Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 14:03
General
-
Target
1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe
-
Size
29KB
-
MD5
051a8439814976290735c9b8159ff602
-
SHA1
f317839ee7d3fbd9aeeda61aee79787093b1368f
-
SHA256
1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
-
SHA512
739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
SSDEEP
384:OB+Sbj6NKgpi6h/AHHkQXOqDttYLmHvDKNrCeJE3WNgURSBe3Qua0U7Hb+8CDIQ5:EpgI6h/wHhtYLmP45NZyY/MHtgiij
Malware Config
Extracted
limerat
bc1q233hm2e03j09e5zy52zqzt0sh7temfq9h4t3cl
-
aes_key
T3rr1f13r
-
antivm
false
-
c2_url
https://pastebin.com/raw/BhUB9EXY
-
delay
3
-
download_payload
false
-
install
true
-
install_name
scvhost.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\scvhostLog\
-
usb_spread
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 scvhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 268 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1784 scvhost.exe Token: SeDebugPrivilege 1784 scvhost.exe Token: 33 1108 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1108 AUDIODG.EXE Token: 33 1108 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1108 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 268 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 28 PID 1716 wrote to memory of 268 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 28 PID 1716 wrote to memory of 268 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 28 PID 1716 wrote to memory of 268 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 28 PID 1716 wrote to memory of 1784 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 30 PID 1716 wrote to memory of 1784 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 30 PID 1716 wrote to memory of 1784 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 30 PID 1716 wrote to memory of 1784 1716 1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe"C:\Users\Admin\AppData\Local\Temp\1ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\scvhostLog\scvhost.exe'"2⤵
- Creates scheduled task(s)
PID:268
-
-
C:\Users\Admin\scvhostLog\scvhost.exe"C:\Users\Admin\scvhostLog\scvhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1944
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d
-
Filesize
29KB
MD5051a8439814976290735c9b8159ff602
SHA1f317839ee7d3fbd9aeeda61aee79787093b1368f
SHA2561ac44eda1cc529647ffc10722a39e11da7c0cc9cff19b773a3af07f4baf7d664
SHA512739f7bc18816b45eec85e8955a8e64734cd12059b537ba57f66c78c0625b6bcea793d9fc39739684e4f2a666636b70c5dffb4d6712d536e86f73e2c89b42346d