Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 23:33
Static task
static1
Behavioral task
behavioral1
Sample
3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe
Resource
win10v2004-20220901-en
General
-
Target
3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe
-
Size
222KB
-
MD5
6a3bdf1d8367c7a0f89a57b5a5e59c50
-
SHA1
4c78f1c1ebecc5877fb60cebc99c26c04284c226
-
SHA256
3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130
-
SHA512
cd27703b64a41630c4b4189c4730a87c5ac4ba6fc79d55610dc77024c62986f7579770594bbfbbb4ac715fada73768c50de59348f3b7da41a418955b10a819c2
-
SSDEEP
3072:8U4f+fkjZt7fF0L2vMCDiu0Y8RxwLRMcR9aBeWvfxLWDwHeWJ2NJucbPvJ1nlYZC:81i+f3uBmLbR9JWJWmJYJuEvPr
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" Teamspeak Plugin.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\174592\\Teamspeak Plugin.exe\"" Teamspeak Plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 Teamspeak Plugin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Teamspeak Plugin = "\"C:\\ProgramData\\174592\\Teamspeak Plugin.exe\"" Teamspeak Plugin.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe Teamspeak Plugin.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe Teamspeak Plugin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe 1868 Teamspeak Plugin.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 Teamspeak Plugin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 Teamspeak Plugin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1868 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe 84 PID 5012 wrote to memory of 1868 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe 84 PID 5012 wrote to memory of 1868 5012 3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe 84 PID 1868 wrote to memory of 5012 1868 Teamspeak Plugin.exe 82 PID 1868 wrote to memory of 5012 1868 Teamspeak Plugin.exe 82 PID 1868 wrote to memory of 5012 1868 Teamspeak Plugin.exe 82 PID 1868 wrote to memory of 5012 1868 Teamspeak Plugin.exe 82 PID 1868 wrote to memory of 5012 1868 Teamspeak Plugin.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe"C:\Users\Admin\AppData\Local\Temp\3c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\ProgramData\174592\Teamspeak Plugin.exe"C:\ProgramData\174592\Teamspeak Plugin.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD56a3bdf1d8367c7a0f89a57b5a5e59c50
SHA14c78f1c1ebecc5877fb60cebc99c26c04284c226
SHA2563c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130
SHA512cd27703b64a41630c4b4189c4730a87c5ac4ba6fc79d55610dc77024c62986f7579770594bbfbbb4ac715fada73768c50de59348f3b7da41a418955b10a819c2
-
Filesize
222KB
MD56a3bdf1d8367c7a0f89a57b5a5e59c50
SHA14c78f1c1ebecc5877fb60cebc99c26c04284c226
SHA2563c25d30d67337013406e7155b35ee19fb646af4e46e437e940aae8c08d8ca130
SHA512cd27703b64a41630c4b4189c4730a87c5ac4ba6fc79d55610dc77024c62986f7579770594bbfbbb4ac715fada73768c50de59348f3b7da41a418955b10a819c2