Analysis
-
max time kernel
166s -
max time network
176s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 22:48
Static task
static1
Behavioral task
behavioral1
Sample
66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
Resource
win10-en-20211208
General
-
Target
66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
-
Size
306KB
-
MD5
6cdbe9944dc0f99bd89379b5bb715ddc
-
SHA1
75cc7159ba568fb936354473c70c338e37f1a55c
-
SHA256
66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f
-
SHA512
fe42b09547596be9c621abb27b9c930046d2c56f7d9a924560f3c65142ca4ceaef3c0a110e2fa19bbb4c9e7a02e712edb49c4796dafa4dac23f9bf8c9cb1e6ed
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\395351\\RezohSkypeToolV2.exe\"" RezohSkypeToolV2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" RezohSkypeToolV2.exe -
Executes dropped EXE 3 IoCs
pid Process 4352 RezohSkypeToolV2.exe 4412 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce RezohSkypeToolV2.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\RezohSkypeToolV2 = "\"C:\\ProgramData\\395351\\RezohSkypeToolV2.exe\"" RezohSkypeToolV2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe RezohSkypeToolV2.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe RezohSkypeToolV2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3544 set thread context of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 set thread context of 4092 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 68 PID 4352 set thread context of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 set thread context of 4412 4352 RezohSkypeToolV2.exe 72 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 4352 RezohSkypeToolV2.exe 4352 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe 4408 RezohSkypeToolV2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe Token: SeDebugPrivilege 4352 RezohSkypeToolV2.exe Token: SeDebugPrivilege 4408 RezohSkypeToolV2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 RezohSkypeToolV2.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4092 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 68 PID 3544 wrote to memory of 4092 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 68 PID 3544 wrote to memory of 4092 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 68 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3544 wrote to memory of 3500 3544 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 69 PID 3500 wrote to memory of 4352 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 71 PID 3500 wrote to memory of 4352 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 71 PID 3500 wrote to memory of 4352 3500 66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe 71 PID 4352 wrote to memory of 4412 4352 RezohSkypeToolV2.exe 72 PID 4352 wrote to memory of 4412 4352 RezohSkypeToolV2.exe 72 PID 4352 wrote to memory of 4412 4352 RezohSkypeToolV2.exe 72 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4352 wrote to memory of 4408 4352 RezohSkypeToolV2.exe 73 PID 4408 wrote to memory of 3500 4408 RezohSkypeToolV2.exe 69 PID 4408 wrote to memory of 3500 4408 RezohSkypeToolV2.exe 69 PID 4408 wrote to memory of 3500 4408 RezohSkypeToolV2.exe 69 PID 4408 wrote to memory of 3500 4408 RezohSkypeToolV2.exe 69 PID 4408 wrote to memory of 3500 4408 RezohSkypeToolV2.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"2⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\ProgramData\395351\RezohSkypeToolV2.exe"C:\ProgramData\395351\RezohSkypeToolV2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\ProgramData\395351\RezohSkypeToolV2.exe"C:\ProgramData\395351\RezohSkypeToolV2.exe"4⤵
- Executes dropped EXE
PID:4412
-
-
C:\ProgramData\395351\RezohSkypeToolV2.exe"C:\ProgramData\395351\RezohSkypeToolV2.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408
-
-
-