Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe
Resource
win7-20250207-en
General
-
Target
467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe
-
Size
4.4MB
-
MD5
78fe208105d90f83f43a0c07c6210541
-
SHA1
8ad19f227cf5e2e9f4ff6ef2a98735b43f328dd3
-
SHA256
467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672
-
SHA512
dfaaacfa3a4c7ecca4581d24ec2a2ba6fbbd0218ff27c30f273b3cdc8a0cfc369d39b13e2e662ae3b36613765c844908e839c2f33a476ad4964e468ce8c08849
-
SSDEEP
98304:/4S1Gym+c3UILv5sUuGkz3RQ8Ke+OLFvMXhIHpxfs7:/4mG+ILvsGk9Q8tR9MXhy/s7
Malware Config
Signatures
-
Rms family
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000024278-72.dat acprotect behavioral2/files/0x0007000000024277-71.dat acprotect -
resource yara_rule behavioral2/files/0x0007000000024276-39.dat aspack_v212_v242 behavioral2/files/0x0007000000024275-73.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation HavijCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation RMS.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 9 IoCs
pid Process 1508 HavijCracked.exe 2656 RMS.exe 5548 rutserv.exe 1408 rutserv.exe 4088 rutserv.exe 5476 rutserv.exe 5412 rfusclient.exe 3988 rfusclient.exe 3016 rfusclient.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exe RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exe RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\install.vbs RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\regedit.reg RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\__tmp_rar_sfx_access_check_240609578 RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\install.bat RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\install.bat RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\regedit.reg RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\vp8decoder.dll RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\vp8encoder.dll RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exe RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exe RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog\vp8decoder.dll RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\vp8encoder.dll RMS.exe File created C:\Windows\SysWOW64\SysFilesCatalog\install.vbs RMS.exe File opened for modification C:\Windows\SysWOW64\SysFilesCatalog RMS.exe -
resource yara_rule behavioral2/files/0x0007000000024278-72.dat upx behavioral2/files/0x0007000000024277-71.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HavijCracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1356 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 3236 taskkill.exe 5796 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings RMS.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1472 regedit.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5548 rutserv.exe 5548 rutserv.exe 5548 rutserv.exe 5548 rutserv.exe 5548 rutserv.exe 5548 rutserv.exe 1408 rutserv.exe 1408 rutserv.exe 4088 rutserv.exe 4088 rutserv.exe 5476 rutserv.exe 5476 rutserv.exe 5476 rutserv.exe 5476 rutserv.exe 5476 rutserv.exe 5476 rutserv.exe 5412 rfusclient.exe 5412 rfusclient.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 3016 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3236 taskkill.exe Token: SeDebugPrivilege 5796 taskkill.exe Token: SeDebugPrivilege 5548 rutserv.exe Token: SeDebugPrivilege 4088 rutserv.exe Token: SeTakeOwnershipPrivilege 5476 rutserv.exe Token: SeTcbPrivilege 5476 rutserv.exe Token: SeTcbPrivilege 5476 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5548 rutserv.exe 1408 rutserv.exe 4088 rutserv.exe 5476 rutserv.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 460 wrote to memory of 3660 460 467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe 88 PID 460 wrote to memory of 3660 460 467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe 88 PID 460 wrote to memory of 3660 460 467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe 88 PID 3660 wrote to memory of 1508 3660 cmd.exe 91 PID 3660 wrote to memory of 1508 3660 cmd.exe 91 PID 3660 wrote to memory of 1508 3660 cmd.exe 91 PID 1508 wrote to memory of 3680 1508 HavijCracked.exe 93 PID 1508 wrote to memory of 3680 1508 HavijCracked.exe 93 PID 1508 wrote to memory of 3680 1508 HavijCracked.exe 93 PID 3680 wrote to memory of 2656 3680 cmd.exe 95 PID 3680 wrote to memory of 2656 3680 cmd.exe 95 PID 3680 wrote to memory of 2656 3680 cmd.exe 95 PID 2656 wrote to memory of 3476 2656 RMS.exe 96 PID 2656 wrote to memory of 3476 2656 RMS.exe 96 PID 2656 wrote to memory of 3476 2656 RMS.exe 96 PID 3476 wrote to memory of 3508 3476 WScript.exe 97 PID 3476 wrote to memory of 3508 3476 WScript.exe 97 PID 3476 wrote to memory of 3508 3476 WScript.exe 97 PID 3508 wrote to memory of 3236 3508 cmd.exe 99 PID 3508 wrote to memory of 3236 3508 cmd.exe 99 PID 3508 wrote to memory of 3236 3508 cmd.exe 99 PID 3508 wrote to memory of 5796 3508 cmd.exe 103 PID 3508 wrote to memory of 5796 3508 cmd.exe 103 PID 3508 wrote to memory of 5796 3508 cmd.exe 103 PID 3508 wrote to memory of 880 3508 cmd.exe 104 PID 3508 wrote to memory of 880 3508 cmd.exe 104 PID 3508 wrote to memory of 880 3508 cmd.exe 104 PID 3508 wrote to memory of 1472 3508 cmd.exe 105 PID 3508 wrote to memory of 1472 3508 cmd.exe 105 PID 3508 wrote to memory of 1472 3508 cmd.exe 105 PID 3508 wrote to memory of 1356 3508 cmd.exe 106 PID 3508 wrote to memory of 1356 3508 cmd.exe 106 PID 3508 wrote to memory of 1356 3508 cmd.exe 106 PID 3508 wrote to memory of 5548 3508 cmd.exe 108 PID 3508 wrote to memory of 5548 3508 cmd.exe 108 PID 3508 wrote to memory of 5548 3508 cmd.exe 108 PID 3508 wrote to memory of 1408 3508 cmd.exe 109 PID 3508 wrote to memory of 1408 3508 cmd.exe 109 PID 3508 wrote to memory of 1408 3508 cmd.exe 109 PID 3508 wrote to memory of 4088 3508 cmd.exe 110 PID 3508 wrote to memory of 4088 3508 cmd.exe 110 PID 3508 wrote to memory of 4088 3508 cmd.exe 110 PID 5476 wrote to memory of 5412 5476 rutserv.exe 112 PID 5476 wrote to memory of 5412 5476 rutserv.exe 112 PID 5476 wrote to memory of 5412 5476 rutserv.exe 112 PID 5476 wrote to memory of 3988 5476 rutserv.exe 113 PID 5476 wrote to memory of 3988 5476 rutserv.exe 113 PID 5476 wrote to memory of 3988 5476 rutserv.exe 113 PID 5412 wrote to memory of 3016 5412 rfusclient.exe 117 PID 5412 wrote to memory of 3016 5412 rfusclient.exe 117 PID 5412 wrote to memory of 3016 5412 rfusclient.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe"C:\Users\Admin\AppData\Local\Temp\467389d955368445c1c749556e894f918d193637df00f175c715ed2c9b5c2672.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HavijCracked.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\HavijCracked.exeHavijCracked.exe /p12343⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RMS.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\RMS.exeRMS.exe /p12345⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\SysFilesCatalog\install.vbs"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\SysFilesCatalog\install.bat" "7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f8⤵
- System Location Discovery: System Language Discovery
PID:880
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"8⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1356
-
-
C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exerutserv.exe /silentinstall8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5548
-
-
C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exerutserv.exe /firewall8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exerutserv.exe /start8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\SysFilesCatalog\rutserv.exeC:\Windows\SysWOW64\SysFilesCatalog\rutserv.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exeC:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exeC:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exe /tray3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:3016
-
-
-
C:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exeC:\Windows\SysWOW64\SysFilesCatalog\rfusclient.exe /tray2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5ea5fb7bef8049dd1b276215ac72ba860
SHA1fb0beaf4a9a78e3a596acbac069a99b3adbec602
SHA2566ce14adee0448d4f7f1cf001a45ea1dcfa7c9b9cd0a8a795eeb8b9eee2942813
SHA5122c248ec97d5d150a0a048c43b9dd9532527f7098beaeada9e016dbe4c7e54c1867afcb84d42a005198a1a89c37299d4947f9950bb6df1ba0d79cfab68474252d
-
Filesize
4.2MB
MD521a8be33fb31bd8f4d58b6943f12719c
SHA1411146e9bc09188466051a090348172d6df8a64a
SHA256d5eaa74b76a85c556aa41b7520a2380fb71886950c87be0e227ee23ca4c4a577
SHA5128ddef36e2fe5a93a796a9ae7481ba4b1dfb4644619da2b08f31b221af59541693eb4f6a937390bfe8ef16b6c27c455416b57493ead8430715e8b89ca3a38db4c
-
Filesize
31B
MD53fdb252bee147ef14aa44035b4b6208b
SHA1c13b54b0c29167afac2ace60a47d1b12254476fc
SHA25677e5b000bf7b78f8d5bf81dbd9df8b2c98baebaaf94d218471d680179a131182
SHA5126078de6e59b6ee396b51f24fe625a208c60f544c89d4d2d361e52286ae224a803cfbdb7d8bbef94ff2c717ef8df6113d0b69324752c2d3d2ae932faabd4aab92
-
Filesize
4.1MB
MD56682674116a76c8f9a118782d2e0b334
SHA1b243152e66a1a2b0792bb52b6bb6f053360cc734
SHA25661bf61a4e46b2799e2c7ec674feb5638717883b4df8b823ad25e22b36ffef6a1
SHA512c2c093a192dd80aa447df40a810623e0d8c5f186f98cdeb4ceb3380c321991432f8bef0bcf54a3f59768f2265f0b2e2315eb137aa42dd4025cfb80223a7b635d
-
Filesize
480B
MD599db27d776e103cad354b531ee1f20b9
SHA10b82d146df8528f66d1d14756f211fd3a8b1b91a
SHA256240020a1a1941d1455135b5cb134e502a13b148be16cbb1552482aa03c29f8f3
SHA512bc2ed33495c0a752397b2f1b9b7ba65f94ea5be82dde74c618342c83b68f1b92a4783b672cd427843533799e1af0875e0fd000b12236852e9e2fa93005d7ac69
-
Filesize
117B
MD565fc32766a238ff3e95984e325357dbb
SHA13ac16a2648410be8aa75f3e2817fbf69bb0e8922
SHA256a7b067e9e4d44efe579c7cdb1e847d61af2323d3d73c6fffb22e178ae476f420
SHA512621e81fc2d0f9dd92413481864638a140bee94c7dbd31f944826b21bd6ad6b8a59e63de9f7f0025cffc0efb7f9975dde77f523510ee23ada62c152a63a22f608
-
Filesize
12KB
MD53d0cb95fd41272e7ac77b510b6bad639
SHA1eba5e783fd1b00bb51939ffdfc4831693bb29298
SHA256692960329d595a028149698f6ef762f33df9f21e1e9efb64910686c853231a1a
SHA512588f595c79f420db55e472bcf257d0c5d6ab0abcaff19a48a8234c434ad27a7a88308606710caf07eb19fa8b0c95807872ca42d8efa326278810110b6f3aaaad
-
Filesize
1.5MB
MD5b8667a1e84567fcf7821bcefb6a444af
SHA19c1f91fe77ad357c8f81205d65c9067a270d61f0
SHA256dc9d875e659421a51addd8e8a362c926369e84320ab0c5d8bbb1e4d12d372fc9
SHA512ec6af663a3b41719d684f04504746f91196105ef6f8baa013b4bd02df6684eca49049d5517691f8e3a4ba6351fe35545a27f728b1d29d949e950d574a012f852
-
Filesize
1.7MB
MD537a8802017a212bb7f5255abc7857969
SHA1cb10c0d343c54538d12db8ed664d0a1fa35b6109
SHA2561699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6
SHA5124e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0
-
Filesize
155KB
MD588318158527985702f61d169434a4940
SHA13cc751ba256b5727eb0713aad6f554ff1e7bca57
SHA2564c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74
SHA5125d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff
-
Filesize
593KB
MD56298c0af3d1d563834a218a9cc9f54bd
SHA10185cd591e454ed072e5a5077b25c612f6849dc9
SHA25681af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172
SHA512389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe