Analysis
-
max time kernel
164s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 10:16
Behavioral task
behavioral1
Sample
051a8439814976290735c9b8159ff602.exe
Resource
win7-20220812-en
General
-
Target
051a8439814976290735c9b8159ff602.exe
-
Size
29KB
-
MD5
051a8439814976290735c9b8159ff602
-
SHA1
f317839ee7d3fbd9aeeda61aee79787093b1368f
-
SHA256
1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
-
SHA512
739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
SSDEEP
384:OB+Sbj6NKgpi6h/AHHkQXOqDttYLmHvDKNrCeJE3WNgURSBe3Qua0U7Hb+8CDIQ5:EpgI6h/wHhtYLmP45NZyY/MHtgiij
Malware Config
Extracted
limerat
bc1q233hm2e03j09e5zy52zqzt0sh7temfq9h4t3cl
-
aes_key
T3rr1f13r
-
antivm
false
-
c2_url
https://pastebin.com/raw/BhUB9EXY
-
delay
3
-
download_payload
false
-
install
true
-
install_name
scvhost.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\scvhostLog\
-
usb_spread
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 scvhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 051a8439814976290735c9b8159ff602.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 220 scvhost.exe Token: SeDebugPrivilege 220 scvhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 376 wrote to memory of 2844 376 051a8439814976290735c9b8159ff602.exe 84 PID 376 wrote to memory of 2844 376 051a8439814976290735c9b8159ff602.exe 84 PID 376 wrote to memory of 2844 376 051a8439814976290735c9b8159ff602.exe 84 PID 376 wrote to memory of 220 376 051a8439814976290735c9b8159ff602.exe 86 PID 376 wrote to memory of 220 376 051a8439814976290735c9b8159ff602.exe 86 PID 376 wrote to memory of 220 376 051a8439814976290735c9b8159ff602.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\051a8439814976290735c9b8159ff602.exe"C:\Users\Admin\AppData\Local\Temp\051a8439814976290735c9b8159ff602.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\scvhostLog\scvhost.exe'"2⤵
- Creates scheduled task(s)
PID:2844
-
-
C:\Users\Admin\scvhostLog\scvhost.exe"C:\Users\Admin\scvhostLog\scvhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d