Analysis

  • max time kernel
    257s
  • max time network
    339s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 22:14

General

  • Target

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278.exe

  • Size

    686KB

  • MD5

    c133af251d114065265e9827b630239d

  • SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

  • SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

  • SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • SSDEEP

    12288:CKTwwbIjoyUi2NKi2J0V+IpsLQbKwBYRa72QB+uTFzdcvux02S/JfVOCU5vI8Jog:ZvIKNCJY+IpsLYKwuRa72QB+uTFzdcvY

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278.exe
    "C:\Users\Admin\AppData\Local\Temp\09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Users\Admin\AppData\Local\Temp\09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278.exe
      "C:\Users\Admin\AppData\Local\Temp\09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\ProgramData\321801\sysmon.exe
        "C:\ProgramData\321801\sysmon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:2020
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:1568
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:1176
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:280
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:616
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:1516
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1372
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:320
        • C:\ProgramData\321801\sysmon.exe
          "C:\ProgramData\321801\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:1312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • C:\ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • \ProgramData\321801\sysmon.exe

    Filesize

    686KB

    MD5

    c133af251d114065265e9827b630239d

    SHA1

    e13b3859d3a136a21ae1284bb3db431e2adc5e86

    SHA256

    09c8b67a5b156e19ab658b1342cfed35eaad3d897920369292dd6e8635fe3278

    SHA512

    39ceb34df4c300e5a924cbeb6af181d3f7c3ebe16f9c9569a4eeaf285ebcf7bf6ea50a20eb5b0da67096098f857702089b0103873e03f7bf580b4fbe0ab59b8e

  • memory/588-55-0x0000000074E40000-0x00000000753EB000-memory.dmp

    Filesize

    5.7MB

  • memory/588-67-0x0000000074E40000-0x00000000753EB000-memory.dmp

    Filesize

    5.7MB

  • memory/588-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/604-57-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/604-70-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/604-59-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/604-68-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/604-56-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/604-107-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/604-65-0x000000000045CF0E-mapping.dmp

  • memory/604-105-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/604-72-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/604-63-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1372-96-0x000000000045CF0E-mapping.dmp

  • memory/1372-104-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/1372-106-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-99-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB

  • memory/1956-74-0x0000000000000000-mapping.dmp

  • memory/1956-78-0x0000000074DD0000-0x000000007537B000-memory.dmp

    Filesize

    5.7MB