Analysis

  • max time kernel
    147s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 22:10

General

  • Target

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b.exe

  • Size

    577KB

  • MD5

    72166df5654821060163883236185475

  • SHA1

    5c5dcafc6fe414a3e4148afd43bc2e0f09147e0a

  • SHA256

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b

  • SHA512

    50bac38ff70b625e4a8d3c7946e494f148a2bb94915b4d7fb377725cc9adf562c0a8f9f1a6f26c0122c9c5020e776e70a292ef4bf47ec100eac3325d67705e06

  • SSDEEP

    12288:Y+vFS0CRTjP3MfUkxJNzC+u7+QqHth90aMHGeVi0j:YGFSrTjPMvvm+t994Ha

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b.exe
    "C:\Users\Admin\AppData\Local\Temp\06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b.exe
      "C:\Users\Admin\AppData\Local\Temp\06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\ProgramData\882935\explorer.exe
        "C:\ProgramData\882935\explorer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\ProgramData\882935\explorer.exe
          "C:\ProgramData\882935\explorer.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\882935\explorer.exe

    Filesize

    577KB

    MD5

    72166df5654821060163883236185475

    SHA1

    5c5dcafc6fe414a3e4148afd43bc2e0f09147e0a

    SHA256

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b

    SHA512

    50bac38ff70b625e4a8d3c7946e494f148a2bb94915b4d7fb377725cc9adf562c0a8f9f1a6f26c0122c9c5020e776e70a292ef4bf47ec100eac3325d67705e06

  • C:\ProgramData\882935\explorer.exe

    Filesize

    577KB

    MD5

    72166df5654821060163883236185475

    SHA1

    5c5dcafc6fe414a3e4148afd43bc2e0f09147e0a

    SHA256

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b

    SHA512

    50bac38ff70b625e4a8d3c7946e494f148a2bb94915b4d7fb377725cc9adf562c0a8f9f1a6f26c0122c9c5020e776e70a292ef4bf47ec100eac3325d67705e06

  • C:\ProgramData\882935\explorer.exe

    Filesize

    577KB

    MD5

    72166df5654821060163883236185475

    SHA1

    5c5dcafc6fe414a3e4148afd43bc2e0f09147e0a

    SHA256

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b

    SHA512

    50bac38ff70b625e4a8d3c7946e494f148a2bb94915b4d7fb377725cc9adf562c0a8f9f1a6f26c0122c9c5020e776e70a292ef4bf47ec100eac3325d67705e06

  • \ProgramData\882935\explorer.exe

    Filesize

    577KB

    MD5

    72166df5654821060163883236185475

    SHA1

    5c5dcafc6fe414a3e4148afd43bc2e0f09147e0a

    SHA256

    06ebf59f231e2a63fedf10b2e2ee3e367bf913a65062eaeec46dd2cdd294b38b

    SHA512

    50bac38ff70b625e4a8d3c7946e494f148a2bb94915b4d7fb377725cc9adf562c0a8f9f1a6f26c0122c9c5020e776e70a292ef4bf47ec100eac3325d67705e06

  • memory/1660-70-0x0000000073FC0000-0x000000007456B000-memory.dmp

    Filesize

    5.7MB

  • memory/1660-55-0x0000000073FC0000-0x000000007456B000-memory.dmp

    Filesize

    5.7MB

  • memory/1660-56-0x0000000073FC0000-0x000000007456B000-memory.dmp

    Filesize

    5.7MB

  • memory/1660-57-0x0000000002146000-0x0000000002157000-memory.dmp

    Filesize

    68KB

  • memory/1660-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB

  • memory/1660-72-0x0000000002146000-0x0000000002157000-memory.dmp

    Filesize

    68KB

  • memory/1816-96-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-86-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-97-0x0000000000A06000-0x0000000000A17000-memory.dmp

    Filesize

    68KB

  • memory/1816-83-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-84-0x0000000000A06000-0x0000000000A17000-memory.dmp

    Filesize

    68KB

  • memory/1916-104-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1916-102-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1916-100-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1916-98-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1976-85-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1976-61-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-59-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-58-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-65-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-66-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-77-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1976-75-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB

  • memory/1976-103-0x0000000073A10000-0x0000000073FBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1976-71-0x0000000000080000-0x00000000000E2000-memory.dmp

    Filesize

    392KB