Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 13:40
Static task
static1
Behavioral task
behavioral1
Sample
5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe
Resource
win10v2004-20220812-en
General
-
Target
5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe
-
Size
1.4MB
-
MD5
0f546e7eb4be1a79cd2e15f67cbe42b7
-
SHA1
bd706034409b6e6556920727c97e07eef28035f6
-
SHA256
5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338
-
SHA512
8f2ce5cf7285227590736e6ba2352b80c1bfcd49ba3f5c54e405c7a835c6ff5f75d2e57f4f6f31f87fb986227180d72a523aff62680815b1a2dcbb278e578f3d
-
SSDEEP
24576:ZRon1G/j+J1rUyv4iBImufwpH1RH17qhsaQO51HYrq/cHYIAmTXs0x/GphJq:Z8c/yHz/BfHRIUqcHBmb
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" sysmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\327462\\sysmon.exe\"" sysmon.exe -
Executes dropped EXE 2 IoCs
pid Process 5088 sysmon.exe 1504 sysmon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System Monitor = "\"C:\\ProgramData\\327462\\sysmon.exe\"" sysmon.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe File opened for modification C:\Windows\assembly\Desktop.ini 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe sysmon.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe sysmon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4468 set thread context of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 5088 set thread context of 1504 5088 sysmon.exe 85 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe File opened for modification C:\Windows\assembly 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe File created C:\Windows\assembly\Desktop.ini 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 5088 sysmon.exe 5088 sysmon.exe 5088 sysmon.exe 5088 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe 1504 sysmon.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe Token: SeDebugPrivilege 5088 sysmon.exe Token: SeDebugPrivilege 1504 sysmon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1504 sysmon.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4468 wrote to memory of 4872 4468 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 83 PID 4872 wrote to memory of 5088 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 84 PID 4872 wrote to memory of 5088 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 84 PID 4872 wrote to memory of 5088 4872 5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe 84 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 5088 wrote to memory of 1504 5088 sysmon.exe 85 PID 1504 wrote to memory of 4872 1504 sysmon.exe 83 PID 1504 wrote to memory of 4872 1504 sysmon.exe 83 PID 1504 wrote to memory of 4872 1504 sysmon.exe 83 PID 1504 wrote to memory of 4872 1504 sysmon.exe 83 PID 1504 wrote to memory of 4872 1504 sysmon.exe 83 PID 1504 wrote to memory of 5088 1504 sysmon.exe 84 PID 1504 wrote to memory of 5088 1504 sysmon.exe 84 PID 1504 wrote to memory of 5088 1504 sysmon.exe 84 PID 1504 wrote to memory of 5088 1504 sysmon.exe 84 PID 1504 wrote to memory of 5088 1504 sysmon.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe"C:\Users\Admin\AppData\Local\Temp\5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exeC:\Users\Admin\AppData\Local\Temp\5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\ProgramData\327462\sysmon.exe"C:\ProgramData\327462\sysmon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\ProgramData\327462\sysmon.exeC:\ProgramData\327462\sysmon.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50f546e7eb4be1a79cd2e15f67cbe42b7
SHA1bd706034409b6e6556920727c97e07eef28035f6
SHA2565176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338
SHA5128f2ce5cf7285227590736e6ba2352b80c1bfcd49ba3f5c54e405c7a835c6ff5f75d2e57f4f6f31f87fb986227180d72a523aff62680815b1a2dcbb278e578f3d
-
Filesize
1.4MB
MD50f546e7eb4be1a79cd2e15f67cbe42b7
SHA1bd706034409b6e6556920727c97e07eef28035f6
SHA2565176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338
SHA5128f2ce5cf7285227590736e6ba2352b80c1bfcd49ba3f5c54e405c7a835c6ff5f75d2e57f4f6f31f87fb986227180d72a523aff62680815b1a2dcbb278e578f3d
-
Filesize
1.4MB
MD50f546e7eb4be1a79cd2e15f67cbe42b7
SHA1bd706034409b6e6556920727c97e07eef28035f6
SHA2565176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338
SHA5128f2ce5cf7285227590736e6ba2352b80c1bfcd49ba3f5c54e405c7a835c6ff5f75d2e57f4f6f31f87fb986227180d72a523aff62680815b1a2dcbb278e578f3d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\5176d63c9ea432c992ba2cf7b50aa915d7c672af42bd237308654d2ce5c5a338.exe.log
Filesize319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479