Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:07
Behavioral task
behavioral1
Sample
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe
Resource
win10v2004-20220812-en
General
-
Target
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe
-
Size
823KB
-
MD5
12e6771c261c522bc702ab413ce3f7f6
-
SHA1
19e299d59236739b3f826c5d37723d39aa28489d
-
SHA256
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7
-
SHA512
9ae5ce4484a0cb3d2681aee3ee6a1d22e78858341d182c091c66d7a5128e8f730a1e70660366a27767bdeb5305ee311e85a00865fdc750d8ea844026053f82ab
-
SSDEEP
12288:y6Wq4aaE6KwyF5L0Y2D1PqLX7okJixkya90M7iNgtsgnEemtGqBgkUhBF/eLzkw:wthEVaPqLbmkR9Bu+sremtngPXFGL1
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
scvhost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\217108\\scvhost.exe\"" scvhost.exe -
Executes dropped EXE 2 IoCs
Processes:
se.exescvhost.exepid process 3592 se.exe 4480 scvhost.exe -
Processes:
resource yara_rule behavioral2/memory/1268-132-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral2/memory/1268-134-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral2/memory/3812-136-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral2/memory/3812-140-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exese.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation se.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
scvhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Audio Manger = "\"C:\\ProgramData\\217108\\scvhost.exe\"" scvhost.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1268-132-0x0000000000400000-0x00000000004BC000-memory.dmp autoit_exe behavioral2/memory/1268-134-0x0000000000400000-0x00000000004BC000-memory.dmp autoit_exe behavioral2/memory/3812-136-0x0000000000400000-0x00000000004BC000-memory.dmp autoit_exe behavioral2/memory/3812-140-0x0000000000400000-0x00000000004BC000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
scvhost.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe scvhost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exedescription pid process target process PID 3812 set thread context of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exescvhost.exese.exepid process 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 3592 se.exe 3592 se.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe 4480 scvhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
scvhost.exedescription pid process Token: SeDebugPrivilege 4480 scvhost.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exef71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exepid process 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exef71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exepid process 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchost.exescvhost.exepid process 1972 svchost.exe 4480 scvhost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exef71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exesvchost.exese.exescvhost.exedescription pid process target process PID 1268 wrote to memory of 3812 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe PID 1268 wrote to memory of 3812 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe PID 1268 wrote to memory of 3812 1268 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 3812 wrote to memory of 1972 3812 f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe svchost.exe PID 1972 wrote to memory of 3592 1972 svchost.exe se.exe PID 1972 wrote to memory of 3592 1972 svchost.exe se.exe PID 1972 wrote to memory of 3592 1972 svchost.exe se.exe PID 3592 wrote to memory of 4480 3592 se.exe scvhost.exe PID 3592 wrote to memory of 4480 3592 se.exe scvhost.exe PID 3592 wrote to memory of 4480 3592 se.exe scvhost.exe PID 4480 wrote to memory of 3592 4480 scvhost.exe se.exe PID 4480 wrote to memory of 3592 4480 scvhost.exe se.exe PID 4480 wrote to memory of 3592 4480 scvhost.exe se.exe PID 4480 wrote to memory of 3592 4480 scvhost.exe se.exe PID 4480 wrote to memory of 3592 4480 scvhost.exe se.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe"C:\Users\Admin\AppData\Local\Temp\f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe"C:\Users\Admin\AppData\Local\Temp\f71019c44cdb9c7f429a775d23406b5262f010ea465f75e35660a79f788e90f7.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\data.bin"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
\??\c:\windows\SysWOW64\svchost.exe"c:\windows\system32\svchost.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\se.exe"C:\Users\Admin\AppData\Local\Temp\se.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\ProgramData\217108\scvhost.exe"C:\ProgramData\217108\scvhost.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5257ba86a2263c16001d06f77e346ef86
SHA11068158a1d06ac36983fb1586680224dc16a57bc
SHA2563dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9
SHA512a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464
-
Filesize
365KB
MD5257ba86a2263c16001d06f77e346ef86
SHA11068158a1d06ac36983fb1586680224dc16a57bc
SHA2563dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9
SHA512a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464
-
Filesize
64KB
MD579edc50660701c02bef048aa07e9aefa
SHA1f11a26beb1e0b95250f372f72ad3269362eb9845
SHA2568221bc5a9b64b844b9118044895e84ebcc5152436a00ac2aaa5df51bf8a3de99
SHA51253328fd1681543d7434f369743c47c4987e02f086a98a4f603b6439fe246f7c3e55f9cf731992b9e6fcbae70dd2f8b744955facca8026722d6adc961733cd09d
-
Filesize
365KB
MD5257ba86a2263c16001d06f77e346ef86
SHA11068158a1d06ac36983fb1586680224dc16a57bc
SHA2563dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9
SHA512a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464
-
Filesize
365KB
MD5257ba86a2263c16001d06f77e346ef86
SHA11068158a1d06ac36983fb1586680224dc16a57bc
SHA2563dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9
SHA512a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464