342a56c1b39627332a559d900c3ea4879fd0cbd

    SHA512

    90c883907cddb077bfa07119bdfcdd5bf40298bcdadf787d85e3ed7edd9473b5da7c256c403d79d9b4ec3396fba4183cd9270cabf74e1d94bb9759b8d48144a3

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\ssleay32.dll

    Filesize

    337KB

    MD5

    5c268ca919854fc22d85f916d102ee7f

    SHA1

    0957cf86e0334673eb45945985b5c033b412be0e

    SHA256

    1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

    SHA512

    76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\vp8decoder.dll

    Filesize

    380KB

    MD5

    1ea62293ac757a0c2b64e632f30db636

    SHA1

    8c8ac6f8f28f432a514c3a43ea50c90daf66bfba

    SHA256

    970cb3e00fa68daec266cd0aa6149d3604cb696853772f20ad67555a2114d5df

    SHA512

    857872a260cd590bd533b5d72e6e830bb0e4e037cb6749bb7d6e1239297f21606cdbe4a0fb1492cdead6f46c88dd9eb6fab5c6e17029f7df5231cefc21fa35ab

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\vp8encoder.dll

    Filesize

    1.6MB

    MD5

    89770647609ac26c1bbd9cf6ed50954e

    SHA1

    349eed120070bab7e96272697b39e786423ac1d3

    SHA256

    7b4fc8e104914cdd6a7bf3f05c0d7197cfcd30a741cc0856155f2c74e62005a4

    SHA512

    a98688f1c80ca79ee8d15d680a61420ffb49f55607fa25711925735d0e8dbc21f3b13d470f22e0829c72a66a798eee163411b2f078113ad8153eed98ef37a2cc

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\webmmux.dll

    Filesize

    260KB

    MD5

    d29f7070ee379544aeb19913621c88e6

    SHA1

    499dcdb39862fd8ff5cbc4b13da9c465bfd5f4be

    SHA256

    654f43108fbd56bd2a3c5a3a74a2ff3f19ea9e670613b92a624e86747a496caf

    SHA512

    4ead1c8e0d33f2a6c35163c42e8f0630954de67e63bcadca003691635ccf8bfe709363ec88edb387b956535fdb476bc0b5773ede5b19cacf4858fb50072bbef5

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\webmvorbisdecoder.dll

    Filesize

    365KB

    MD5

    7a9eeac3ceaf7f95f44eb5c57b4db2e3

    SHA1

    be1048c254aa3114358f76d08c55667c4bf2d382

    SHA256

    b497d07ed995b16d1146209158d3b90d85c47a643fbf25a5158b26d75c478c88

    SHA512

    b68fa132c3588637d62a1c2bce8f8acc78e6e2f904a53644d732dc0f4e4fbc61a2829a1ac8f6b97fe4be4f3613ef92c43e6f2ab29c6abd968acc5acd635c990d

  • C:\Users\Admin\AppData\Roaming\RMS Agent\69105\59A45275DC\webmvorbisencoder.dll

    Filesize

    860KB

    MD5

    5308b9945e348fbe3a480be06885434c

    SHA1

    5c3cb39686cca3e9586e4b405fc8e1853caaf8ff

    SHA256

    9dc30fb2118aad48f6a5e0a82504f365fe40abb3134f6cceeb65859f61ad939a

    SHA512

    4d7f08dc738a944bcee9b013b13d595e9c913b248c42a6c095cbdfc6059da7f04cca935841ff8a43687b75bdc5af05e888241e52ef594aa752ba9425cf966412

  • memory/1036-137-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-98-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-140-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-134-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-131-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-128-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-125-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-111-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-122-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-101-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-119-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-104-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-116-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1036-108-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/1736-83-0x0000000000400000-0x0000000001121000-memory.dmp

    Filesize

    13.1MB

  • memory/2060-112-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2060-109-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2060-117-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2060-106-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2060-102-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2060-99-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2108-77-0x0000000000400000-0x0000000000AD6000-memory.dmp

    Filesize

    6.8MB

  • memory/2108-70-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2816-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2816-69-0x0000000000400000-0x0000000001C3C000-memory.dmp

    Filesize

    24.2MB

  • memory/2816-63-0x0000000003FE0000-0x0000000003FF0000-memory.dmp

    Filesize

    64KB

  • memory/2816-0-0x0000000000400000-0x0000000001C3C000-memory.dmp

    Filesize

    24.2MB