Analysis Overview
SHA256
1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e
Threat Level: Known bad
The file 1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e was found to be: Known bad.
Malicious Activity Summary
LimeRAT
Drops startup file
Obfuscated with Agile.Net obfuscator
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-06-04 10:13
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-06-04 10:13
Reported
2022-06-04 12:29
Platform
win7-20220414-en
Max time kernel
152s
Max time network
161s
Command Line
Signatures
LimeRAT
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1376 set thread context of 936 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe
"C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.34.170:443 | pastebin.com | tcp |
| US | 172.67.34.170:443 | pastebin.com | tcp |
Files
memory/1376-54-0x0000000001150000-0x00000000011BA000-memory.dmp
memory/1376-55-0x0000000000450000-0x0000000000458000-memory.dmp
memory/1376-56-0x00000000005A0000-0x00000000005E2000-memory.dmp
memory/1376-57-0x00000000005E0000-0x00000000005EC000-memory.dmp
memory/1376-58-0x0000000072430000-0x00000000737BF000-memory.dmp
memory/1376-59-0x0000000075361000-0x0000000075363000-memory.dmp
memory/1376-60-0x0000000073A20000-0x0000000074200000-memory.dmp
memory/1376-61-0x0000000000640000-0x0000000000643000-memory.dmp
memory/936-62-0x0000000000408CDE-mapping.dmp
memory/1376-63-0x0000000071A20000-0x0000000072430000-memory.dmp
memory/1376-64-0x0000000072430000-0x00000000737BF000-memory.dmp
memory/1376-66-0x0000000000660000-0x0000000000663000-memory.dmp
memory/936-67-0x0000000071100000-0x00000000716AB000-memory.dmp
memory/936-68-0x0000000073F80000-0x0000000074A78000-memory.dmp
memory/936-69-0x0000000073020000-0x00000000737BC000-memory.dmp
memory/936-70-0x0000000073D20000-0x0000000073EBB000-memory.dmp
memory/936-71-0x0000000073C10000-0x0000000073D14000-memory.dmp
memory/936-72-0x0000000072E90000-0x0000000073018000-memory.dmp
memory/936-73-0x00000000722B0000-0x0000000072E8E000-memory.dmp
memory/936-74-0x00000000721B0000-0x00000000722A1000-memory.dmp
memory/936-75-0x0000000071C70000-0x00000000721A6000-memory.dmp
memory/936-76-0x0000000071100000-0x00000000716AB000-memory.dmp
memory/936-77-0x0000000073F80000-0x0000000074A78000-memory.dmp
memory/936-79-0x0000000073D20000-0x0000000073EBB000-memory.dmp
memory/936-78-0x0000000073020000-0x00000000737BC000-memory.dmp
memory/936-80-0x0000000073C10000-0x0000000073D14000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-06-04 10:13
Reported
2022-06-04 12:29
Platform
win10v2004-20220414-en
Max time kernel
150s
Max time network
154s
Command Line
Signatures
LimeRAT
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2584 set thread context of 3656 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2584 wrote to memory of 3656 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
| PID 2584 wrote to memory of 3656 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
| PID 2584 wrote to memory of 3656 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
| PID 2584 wrote to memory of 3656 | N/A | C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe
"C:\Users\Admin\AppData\Local\Temp\1108da2e0cb957a6848e5cf398c00ea523cfdd6c41a9d95e4855265e7c88df8e.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 20.190.160.73:443 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.34.170:443 | pastebin.com | tcp |
| NL | 20.190.160.67:443 | tcp | |
| NL | 104.97.14.81:80 | tcp | |
| US | 104.20.68.143:443 | pastebin.com | tcp |
| NL | 20.50.201.200:443 | tcp | |
| IE | 20.54.110.249:443 | tcp | |
| NL | 20.190.160.73:443 | tcp | |
| NL | 20.190.160.2:443 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| US | 104.20.67.143:443 | pastebin.com | tcp |
| NL | 20.190.160.67:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| IE | 20.54.89.15:443 | tcp | |
| NL | 20.190.160.67:443 | tcp | |
| US | 172.67.34.170:443 | pastebin.com | tcp |
| NL | 20.190.160.2:443 | tcp | |
| US | 8.8.8.8:53 | 151.122.125.40.in-addr.arpa | udp |
| NL | 20.190.160.2:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| NL | 20.190.160.6:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| US | 8.8.8.8:53 | storesdk.dsx.mp.microsoft.com | udp |
| FR | 2.18.109.224:443 | storesdk.dsx.mp.microsoft.com | tcp |
Files
memory/2584-130-0x00000000000D0000-0x000000000013A000-memory.dmp
memory/2584-131-0x0000000002380000-0x0000000002420000-memory.dmp
memory/3656-132-0x0000000000000000-mapping.dmp
memory/2584-133-0x0000000002380000-0x00000000023DF000-memory.dmp
memory/3656-134-0x0000000075540000-0x0000000075AF1000-memory.dmp
memory/3656-135-0x0000000074340000-0x0000000074E40000-memory.dmp
memory/3656-136-0x0000000073A50000-0x00000000741F8000-memory.dmp
memory/3656-137-0x0000000074340000-0x0000000074E40000-memory.dmp
memory/3656-138-0x0000000075540000-0x0000000075AF1000-memory.dmp
memory/3656-139-0x0000000073A50000-0x00000000741F8000-memory.dmp