File name:

rfusclient.exe

Full analysis: https://app.any.run/tasks/b0bf3ab4-ea83-4aee-9322-d741bd9ba21d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: June 15, 2024, 16:32:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
rms
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

2EDAFB34EB63DAEE875FECC5B19246A2

SHA1:

2A43141312241BA7F3830242F6934A0E1203350D

SHA256:

CF49B75A2D687A2699A32F34BBEBCA1E5B65421CE0828C22E226DDA1E26DD28B

SSDEEP:

98304:adxDc2SnNTOqkroiwhew8NNSBg9fTFj/y85gaEiUe6TTuLX75hJoHtXAHN7U7ZEC:crw/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • rfusclient.exe (PID: 3996)
    • Drop RMS (RAT) executable file

      • rfusclient.exe (PID: 3996)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • rfusclient.exe (PID: 3996)
  • INFO

    • Checks supported languages

      • rfusclient.exe (PID: 3996)
    • Reads the computer name

      • rfusclient.exe (PID: 3996)
    • Process checks computer location settings

      • rfusclient.exe (PID: 3996)
    • Reads Environment values

      • rfusclient.exe (PID: 3996)
    • Reads Windows Product ID

      • rfusclient.exe (PID: 3996)
    • Reads product name

      • rfusclient.exe (PID: 3996)
    • Reads the machine GUID from the registry

      • rfusclient.exe (PID: 3996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:11:03 09:58:22+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 8449536
InitializedDataSize: 2292224
UninitializedDataSize: -
EntryPoint: 0x81086c
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 7.2.2.0
ProductVersionNumber: 7.2.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: TektonIT
FileDescription: RMS
FileVersion: 7.2.2.0
LegalCopyright: Copyright © 2023 TektonIT. Ter-Osipov Alex. All rights reserved.
LegalTrademarks: Remote Manipulator System, TektonIT
ProductName: Remote Manipulator System
ProductVersion: 7.2.2.0
ProgramID: ru.rmansys.rfusclient
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rfusclient.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3996"C:\Users\admin\AppData\Local\Temp\rfusclient.exe" C:\Users\admin\AppData\Local\Temp\rfusclient.exeexplorer.exe
User:
admin
Company:
TektonIT
Integrity Level:
MEDIUM
Description:
RMS
Exit code:
0
Version:
7.2.2.0
Modules
Images
c:\users\admin\appdata\local\temp\rfusclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
228
Read events
228
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info