Analysis
-
max time kernel
187s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-05-2022 21:52
Static task
static1
Behavioral task
behavioral1
Sample
9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe
Resource
win10v2004-20220414-en
General
-
Target
9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe
-
Size
912KB
-
MD5
002edac6795495e55779965de0f1d4ce
-
SHA1
c60b424c9600934cb004a1d2c3267d0b50c8c2af
-
SHA256
9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3
-
SHA512
ad41157ca93e544fba25bf17018d8db3353afdf63ac00ac2c1529bdd782502124ee3767c951680a7dfd68463f4d9b6071ac018fa077ad208a7430a9718f572e9
Malware Config
Signatures
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
pid Process 3400 schtasks.exe 4820 schtasks.exe 1956 schtasks.exe -
Executes dropped EXE 2 IoCs
pid Process 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4392 windefend.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Defender = "cmd /c \"start \"Defender\" \"C:\\Program Files (x86)\\WindowsDefender\\windefend.exe\"" REG.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 4392 windefend.exe 4392 windefend.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe Token: SeDebugPrivilege 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1192 wrote to memory of 4916 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe 81 PID 1192 wrote to memory of 4916 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe 81 PID 1192 wrote to memory of 4916 1192 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe 81 PID 4916 wrote to memory of 3400 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 84 PID 4916 wrote to memory of 3400 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 84 PID 4916 wrote to memory of 3400 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 84 PID 4916 wrote to memory of 4820 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 88 PID 4916 wrote to memory of 4820 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 88 PID 4916 wrote to memory of 4820 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 88 PID 4916 wrote to memory of 1956 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 93 PID 4916 wrote to memory of 1956 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 93 PID 4916 wrote to memory of 1956 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 93 PID 4916 wrote to memory of 3996 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 97 PID 4916 wrote to memory of 3996 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 97 PID 4916 wrote to memory of 3996 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 97 PID 4916 wrote to memory of 1192 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 80 PID 4916 wrote to memory of 1192 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 80 PID 4916 wrote to memory of 1192 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 80 PID 4916 wrote to memory of 1192 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 80 PID 4916 wrote to memory of 1192 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 80 PID 4916 wrote to memory of 4392 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 101 PID 4916 wrote to memory of 4392 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 101 PID 4916 wrote to memory of 4392 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 101 PID 4916 wrote to memory of 4392 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 101 PID 4916 wrote to memory of 4392 4916 9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe"C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0"C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Defender" /tr "'C:\Program Files (x86)\WindowsDefender\windefend.exe' /startup" /sc MINUTE /f /rl highest3⤵
- Luminosity
PID:3400
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Defender" /tr "'C:\Program Files (x86)\WindowsDefender\windefend.exe' /startup" /sc MINUTE /f /rl highest3⤵
- Luminosity
PID:4820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Defender" /tr "'C:\Program Files (x86)\WindowsDefender\windefend.exe' /startup" /sc MINUTE /f /rl highest3⤵
- Luminosity
- Creates scheduled task(s)
PID:1956
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Defender" /d "cmd /c """start """Defender""" """C:\Program Files (x86)\WindowsDefender\windefend.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:3996
-
-
-
C:\Program Files (x86)\WindowsDefender\windefend.exe"C:\Program Files (x86)\WindowsDefender\windefend.exe" /startup1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858KB
MD53e5fb382da9a26f323fc42d3250d7522
SHA1d41699c479f1e1a820c20c3629c1a28555b21d2e
SHA2561c50c8db063b3fb460615b12c915c646abdb9be8e50bd24bb52def2195d02fa4
SHA512cf8cf28684574ea6de7d1a8262aa9482c56bbde7651cb75641d04e654eb22d21fdebe33595b2a668de42dfea71af8adf354da39fd5e468f62b5f934cc28c99a7
-
C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0
Filesize858KB
MD53e5fb382da9a26f323fc42d3250d7522
SHA1d41699c479f1e1a820c20c3629c1a28555b21d2e
SHA2561c50c8db063b3fb460615b12c915c646abdb9be8e50bd24bb52def2195d02fa4
SHA512cf8cf28684574ea6de7d1a8262aa9482c56bbde7651cb75641d04e654eb22d21fdebe33595b2a668de42dfea71af8adf354da39fd5e468f62b5f934cc28c99a7
-
C:\Users\Admin\AppData\Local\Temp\9bcf9639d945c18a3d549e7cdcac8c9dc3ba4019bc4ecfd4741422757f83a4c3.exe0
Filesize858KB
MD53e5fb382da9a26f323fc42d3250d7522
SHA1d41699c479f1e1a820c20c3629c1a28555b21d2e
SHA2561c50c8db063b3fb460615b12c915c646abdb9be8e50bd24bb52def2195d02fa4
SHA512cf8cf28684574ea6de7d1a8262aa9482c56bbde7651cb75641d04e654eb22d21fdebe33595b2a668de42dfea71af8adf354da39fd5e468f62b5f934cc28c99a7