Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe
Resource
win10v2004-20220901-en
General
-
Target
28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe
-
Size
276KB
-
MD5
b61e284fd4e10513f55de906f6669324
-
SHA1
e3e164e41098f57d1f4044c368268337a0dd783c
-
SHA256
28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
-
SHA512
e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6
-
SSDEEP
6144:NlLi/M8rU4Yewg4LKEIg5A2bjNIjZK/7l5rdjcH2xXmV1O2qZZ:No/M8FVwJzxJ/frh82m1+Z
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" Explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\110947\\Explorer.exe\"" Explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 320 Explorer.exe 688 Explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "\"C:\\ProgramData\\110947\\Explorer.exe\"" Explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe Explorer.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe Explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 748 set thread context of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 320 set thread context of 688 320 Explorer.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 688 Explorer.exe 688 Explorer.exe 688 Explorer.exe 688 Explorer.exe 688 Explorer.exe 320 Explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe Token: SeDebugPrivilege 320 Explorer.exe Token: SeDebugPrivilege 688 Explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 688 Explorer.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 748 wrote to memory of 1456 748 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 28 PID 1456 wrote to memory of 320 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 30 PID 1456 wrote to memory of 320 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 30 PID 1456 wrote to memory of 320 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 30 PID 1456 wrote to memory of 320 1456 28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe 30 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 320 wrote to memory of 688 320 Explorer.exe 31 PID 688 wrote to memory of 320 688 Explorer.exe 30 PID 688 wrote to memory of 320 688 Explorer.exe 30 PID 688 wrote to memory of 320 688 Explorer.exe 30 PID 688 wrote to memory of 320 688 Explorer.exe 30 PID 688 wrote to memory of 320 688 Explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe"C:\Users\Admin\AppData\Local\Temp\28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe"C:\Users\Admin\AppData\Local\Temp\28d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\ProgramData\110947\Explorer.exe"C:\ProgramData\110947\Explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\ProgramData\110947\Explorer.exe"C:\ProgramData\110947\Explorer.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5b61e284fd4e10513f55de906f6669324
SHA1e3e164e41098f57d1f4044c368268337a0dd783c
SHA25628d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
SHA512e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6
-
Filesize
276KB
MD5b61e284fd4e10513f55de906f6669324
SHA1e3e164e41098f57d1f4044c368268337a0dd783c
SHA25628d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
SHA512e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6
-
Filesize
276KB
MD5b61e284fd4e10513f55de906f6669324
SHA1e3e164e41098f57d1f4044c368268337a0dd783c
SHA25628d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
SHA512e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6
-
Filesize
276KB
MD5b61e284fd4e10513f55de906f6669324
SHA1e3e164e41098f57d1f4044c368268337a0dd783c
SHA25628d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
SHA512e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6
-
Filesize
276KB
MD5b61e284fd4e10513f55de906f6669324
SHA1e3e164e41098f57d1f4044c368268337a0dd783c
SHA25628d6ab8ea59513adfbaeacfc0eeac01af84961c2597efd96f7e6160a142ab502
SHA512e9eea51e4403a1405abd5179fcdbb396a1680c0b11f464b315257f0e242bf9a9681b324920ed64f7b7e3c7214b6c19294d0f91df8a31c4e3019684218fcb68f6