Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
12-10-2021 14:58
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.win_rms_auto.7065.30182.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.win_rms_auto.7065.30182.exe
-
Size
5.7MB
-
MD5
21234287827ffaf9893ee26bb5904a1c
-
SHA1
4ce35b410b6a96f00ba57af75cc53a68f90dce3c
-
SHA256
22ecf75f81c4e67a889f0f89adee960deb071e289b84c4cb6002d744b08f2492
-
SHA512
2b045e24415958acf4ba33a4b5f986b17500189d6f5834c8bb73c0c7e86a52e14e4d8eb741ebb5dd61928f974f1e1a70469dfdfedd1dee2f76aa15a46b0d5ffb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 800 Lighsht.exe 984 Lighsht.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Lighsht.exe -
Loads dropped DLL 9 IoCs
pid Process 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 800 Lighsht.exe 800 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 800 Lighsht.exe Token: SeDebugPrivilege 800 Lighsht.exe Token: SeTakeOwnershipPrivilege 984 Lighsht.exe Token: SeTcbPrivilege 984 Lighsht.exe Token: SeTcbPrivilege 984 Lighsht.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 800 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe 984 Lighsht.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 800 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 27 PID 1128 wrote to memory of 800 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 27 PID 1128 wrote to memory of 800 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 27 PID 1128 wrote to memory of 800 1128 SecuriteInfo.com.win_rms_auto.7065.30182.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.win_rms_auto.7065.30182.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.win_rms_auto.7065.30182.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Public\Lightshot\Lighsht.exe"C:\Users\Public\Lightshot\Lighsht.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Public\Lightshot\Lighsht.exeC:\Users\Public\Lightshot\Lighsht.exe -run_agent -second3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
-
-