Malware Analysis Report

2024-11-16 13:10

Sample ID 220524-snj1raffe8
Target f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4
SHA256 f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4
Tags
limerat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4

Threat Level: Known bad

The file f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4 was found to be: Known bad.

Malicious Activity Summary

limerat rat

LimeRAT

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-24 15:16

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-24 15:16

Reported

2022-05-24 15:48

Platform

win7-20220414-en

Max time network

47s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-24 15:16

Reported

2022-05-24 15:48

Platform

win10v2004-20220414-en

Max time kernel

124s

Max time network

161s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4.exe"

Signatures

LimeRAT

rat limerat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4.exe N/A

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4.exe

"C:\Users\Admin\AppData\Local\Temp\f077a7bf5d0dbaaaaf15017e15a73f1c5ee26539ad4ed3ab36d6d8efa1449eb4.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\svchost.exe'"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

"C:\Users\Admin\AppData\Local\Temp\svchost.exe"

Network

Country Destination Domain Proto
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
US 20.42.73.26:443 tcp
GB 92.123.143.240:80 tcp
GB 92.123.143.240:80 tcp
GB 92.123.143.240:80 tcp
NL 178.79.208.1:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 51.104.136.2:443 tcp
N/A 162.159.36.2:53 udp
US 8.8.8.8:53 udp
N/A 52.242.101.226:443 tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 udp
N/A 162.159.36.2:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 87.248.202.1:80 tcp
US 8.8.8.8:53 pastebin.com udp
US 172.67.34.170:443 pastebin.com tcp
UA 93.77.123.32:27015 tcp

Files

memory/4208-130-0x0000000000080000-0x00000000000F4000-memory.dmp

memory/4208-131-0x0000000005140000-0x00000000056E4000-memory.dmp

memory/4208-132-0x0000000004B90000-0x0000000004C2C000-memory.dmp

memory/4208-133-0x00000000066F0000-0x0000000006756000-memory.dmp

memory/4208-134-0x0000000005090000-0x0000000005122000-memory.dmp

memory/1452-135-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\svchost.exe

memory/3820-136-0x0000000000000000-mapping.dmp