Analysis
-
max time kernel
191s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe
Resource
win10v2004-20220901-en
General
-
Target
13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe
-
Size
320KB
-
MD5
6c4bdfefea58c80aa75fbd60517771ee
-
SHA1
fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
-
SHA256
13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
-
SHA512
4bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0
-
SSDEEP
6144:EKkdLgjO+EQT1XZqJWi+2NsQuM/L6R1RbKfmhH3TX82ZmhXIWgNkHbSO147qPsP:EKkVgjT5Zv2seuxK+hXT/Zm2CWO14mP+
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" sysmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\768566\\sysmon.exe\"" sysmon.exe -
Executes dropped EXE 2 IoCs
pid Process 108 sysmon.exe 1652 sysmon.exe -
Loads dropped DLL 2 IoCs
pid Process 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\System Monitor = "\"C:\\ProgramData\\768566\\sysmon.exe\"" sysmon.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe sysmon.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe sysmon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 556 set thread context of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 108 set thread context of 1652 108 sysmon.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1652 sysmon.exe 1652 sysmon.exe 1652 sysmon.exe 1652 sysmon.exe 1652 sysmon.exe 1652 sysmon.exe 1652 sysmon.exe 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe Token: SeDebugPrivilege 108 sysmon.exe Token: SeDebugPrivilege 1652 sysmon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1652 sysmon.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 556 wrote to memory of 1168 556 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 28 PID 1168 wrote to memory of 108 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 30 PID 1168 wrote to memory of 108 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 30 PID 1168 wrote to memory of 108 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 30 PID 1168 wrote to memory of 108 1168 13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe 30 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 108 wrote to memory of 1652 108 sysmon.exe 31 PID 1652 wrote to memory of 556 1652 sysmon.exe 13 PID 1652 wrote to memory of 556 1652 sysmon.exe 13 PID 1652 wrote to memory of 556 1652 sysmon.exe 13 PID 1652 wrote to memory of 556 1652 sysmon.exe 13 PID 1652 wrote to memory of 556 1652 sysmon.exe 13
Processes
-
C:\Users\Admin\AppData\Local\Temp\13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe"C:\Users\Admin\AppData\Local\Temp\13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe"C:\Users\Admin\AppData\Local\Temp\13555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\ProgramData\768566\sysmon.exe"C:\ProgramData\768566\sysmon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\ProgramData\768566\sysmon.exe"C:\ProgramData\768566\sysmon.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD56c4bdfefea58c80aa75fbd60517771ee
SHA1fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
SHA25613555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
SHA5124bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0
-
Filesize
320KB
MD56c4bdfefea58c80aa75fbd60517771ee
SHA1fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
SHA25613555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
SHA5124bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0
-
Filesize
320KB
MD56c4bdfefea58c80aa75fbd60517771ee
SHA1fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
SHA25613555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
SHA5124bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0
-
Filesize
320KB
MD56c4bdfefea58c80aa75fbd60517771ee
SHA1fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
SHA25613555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
SHA5124bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0
-
Filesize
320KB
MD56c4bdfefea58c80aa75fbd60517771ee
SHA1fc2b61c9d7d2e2a20aaf0efd7a7f6419608d0181
SHA25613555c418c3ba30588aa27a66714f5c091dc1abba859ce7d6d144268833e1731
SHA5124bd68f43060082efb3858794eafb183acd6143184ee54f8c35055c7d7b6fafbbd5a42c7be532a10a317f9b67b0a32d8ccde08dabecdbdad7462012374d0db3e0