Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-02-2021 07:18

General

  • Target

    a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe

  • Size

    313KB

  • MD5

    298b03aacf618a8010c3db5b420627ae

  • SHA1

    1668cfd05ca70d5acc1174c18d673c529fce402f

  • SHA256

    a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347

  • SHA512

    6bde1e09d0599c4bc2e9b91880499bc00dec4fe37b32348c66973522116e664fb197c562aaa1e3becdc425a85b01128f298d92cd6f9898c8c059c6c16d13fe45

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe
    "C:\Users\Admin\AppData\Local\Temp\a2e5e2051fda36150b9c28d797df1ba2917c0c5f4279419efa8902890748b347.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c echo.
      2⤵
        PID:3752
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c exec.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File ".\bits.ps1"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Users\Admin\AppData\Local\Temp\66306821\66306821.exe
            "C:\Users\Admin\AppData\Local\Temp\66306821\66306821.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3560
            • C:\ProgramData\336293\sysmon.exe
              "C:\ProgramData\336293\sysmon.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2324

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2324-20-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

      Filesize

      4KB

    • memory/3560-21-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

      Filesize

      4KB

    • memory/3560-16-0x0000000001100000-0x0000000001101000-memory.dmp

      Filesize

      4KB

    • memory/3948-7-0x000002934F710000-0x000002934F711000-memory.dmp

      Filesize

      4KB

    • memory/3948-12-0x000002934F746000-0x000002934F748000-memory.dmp

      Filesize

      8KB

    • memory/3948-11-0x000002934F743000-0x000002934F745000-memory.dmp

      Filesize

      8KB

    • memory/3948-10-0x000002934F740000-0x000002934F742000-memory.dmp

      Filesize

      8KB

    • memory/3948-8-0x0000029369C20000-0x0000029369C21000-memory.dmp

      Filesize

      4KB

    • memory/3948-6-0x00007FFB59970000-0x00007FFB5A35C000-memory.dmp

      Filesize

      9.9MB