Analysis

  • max time kernel
    150s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-02-2021 07:18

General

  • Target

    a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe

  • Size

    313KB

  • MD5

    298b03aacf618a8010c3db5b420627ae

  • SHA1

    1668cfd05ca70d5acc1174c18d673c529fce402f

  • SHA256

    a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347

  • SHA512

    6bde1e09d0599c4bc2e9b91880499bc00dec4fe37b32348c66973522116e664fb197c562aaa1e3becdc425a85b01128f298d92cd6f9898c8c059c6c16d13fe45

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe
    "C:\Users\Admin\AppData\Local\Temp\a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\system32\cmd.exe
      cmd.exe /c echo.
      2⤵
        PID:1340
      • C:\Windows\system32\cmd.exe
        cmd.exe /c exec.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File ".\bits.ps1"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Users\Admin\AppData\Local\Temp\319030789\319030789.exe
            "C:\Users\Admin\AppData\Local\Temp\319030789\319030789.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:556
            • C:\ProgramData\848868\sysmon.exe
              "C:\ProgramData\848868\sysmon.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1548

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/556-31-0x0000000004380000-0x0000000004381000-memory.dmp

      Filesize

      4KB

    • memory/556-30-0x0000000004370000-0x0000000004371000-memory.dmp

      Filesize

      4KB

    • memory/556-21-0x00000000750C1000-0x00000000750C3000-memory.dmp

      Filesize

      8KB

    • memory/556-22-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/1548-29-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/1932-2-0x000007FEFB541000-0x000007FEFB543000-memory.dmp

      Filesize

      8KB

    • memory/1984-10-0x000000001ACC0000-0x000000001ACC1000-memory.dmp

      Filesize

      4KB

    • memory/1984-17-0x000000001B570000-0x000000001B571000-memory.dmp

      Filesize

      4KB

    • memory/1984-16-0x000000001C380000-0x000000001C381000-memory.dmp

      Filesize

      4KB

    • memory/1984-13-0x000000001AC40000-0x000000001AC42000-memory.dmp

      Filesize

      8KB

    • memory/1984-14-0x000000001AC44000-0x000000001AC46000-memory.dmp

      Filesize

      8KB

    • memory/1984-12-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

      Filesize

      4KB

    • memory/1984-11-0x00000000022A0000-0x00000000022A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-9-0x0000000002600000-0x0000000002601000-memory.dmp

      Filesize

      4KB

    • memory/1984-8-0x000007FEF5070000-0x000007FEF5A5C000-memory.dmp

      Filesize

      9.9MB