Analysis
-
max time kernel
180s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe
Resource
win7-20221111-en
General
-
Target
5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe
-
Size
240KB
-
MD5
eac5ebfd214de0cf3a5459b647a7b2d5
-
SHA1
52f62f6d725049d191f453328cdae3f1f7334ee6
-
SHA256
5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b
-
SHA512
3e2978f6df4b3f0251dee2a7e9939fce2344e0af1c02810c7fcd1d31b5484fd2b2dd7203eef87ab8d2f2d8e55a9d9549252c256680c17f866f0f5af7c12f602e
-
SSDEEP
3072:Ou9DMR90Afc/Fnzwm/I/1WNWnhXEi2/oLaiTnYL83ejgu3nypr/7RBk4adLCorxt:VW9lfKzGSJiDPAF1ERO7Lk
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/p8Be8nNX
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Windows Update.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\Windows\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1668 Windows Update.exe 380 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4152 set thread context of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 1668 set thread context of 380 1668 Windows Update.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3308 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 380 Windows Update.exe Token: SeDebugPrivilege 380 Windows Update.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 4152 wrote to memory of 736 4152 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 84 PID 736 wrote to memory of 3308 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 90 PID 736 wrote to memory of 3308 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 90 PID 736 wrote to memory of 3308 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 90 PID 736 wrote to memory of 1668 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 93 PID 736 wrote to memory of 1668 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 93 PID 736 wrote to memory of 1668 736 5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe 93 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94 PID 1668 wrote to memory of 380 1668 Windows Update.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe"C:\Users\Admin\AppData\Local\Temp\5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe"C:\Users\Admin\AppData\Local\Temp\5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\Windows\Windows Update.exe'"3⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
240KB
MD5eac5ebfd214de0cf3a5459b647a7b2d5
SHA152f62f6d725049d191f453328cdae3f1f7334ee6
SHA2565456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b
SHA5123e2978f6df4b3f0251dee2a7e9939fce2344e0af1c02810c7fcd1d31b5484fd2b2dd7203eef87ab8d2f2d8e55a9d9549252c256680c17f866f0f5af7c12f602e
-
Filesize
240KB
MD5eac5ebfd214de0cf3a5459b647a7b2d5
SHA152f62f6d725049d191f453328cdae3f1f7334ee6
SHA2565456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b
SHA5123e2978f6df4b3f0251dee2a7e9939fce2344e0af1c02810c7fcd1d31b5484fd2b2dd7203eef87ab8d2f2d8e55a9d9549252c256680c17f866f0f5af7c12f602e
-
Filesize
240KB
MD5eac5ebfd214de0cf3a5459b647a7b2d5
SHA152f62f6d725049d191f453328cdae3f1f7334ee6
SHA2565456e3d82f4f3ce27dec6cac9cd4794fb524ba42e4037a735032c24f8834df6b
SHA5123e2978f6df4b3f0251dee2a7e9939fce2344e0af1c02810c7fcd1d31b5484fd2b2dd7203eef87ab8d2f2d8e55a9d9549252c256680c17f866f0f5af7c12f602e