Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2022 16:26
Behavioral task
behavioral1
Sample
56464850801241284AE026A58BF65CF22D5B7F0800A10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56464850801241284AE026A58BF65CF22D5B7F0800A10.exe
Resource
win10v2004-20220812-en
General
-
Target
56464850801241284AE026A58BF65CF22D5B7F0800A10.exe
-
Size
108KB
-
MD5
018f06156f16a08a4689179458972941
-
SHA1
7215c5f8a21e715d932908aa4c640333afac5f1c
-
SHA256
56464850801241284ae026a58bf65cf22d5b7f0800a1058fc84cd6802cf3a7c9
-
SHA512
88e1b4c09311d58098815fd41e5c08f43b8884b1e5c659110c0cbb052df550abafb0cf24526c903e7fd9ca7c0a2abe19fdaf116c06d92a0ef41a0e8db2955fd5
-
SSDEEP
3072:4siUbw3GIz12qSfX10gzg8wZ29iFparpaaWruERzxaiEacrMtAs8UqDC4RaVRtmy:Jq3GIz12qSfX10gzg8wZ29iFparpaaWM
Malware Config
Extracted
limerat
38ZggxKrjJSn9XmS8sM1iTQhX3K6ny5u6E
-
aes_key
beodz
-
antivm
false
-
c2_url
https://pastebin.com/raw/nEZ87Pwx
-
delay
3
-
download_payload
false
-
install
true
-
install_name
svchost.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\MicrosoftData\
-
usb_spread
false
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 16 4720 WScript.exe 17 1532 WScript.exe 45 1532 WScript.exe 46 4720 WScript.exe 70 4720 WScript.exe 71 1532 WScript.exe 182 4720 WScript.exe 183 1532 WScript.exe 187 1532 WScript.exe 188 4720 WScript.exe 205 4720 WScript.exe 206 1532 WScript.exe 210 4720 WScript.exe 211 1532 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2288 svchost.exe 4908 svchost.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t.vbs WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\z.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\z.vbs WScript.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\z.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\t = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\t.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\t = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\t.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\z.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\z.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\z = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\z.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\t = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\t.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\t = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\t.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\software\microsoft\windows\currentversion\run WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 2420 4908 svchost.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3160 schtasks.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 4908 svchost.exe 2420 MSBuild.exe 2420 MSBuild.exe 4908 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4908 svchost.exe Token: SeDebugPrivilege 4908 svchost.exe Token: SeDebugPrivilege 2420 MSBuild.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2288 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 77 PID 1048 wrote to memory of 2288 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 77 PID 1048 wrote to memory of 2288 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 77 PID 1048 wrote to memory of 3812 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 78 PID 1048 wrote to memory of 3812 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 78 PID 1048 wrote to memory of 3700 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 79 PID 1048 wrote to memory of 3700 1048 56464850801241284AE026A58BF65CF22D5B7F0800A10.exe 79 PID 3812 wrote to memory of 1532 3812 WScript.exe 80 PID 3812 wrote to memory of 1532 3812 WScript.exe 80 PID 3700 wrote to memory of 4720 3700 WScript.exe 81 PID 3700 wrote to memory of 4720 3700 WScript.exe 81 PID 2288 wrote to memory of 3160 2288 svchost.exe 83 PID 2288 wrote to memory of 3160 2288 svchost.exe 83 PID 2288 wrote to memory of 3160 2288 svchost.exe 83 PID 2288 wrote to memory of 4908 2288 svchost.exe 87 PID 2288 wrote to memory of 4908 2288 svchost.exe 87 PID 2288 wrote to memory of 4908 2288 svchost.exe 87 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94 PID 4908 wrote to memory of 2420 4908 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\56464850801241284AE026A58BF65CF22D5B7F0800A10.exe"C:\Users\Admin\AppData\Local\Temp\56464850801241284AE026A58BF65CF22D5B7F0800A10.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\MicrosoftData\svchost.exe'"3⤵
- Creates scheduled task(s)
PID:3160
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftData\svchost.exe"C:\Users\Admin\AppData\Roaming\MicrosoftData\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" "C:\Users\Admin\AppData\Roaming\MicrosoftData\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\t.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\t.vbs"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1532
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\z.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\z.vbs"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4720
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5f1f6c2f5f157315eacc6fa592fde70c9
SHA1dcdcf3850e7c9b01fd353b06b3fbfaef7737601b
SHA25674743029cfecb65d3eaa59c287ab85376d17fc6e0dc3e6a6a7ad04bb448e3523
SHA51208861ff095da4a47649a90edb5700a989fd5603ea56e60db319295928a3351d5b97bed06ee4a184a18e8ea3642dc18a2dfd0f371292f87ce4c91fffdf20b5b4f
-
Filesize
47KB
MD5411c29da4ca50b15ae8432d23089ea6f
SHA1b8cee3ce1398129e4967e3098722ebb49576b5d7
SHA2568698a17d6a6c296fb7ce932cb86b9db610bd3056cf4183a273506829d71f86b2
SHA5127ba5dde15bb497fab59e2b993d7e9a2da84359f9af97297628d7163a4cd3e3a49d08136ad43f3af7dbacaeba6d874c76e09a7b6a0aad15f03caa70fc31972949
-
Filesize
28KB
MD510d4fb7e4295a4a518aa9355db980e5d
SHA11974f67c6fc402b1aa805b5bdf628b045349016b
SHA256e716064b119002efcbe4389cf49eb737be4ff37a515ab87dedb7ab834c975cf5
SHA512ee5106defd6b63b38ce10869c227c16fc07fe19bdd4a5255dff50155b6ab2d2861fb363b536c276fae597d796c87ed47b4834ecce60277c6c73b02b00c9e3d1c
-
Filesize
28KB
MD510d4fb7e4295a4a518aa9355db980e5d
SHA11974f67c6fc402b1aa805b5bdf628b045349016b
SHA256e716064b119002efcbe4389cf49eb737be4ff37a515ab87dedb7ab834c975cf5
SHA512ee5106defd6b63b38ce10869c227c16fc07fe19bdd4a5255dff50155b6ab2d2861fb363b536c276fae597d796c87ed47b4834ecce60277c6c73b02b00c9e3d1c
-
Filesize
15KB
MD5f1f6c2f5f157315eacc6fa592fde70c9
SHA1dcdcf3850e7c9b01fd353b06b3fbfaef7737601b
SHA25674743029cfecb65d3eaa59c287ab85376d17fc6e0dc3e6a6a7ad04bb448e3523
SHA51208861ff095da4a47649a90edb5700a989fd5603ea56e60db319295928a3351d5b97bed06ee4a184a18e8ea3642dc18a2dfd0f371292f87ce4c91fffdf20b5b4f
-
Filesize
47KB
MD5411c29da4ca50b15ae8432d23089ea6f
SHA1b8cee3ce1398129e4967e3098722ebb49576b5d7
SHA2568698a17d6a6c296fb7ce932cb86b9db610bd3056cf4183a273506829d71f86b2
SHA5127ba5dde15bb497fab59e2b993d7e9a2da84359f9af97297628d7163a4cd3e3a49d08136ad43f3af7dbacaeba6d874c76e09a7b6a0aad15f03caa70fc31972949
-
Filesize
28KB
MD510d4fb7e4295a4a518aa9355db980e5d
SHA11974f67c6fc402b1aa805b5bdf628b045349016b
SHA256e716064b119002efcbe4389cf49eb737be4ff37a515ab87dedb7ab834c975cf5
SHA512ee5106defd6b63b38ce10869c227c16fc07fe19bdd4a5255dff50155b6ab2d2861fb363b536c276fae597d796c87ed47b4834ecce60277c6c73b02b00c9e3d1c
-
Filesize
28KB
MD510d4fb7e4295a4a518aa9355db980e5d
SHA11974f67c6fc402b1aa805b5bdf628b045349016b
SHA256e716064b119002efcbe4389cf49eb737be4ff37a515ab87dedb7ab834c975cf5
SHA512ee5106defd6b63b38ce10869c227c16fc07fe19bdd4a5255dff50155b6ab2d2861fb363b536c276fae597d796c87ed47b4834ecce60277c6c73b02b00c9e3d1c
-
Filesize
15KB
MD5f1f6c2f5f157315eacc6fa592fde70c9
SHA1dcdcf3850e7c9b01fd353b06b3fbfaef7737601b
SHA25674743029cfecb65d3eaa59c287ab85376d17fc6e0dc3e6a6a7ad04bb448e3523
SHA51208861ff095da4a47649a90edb5700a989fd5603ea56e60db319295928a3351d5b97bed06ee4a184a18e8ea3642dc18a2dfd0f371292f87ce4c91fffdf20b5b4f
-
Filesize
47KB
MD5411c29da4ca50b15ae8432d23089ea6f
SHA1b8cee3ce1398129e4967e3098722ebb49576b5d7
SHA2568698a17d6a6c296fb7ce932cb86b9db610bd3056cf4183a273506829d71f86b2
SHA5127ba5dde15bb497fab59e2b993d7e9a2da84359f9af97297628d7163a4cd3e3a49d08136ad43f3af7dbacaeba6d874c76e09a7b6a0aad15f03caa70fc31972949