Analysis

  • max time kernel
    166s
  • max time network
    176s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 22:48

General

  • Target

    66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe

  • Size

    306KB

  • MD5

    6cdbe9944dc0f99bd89379b5bb715ddc

  • SHA1

    75cc7159ba568fb936354473c70c338e37f1a55c

  • SHA256

    66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f

  • SHA512

    fe42b09547596be9c621abb27b9c930046d2c56f7d9a924560f3c65142ca4ceaef3c0a110e2fa19bbb4c9e7a02e712edb49c4796dafa4dac23f9bf8c9cb1e6ed

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
    "C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
      "C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"
      2⤵
        PID:4092
      • C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe
        "C:\Users\Admin\AppData\Local\Temp\66fcf7b770ca9f62f18c4c30e3d4597b9ba86091d737abb4f83acfd31ed81f4f.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:3500
        • C:\ProgramData\395351\RezohSkypeToolV2.exe
          "C:\ProgramData\395351\RezohSkypeToolV2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4352
          • C:\ProgramData\395351\RezohSkypeToolV2.exe
            "C:\ProgramData\395351\RezohSkypeToolV2.exe"
            4⤵
            • Executes dropped EXE
            PID:4412
          • C:\ProgramData\395351\RezohSkypeToolV2.exe
            "C:\ProgramData\395351\RezohSkypeToolV2.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4408

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3500-119-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3500-121-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3500-124-0x00000000030E0000-0x00000000030E1000-memory.dmp

      Filesize

      4KB

    • memory/3500-135-0x0000000007110000-0x0000000007111000-memory.dmp

      Filesize

      4KB

    • memory/3544-118-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/4408-134-0x0000000002C20000-0x0000000002C21000-memory.dmp

      Filesize

      4KB