Analysis

  • max time kernel
    205s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 23:54

General

  • Target

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb.exe

  • Size

    376KB

  • MD5

    76acc4ecd7364620dad58e2b2e62caa9

  • SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

  • SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

  • SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • SSDEEP

    6144:IT1lNGV5ofc3he+0oNtOk52Z0IOM7q58BXmVJpSTW:IT1lNGDJ30AnZFM7q+XwoTW

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb.exe
    "C:\Users\Admin\AppData\Local\Temp\1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb.exe
      "C:\Users\Admin\AppData\Local\Temp\1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\ProgramData\866865\sysmon.exe
        "C:\ProgramData\866865\sysmon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\ProgramData\866865\sysmon.exe
          "C:\ProgramData\866865\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:4284
        • C:\ProgramData\866865\sysmon.exe
          "C:\ProgramData\866865\sysmon.exe"
          4⤵
          • Executes dropped EXE
          PID:3272
        • C:\ProgramData\866865\sysmon.exe
          "C:\ProgramData\866865\sysmon.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\866865\sysmon.exe

    Filesize

    376KB

    MD5

    76acc4ecd7364620dad58e2b2e62caa9

    SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

    SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

    SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • C:\ProgramData\866865\sysmon.exe

    Filesize

    376KB

    MD5

    76acc4ecd7364620dad58e2b2e62caa9

    SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

    SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

    SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • C:\ProgramData\866865\sysmon.exe

    Filesize

    376KB

    MD5

    76acc4ecd7364620dad58e2b2e62caa9

    SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

    SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

    SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • C:\ProgramData\866865\sysmon.exe

    Filesize

    376KB

    MD5

    76acc4ecd7364620dad58e2b2e62caa9

    SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

    SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

    SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • C:\ProgramData\866865\sysmon.exe

    Filesize

    376KB

    MD5

    76acc4ecd7364620dad58e2b2e62caa9

    SHA1

    e5f84306eb1a7c9d780ac1752a95745c70682442

    SHA256

    1ec721c2255fef99fd89db61e8d4de5e3e125e298a62a128f5017bf4ba0ca2fb

    SHA512

    547066e5bfe500ab44c239f5d60cb9f24e3f49638c05a37c33585ca3f8cbbe3d74cd040dc2dc697a98af6b20b1880b01f6af568a70e8fd1a2682265c33327179

  • memory/768-136-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/768-137-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/768-135-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2228-133-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-132-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/3996-141-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/3996-142-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/4944-150-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/4944-151-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB