Analysis
-
max time kernel
152s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 18:21
Static task
static1
Behavioral task
behavioral1
Sample
9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
Resource
win10v2004-20220812-en
General
-
Target
9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
-
Size
262KB
-
MD5
703f1774ed636ad75e5897045bcedab0
-
SHA1
97ad9984b52f8139ca7a3354588eceb7978a6300
-
SHA256
9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
-
SHA512
fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
SSDEEP
6144:o+YzmJfY2vscKGmXlVC4ckkRGRUt53nONnx6:o+emJA2LKGmXHRilnOh
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\144855\\helper.exe\"" helper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" helper.exe -
Executes dropped EXE 3 IoCs
pid Process 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 796 helper.exe 1380 helper.exe -
Deletes itself 1 IoCs
pid Process 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe -
Loads dropped DLL 4 IoCs
pid Process 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 796 helper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Computer Helper = "\"C:\\ProgramData\\144855\\helper.exe\"" helper.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe helper.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe helper.exe File created C:\Windows\SysWOW64\clientsvr.exe\:ZONE.identifier:$DATA helper.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 796 set thread context of 1380 796 helper.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe:ZONE.identifier cmd.exe File created C:\ProgramData\144855\helper.exe:ZONE.identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1380 helper.exe 1380 helper.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1380 helper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 helper.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1908 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 28 PID 1736 wrote to memory of 1908 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 28 PID 1736 wrote to memory of 1908 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 28 PID 1736 wrote to memory of 1908 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 28 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 1736 wrote to memory of 624 1736 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 30 PID 624 wrote to memory of 796 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 32 PID 624 wrote to memory of 796 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 32 PID 624 wrote to memory of 796 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 32 PID 624 wrote to memory of 796 624 9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe 32 PID 796 wrote to memory of 1980 796 helper.exe 33 PID 796 wrote to memory of 1980 796 helper.exe 33 PID 796 wrote to memory of 1980 796 helper.exe 33 PID 796 wrote to memory of 1980 796 helper.exe 33 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35 PID 796 wrote to memory of 1380 796 helper.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe"C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe":ZONE.identifier & exit2⤵
- NTFS ADS
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe"C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:624 -
C:\ProgramData\144855\helper.exe"C:\ProgramData\144855\helper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\ProgramData\144855\helper.exe":ZONE.identifier & exit4⤵
- NTFS ADS
PID:1980
-
-
C:\ProgramData\144855\helper.exe"C:\ProgramData\144855\helper.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
Filesize262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
C:\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
Filesize262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
Filesize
262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a
-
\Users\Admin\AppData\Local\Temp\9b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119.exe
Filesize262KB
MD5703f1774ed636ad75e5897045bcedab0
SHA197ad9984b52f8139ca7a3354588eceb7978a6300
SHA2569b3026aba4a24f1103eeb402b55d42bf7e915cfae48a7141293d8fff97184119
SHA512fc43ec401257fc9d7f192b97cc0960dd86005a1392e6d0960da2833cf3c0ce0322d54284c12e34d2d11afe8fa5ed75f455ba059a424d5cfa3a68e2fb8354062a