Analysis

  • max time kernel
    149s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:23

General

  • Target

    New PO 8003987747484873672020.exe

  • Size

    293KB

  • MD5

    7c1768b63f9baa0720999f746e56a3ec

  • SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

  • SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

  • SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

Malware Config

Signatures

  • Luminosity 2 IoCs

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New PO 8003987747484873672020.exe
    "C:\Users\Admin\AppData\Local\Temp\New PO 8003987747484873672020.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QFUlQILxU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp85C4.tmp"
      2⤵
      • Luminosity
      PID:1500
    • C:\Users\Admin\AppData\Local\Temp\New PO 8003987747484873672020.exe
      "C:\Users\Admin\AppData\Local\Temp\New PO 8003987747484873672020.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\ProgramData\230924\anibtcent.exe.exe
        "C:\ProgramData\230924\anibtcent.exe.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QFUlQILxU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFEF8.tmp"
          4⤵
          • Luminosity
          • Creates scheduled task(s)
          PID:1732
        • C:\ProgramData\230924\anibtcent.exe.exe
          "C:\ProgramData\230924\anibtcent.exe.exe"
          4⤵
          • Executes dropped EXE
          PID:960
        • C:\ProgramData\230924\anibtcent.exe.exe
          "C:\ProgramData\230924\anibtcent.exe.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          PID:812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\230924\anibtcent.exe.exe

    Filesize

    293KB

    MD5

    7c1768b63f9baa0720999f746e56a3ec

    SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

    SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

    SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

  • C:\ProgramData\230924\anibtcent.exe.exe

    Filesize

    293KB

    MD5

    7c1768b63f9baa0720999f746e56a3ec

    SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

    SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

    SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

  • C:\ProgramData\230924\anibtcent.exe.exe

    Filesize

    293KB

    MD5

    7c1768b63f9baa0720999f746e56a3ec

    SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

    SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

    SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

  • C:\ProgramData\230924\anibtcent.exe.exe

    Filesize

    293KB

    MD5

    7c1768b63f9baa0720999f746e56a3ec

    SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

    SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

    SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

  • C:\Users\Admin\AppData\Local\Temp\tmp85C4.tmp

    Filesize

    1KB

    MD5

    bf0f3184c53c07ba84d3069a72cf8591

    SHA1

    7a46e215570d0eddf267f4310fecb21faf8d0f1a

    SHA256

    d733c7fd3e2376cf124154de6114452406db1ef794a1e4d9b4f1cf67b150f840

    SHA512

    5d188431364ebec3ea4d50cdaf209c6fcb37c8d996983b444e9587616b8a1c72b619ebde429b322c655088a19bdc35ed919799a8b54a85e2cfb99fa585f49887

  • C:\Users\Admin\AppData\Local\Temp\tmpFEF8.tmp

    Filesize

    1KB

    MD5

    bf0f3184c53c07ba84d3069a72cf8591

    SHA1

    7a46e215570d0eddf267f4310fecb21faf8d0f1a

    SHA256

    d733c7fd3e2376cf124154de6114452406db1ef794a1e4d9b4f1cf67b150f840

    SHA512

    5d188431364ebec3ea4d50cdaf209c6fcb37c8d996983b444e9587616b8a1c72b619ebde429b322c655088a19bdc35ed919799a8b54a85e2cfb99fa585f49887

  • \ProgramData\230924\anibtcent.exe.exe

    Filesize

    293KB

    MD5

    7c1768b63f9baa0720999f746e56a3ec

    SHA1

    8bb578ad423522f6f7c54275ed8269601ee68bd7

    SHA256

    2db7aa7291c73bde092cd4cc8af0aff7eac7245ae5b034d8bb8810c76d85cd91

    SHA512

    aa40e474dfc97638f75ff9495b8766e546704d80828ecdfc98ea0d3ac01e3c22a4b131ecb22ccbd75bfe15906c259a3db215bbd0684bca2704eee590a5e17b21

  • memory/1312-76-0x0000000000010000-0x0000000000060000-memory.dmp

    Filesize

    320KB

  • memory/1400-61-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1400-65-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1400-68-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1400-70-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1400-63-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1400-60-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1800-54-0x0000000000AF0000-0x0000000000B40000-memory.dmp

    Filesize

    320KB

  • memory/1800-56-0x0000000000700000-0x0000000000746000-memory.dmp

    Filesize

    280KB

  • memory/1800-57-0x0000000074E91000-0x0000000074E93000-memory.dmp

    Filesize

    8KB

  • memory/1800-55-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB