Analysis
-
max time kernel
190s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe
Resource
win10v2004-20220812-en
General
-
Target
497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe
-
Size
267KB
-
MD5
73189127106a82789164e3e2b83d4ce5
-
SHA1
221e08a774a46b84e36fa55aa0a82f10af813765
-
SHA256
497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035
-
SHA512
df9a1ca3ded719b59c5c74021635f02aeef9c0b1cb258e275f651eff63d59767ce38f3b45747767a0a1a961fac3b406d101ea4cc0e1c0d6599ce76305db94dba
-
SSDEEP
6144:5v+2p5fGOmQ2lBZnUnoJHwGYbf6JvMumZnRFgsWct8lXp:J+2p5pmQg5U6HCSdmZR2otk5
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\166024\\helper.exe\"" helper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" helper.exe -
Executes dropped EXE 2 IoCs
pid Process 4784 helper.exe 4876 helper.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Computer Helper = "\"C:\\ProgramData\\166024\\helper.exe\"" helper.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe helper.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe helper.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5060 set thread context of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 4784 set thread context of 4876 4784 helper.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4784 helper.exe 4784 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe 4876 helper.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3472 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe Token: SeDebugPrivilege 4784 helper.exe Token: SeDebugPrivilege 4876 helper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4876 helper.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 5060 wrote to memory of 3472 5060 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 82 PID 3472 wrote to memory of 4784 3472 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 83 PID 3472 wrote to memory of 4784 3472 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 83 PID 3472 wrote to memory of 4784 3472 497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe 83 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4784 wrote to memory of 4876 4784 helper.exe 84 PID 4876 wrote to memory of 5060 4876 helper.exe 79 PID 4876 wrote to memory of 5060 4876 helper.exe 79 PID 4876 wrote to memory of 5060 4876 helper.exe 79 PID 4876 wrote to memory of 5060 4876 helper.exe 79 PID 4876 wrote to memory of 5060 4876 helper.exe 79 PID 4876 wrote to memory of 4784 4876 helper.exe 83 PID 4876 wrote to memory of 4784 4876 helper.exe 83 PID 4876 wrote to memory of 4784 4876 helper.exe 83 PID 4876 wrote to memory of 4784 4876 helper.exe 83 PID 4876 wrote to memory of 4784 4876 helper.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe"C:\Users\Admin\AppData\Local\Temp\497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe"C:\Users\Admin\AppData\Local\Temp\497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035.exe"2⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\ProgramData\166024\helper.exe"C:\ProgramData\166024\helper.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\ProgramData\166024\helper.exe"C:\ProgramData\166024\helper.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD573189127106a82789164e3e2b83d4ce5
SHA1221e08a774a46b84e36fa55aa0a82f10af813765
SHA256497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035
SHA512df9a1ca3ded719b59c5c74021635f02aeef9c0b1cb258e275f651eff63d59767ce38f3b45747767a0a1a961fac3b406d101ea4cc0e1c0d6599ce76305db94dba
-
Filesize
267KB
MD573189127106a82789164e3e2b83d4ce5
SHA1221e08a774a46b84e36fa55aa0a82f10af813765
SHA256497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035
SHA512df9a1ca3ded719b59c5c74021635f02aeef9c0b1cb258e275f651eff63d59767ce38f3b45747767a0a1a961fac3b406d101ea4cc0e1c0d6599ce76305db94dba
-
Filesize
267KB
MD573189127106a82789164e3e2b83d4ce5
SHA1221e08a774a46b84e36fa55aa0a82f10af813765
SHA256497d69084c82c0578576fb2d90c1cac706325f3a9da8626aebdc69b3c9340035
SHA512df9a1ca3ded719b59c5c74021635f02aeef9c0b1cb258e275f651eff63d59767ce38f3b45747767a0a1a961fac3b406d101ea4cc0e1c0d6599ce76305db94dba