Analysis
-
max time kernel
171s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:10
Static task
static1
Behavioral task
behavioral1
Sample
2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe
Resource
win10v2004-20221111-en
General
-
Target
2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe
-
Size
195KB
-
MD5
21dd8986af501f9fc28baabd8e186870
-
SHA1
1eda9f8e2692e61fbff86edc148339ca94790aaf
-
SHA256
2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd
-
SHA512
c3e063be0ad9e06097f36c06e74c126c871828a463b46046265092afb176bcde8c9e90019dfdb157562918cf580c7c075cdac34a2bed8998e81ec449c410f29a
-
SSDEEP
6144:0aBUduaP4zzzVooBIwf1Jd+X5RU6UPxhBIP:VfaSJH5IzU6UPXB
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" csrd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\346366\\csrd.exe\"" csrd.exe -
Executes dropped EXE 2 IoCs
pid Process 2288 csrd.exe 2640 csrd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csrdLink = "\"C:\\ProgramData\\346366\\csrd.exe\"" csrd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe csrd.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe csrd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 712 set thread context of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 2288 set thread context of 2640 2288 csrd.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3996 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe Token: SeDebugPrivilege 2288 csrd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2640 csrd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 712 wrote to memory of 1860 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 81 PID 712 wrote to memory of 1860 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 81 PID 712 wrote to memory of 1860 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 81 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 712 wrote to memory of 3996 712 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 82 PID 3996 wrote to memory of 2288 3996 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 87 PID 3996 wrote to memory of 2288 3996 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 87 PID 3996 wrote to memory of 2288 3996 2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe 87 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89 PID 2288 wrote to memory of 2640 2288 csrd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"2⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"C:\Users\Admin\AppData\Local\Temp\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe"2⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\ProgramData\346366\csrd.exe"C:\ProgramData\346366\csrd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\ProgramData\346366\csrd.exe"C:\ProgramData\346366\csrd.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD521dd8986af501f9fc28baabd8e186870
SHA11eda9f8e2692e61fbff86edc148339ca94790aaf
SHA2562d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd
SHA512c3e063be0ad9e06097f36c06e74c126c871828a463b46046265092afb176bcde8c9e90019dfdb157562918cf580c7c075cdac34a2bed8998e81ec449c410f29a
-
Filesize
195KB
MD521dd8986af501f9fc28baabd8e186870
SHA11eda9f8e2692e61fbff86edc148339ca94790aaf
SHA2562d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd
SHA512c3e063be0ad9e06097f36c06e74c126c871828a463b46046265092afb176bcde8c9e90019dfdb157562918cf580c7c075cdac34a2bed8998e81ec449c410f29a
-
Filesize
195KB
MD521dd8986af501f9fc28baabd8e186870
SHA11eda9f8e2692e61fbff86edc148339ca94790aaf
SHA2562d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd
SHA512c3e063be0ad9e06097f36c06e74c126c871828a463b46046265092afb176bcde8c9e90019dfdb157562918cf580c7c075cdac34a2bed8998e81ec449c410f29a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2d3ca2dafa9c3bd482d4b185abe31c4012050defec36af091543f96303484abd.exe.log
Filesize313B
MD500b72ea3d569eb0d4fb85691b642f47c
SHA1f9134a33706eb76ddb00e5276639d660a071da9b
SHA256cd62d4fbf8b135be5c0b8448a7d53db7784869761a10ec99473f58f44d8e686c
SHA51262af7608834d84fa95470247cab4bfa5a382825f81e9918b762e62dfc6c467e7b50cfb5b2fd36eff1da320e22aa8c1427c02820e06d9f2f6483e64740a43e8df
-
Filesize
313B
MD500b72ea3d569eb0d4fb85691b642f47c
SHA1f9134a33706eb76ddb00e5276639d660a071da9b
SHA256cd62d4fbf8b135be5c0b8448a7d53db7784869761a10ec99473f58f44d8e686c
SHA51262af7608834d84fa95470247cab4bfa5a382825f81e9918b762e62dfc6c467e7b50cfb5b2fd36eff1da320e22aa8c1427c02820e06d9f2f6483e64740a43e8df