Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:12
Static task
static1
Behavioral task
behavioral1
Sample
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe
Resource
win10v2004-20220901-en
General
-
Target
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe
-
Size
275KB
-
MD5
05c146b923f78e9a863f6d90e892327e
-
SHA1
e6cde484242c23ca907f53cabd41c8e4535cad5b
-
SHA256
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc
-
SHA512
afc4fe806ccfa61797f8740e30c3f210df2aa2e1456c227ae302d9db88e612d90c4e53f90e16e6728e5ffb8f0829715e256bc8b7da15db3757c09ab084a3e434
-
SSDEEP
6144:FMwziX9NW/WoGFplVG/m/Ex0KJivNNhp87cgVPQ3NBM0NT705:huNW/7GNF/tvvoXtQ3TM0NTQ
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
Luminosity.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" Luminosity.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\256309\\Luminosity.exe\"" Luminosity.exe -
Executes dropped EXE 2 IoCs
Processes:
Luminosity.exeLuminosity.exepid process 1804 Luminosity.exe 1660 Luminosity.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Luminosity.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\testing = "\"C:\\ProgramData\\256309\\Luminosity.exe\"" Luminosity.exe -
Drops file in System32 directory 2 IoCs
Processes:
Luminosity.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe Luminosity.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe Luminosity.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exeLuminosity.exedescription pid process target process PID 4956 set thread context of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1804 set thread context of 1660 1804 Luminosity.exe Luminosity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Luminosity.exe572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exeLuminosity.exe572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exepid process 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1804 Luminosity.exe 1804 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe 1660 Luminosity.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exepid process 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exeLuminosity.exeLuminosity.exedescription pid process Token: SeDebugPrivilege 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe Token: SeDebugPrivilege 1804 Luminosity.exe Token: SeDebugPrivilege 1660 Luminosity.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Luminosity.exepid process 1660 Luminosity.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exeLuminosity.exeLuminosity.exedescription pid process target process PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4956 wrote to memory of 4952 4956 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 4952 wrote to memory of 1804 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe Luminosity.exe PID 4952 wrote to memory of 1804 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe Luminosity.exe PID 4952 wrote to memory of 1804 4952 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1804 wrote to memory of 1660 1804 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 4956 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4956 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4956 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4956 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4956 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 1804 1660 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 1804 1660 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 1804 1660 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 1804 1660 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 1804 1660 Luminosity.exe Luminosity.exe PID 1660 wrote to memory of 4952 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4952 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4952 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4952 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe PID 1660 wrote to memory of 4952 1660 Luminosity.exe 572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe"C:\Users\Admin\AppData\Local\Temp\572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe"C:\Users\Admin\AppData\Local\Temp\572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\ProgramData\256309\Luminosity.exe"C:\ProgramData\256309\Luminosity.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\ProgramData\256309\Luminosity.exe"C:\ProgramData\256309\Luminosity.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD505c146b923f78e9a863f6d90e892327e
SHA1e6cde484242c23ca907f53cabd41c8e4535cad5b
SHA256572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc
SHA512afc4fe806ccfa61797f8740e30c3f210df2aa2e1456c227ae302d9db88e612d90c4e53f90e16e6728e5ffb8f0829715e256bc8b7da15db3757c09ab084a3e434
-
Filesize
275KB
MD505c146b923f78e9a863f6d90e892327e
SHA1e6cde484242c23ca907f53cabd41c8e4535cad5b
SHA256572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc
SHA512afc4fe806ccfa61797f8740e30c3f210df2aa2e1456c227ae302d9db88e612d90c4e53f90e16e6728e5ffb8f0829715e256bc8b7da15db3757c09ab084a3e434
-
Filesize
275KB
MD505c146b923f78e9a863f6d90e892327e
SHA1e6cde484242c23ca907f53cabd41c8e4535cad5b
SHA256572ff93818a2afa970dbeb7db6f6468d34a7c661a44e46ed10f3675b52724abc
SHA512afc4fe806ccfa61797f8740e30c3f210df2aa2e1456c227ae302d9db88e612d90c4e53f90e16e6728e5ffb8f0829715e256bc8b7da15db3757c09ab084a3e434