Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-10-2021 14:58
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.win_rms_auto.7065.30182.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.win_rms_auto.7065.30182.exe
-
Size
5.7MB
-
MD5
21234287827ffaf9893ee26bb5904a1c
-
SHA1
4ce35b410b6a96f00ba57af75cc53a68f90dce3c
-
SHA256
22ecf75f81c4e67a889f0f89adee960deb071e289b84c4cb6002d744b08f2492
-
SHA512
2b045e24415958acf4ba33a4b5f986b17500189d6f5834c8bb73c0c7e86a52e14e4d8eb741ebb5dd61928f974f1e1a70469dfdfedd1dee2f76aa15a46b0d5ffb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 656 Lighsht.exe 908 Lighsht.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Lighsht.exe -
Loads dropped DLL 10 IoCs
pid Process 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 656 Lighsht.exe 656 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Lighsht.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" Lighsht.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 656 Lighsht.exe Token: SeDebugPrivilege 656 Lighsht.exe Token: SeTakeOwnershipPrivilege 908 Lighsht.exe Token: SeTcbPrivilege 908 Lighsht.exe Token: SeTcbPrivilege 908 Lighsht.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 656 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe 908 Lighsht.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 364 wrote to memory of 656 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 73 PID 364 wrote to memory of 656 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 73 PID 364 wrote to memory of 656 364 SecuriteInfo.com.win_rms_auto.7065.30182.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.win_rms_auto.7065.30182.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.win_rms_auto.7065.30182.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Public\Lightshot\Lighsht.exe"C:\Users\Public\Lightshot\Lighsht.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:656 -
C:\Users\Public\Lightshot\Lighsht.exeC:\Users\Public\Lightshot\Lighsht.exe -run_agent -second3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:908
-
-