Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 01:47
Static task
static1
Behavioral task
behavioral1
Sample
c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe
Resource
win10v2004-20220901-en
General
-
Target
c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe
-
Size
169KB
-
MD5
418d0256f14d3f9b015ec27212ce3780
-
SHA1
8fcc57804cfef696487ed168aeb1aaae979642b4
-
SHA256
c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289
-
SHA512
dec392c2a931258389f41b8f9d76256ef56a196f86491a6713360442dfa5f66118d8861066738849445e83c22e51944608ea5aaad0ef433bbc97b23ebd6ba97a
-
SSDEEP
3072:2mpoVuPJRNCcCn2W5Y/8hFJm9SMQ1Fdl1SVExPedn4TZJg8dbSjjyxbkjM9:oP7zE974FdEWwC3xbGM
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\800110\\repair.exe\"" repair.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" repair.exe -
Executes dropped EXE 2 IoCs
pid Process 4764 repair.exe 4112 repair.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Mechanic = "\"C:\\ProgramData\\800110\\repair.exe\"" repair.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\clientsvr.exe repair.exe File created C:\Windows\SysWOW64\clientsvr.exe repair.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5072 set thread context of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 4764 set thread context of 4112 4764 repair.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 4764 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4764 repair.exe 4764 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe 4112 repair.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe Token: SeDebugPrivilege 4764 repair.exe Token: SeDebugPrivilege 4112 repair.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4112 repair.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 5072 wrote to memory of 4524 5072 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 90 PID 4524 wrote to memory of 4764 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 91 PID 4524 wrote to memory of 4764 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 91 PID 4524 wrote to memory of 4764 4524 c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe 91 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4764 wrote to memory of 4112 4764 repair.exe 93 PID 4112 wrote to memory of 4524 4112 repair.exe 90 PID 4112 wrote to memory of 4524 4112 repair.exe 90 PID 4112 wrote to memory of 4524 4112 repair.exe 90 PID 4112 wrote to memory of 4524 4112 repair.exe 90 PID 4112 wrote to memory of 4524 4112 repair.exe 90 PID 4112 wrote to memory of 4764 4112 repair.exe 91 PID 4112 wrote to memory of 4764 4112 repair.exe 91 PID 4112 wrote to memory of 4764 4112 repair.exe 91 PID 4112 wrote to memory of 4764 4112 repair.exe 91 PID 4112 wrote to memory of 4764 4112 repair.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe"C:\Users\Admin\AppData\Local\Temp\c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe"C:\Users\Admin\AppData\Local\Temp\c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\ProgramData\800110\repair.exe"C:\ProgramData\800110\repair.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\ProgramData\800110\repair.exe"C:\ProgramData\800110\repair.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5418d0256f14d3f9b015ec27212ce3780
SHA18fcc57804cfef696487ed168aeb1aaae979642b4
SHA256c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289
SHA512dec392c2a931258389f41b8f9d76256ef56a196f86491a6713360442dfa5f66118d8861066738849445e83c22e51944608ea5aaad0ef433bbc97b23ebd6ba97a
-
Filesize
169KB
MD5418d0256f14d3f9b015ec27212ce3780
SHA18fcc57804cfef696487ed168aeb1aaae979642b4
SHA256c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289
SHA512dec392c2a931258389f41b8f9d76256ef56a196f86491a6713360442dfa5f66118d8861066738849445e83c22e51944608ea5aaad0ef433bbc97b23ebd6ba97a
-
Filesize
169KB
MD5418d0256f14d3f9b015ec27212ce3780
SHA18fcc57804cfef696487ed168aeb1aaae979642b4
SHA256c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289
SHA512dec392c2a931258389f41b8f9d76256ef56a196f86491a6713360442dfa5f66118d8861066738849445e83c22e51944608ea5aaad0ef433bbc97b23ebd6ba97a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\c56e4b72ee5cc4f5a777c877ceb598b0a2305b3992b51ad6004550ad27ac4289.exe.log
Filesize319B
MD591046f2e147049d3e53cd9bf9d4d95ed
SHA1228e347d062840b2edcbd16904475aacad414c62
SHA256ea92f8291b86440b98162409b1f9f04470455c22be01a1480ea5ebc37eb168dc
SHA512071a9c6e17760a726c3a4519cf8006f36f17f50946af0129e0e1f3e480f6b7fcc804a7614b044247f2420a8b2b46bec5b8493e4869bb918bc7c0f6aa1346c3e0