Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 22:05
Static task
static1
Behavioral task
behavioral1
Sample
991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe
Resource
win10v2004-20220812-en
General
-
Target
991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe
-
Size
304KB
-
MD5
ec0e16a749b1bf804b7f52b5a1ea4180
-
SHA1
b7a7f1b85544b3d8b9aca5591a0067a2a9c28897
-
SHA256
991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49
-
SHA512
9299e0a60cfef3d1c235952cd81efd7ea150660a341e9b4dc389365c13d6c10078d27063fa584f3b44169b9aab3ca9fc03777af88633eb2ea3cb7f2357db2582
-
SSDEEP
6144:uyA0uOSNfMV8q2noNrw0uaoyF7CW0yWo339vcy06BB8Zi:7AnKVecw0Z7qyWAvcy06BB8Zi
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Mechanical = "\"C:\\ProgramData\\386658\\Poxer.exe\" -a /a" 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1104 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28 PID 1900 wrote to memory of 1104 1900 991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe"C:\Users\Admin\AppData\Local\Temp\991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe"C:\Users\Admin\AppData\Local\Temp\991be6e51fb27ce5b3951ba3eda85e46268c9e39c6034ca15500a2efc3f54f49.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1104
-