Analysis

  • max time kernel
    165s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 18:26

General

  • Target

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe

  • Size

    692KB

  • MD5

    36917de8baf55c2061d3e2cfbd63c26f

  • SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

  • SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

  • SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • SSDEEP

    12288:BV570Nf52WBFn4Qx15wPsulqyQgcCQBRrX49sKrDUhV9fpzkCG:T547Fn4eTrulfDnfshV9fJ

Malware Config

Signatures

  • Luminosity 2 IoCs

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe
    "C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Update\Chrome" /XML "C:\Users\Admin\AppData\Local\Temp\411640054.xml"
      2⤵
      • Luminosity
      PID:4496
    • C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe
      "C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\ProgramData\978503\rundll32.exe
        "C:\ProgramData\978503\rundll32.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe
          "C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Update\Chrome" /XML "C:\Users\Admin\AppData\Local\Temp\1204636960.xml"
            5⤵
            • Luminosity
            • Creates scheduled task(s)
            PID:3932
          • C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe
            "C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:4744
            • C:\ProgramData\978503\rundll32.exe
              "C:\ProgramData\978503\rundll32.exe"
              6⤵
              • Executes dropped EXE
              PID:4016
          • C:\Users\Admin\AppData\Local\Temp\csrss.exe
            "C:\Users\Admin\AppData\Local\Temp\csrss.exe" -keyhide -reg C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe -proc 4744 C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4360
    • C:\Users\Admin\AppData\Local\Temp\csrss.exe
      "C:\Users\Admin\AppData\Local\Temp\csrss.exe" -keyhide -reg C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe -proc 4160 C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\978503\rundll32.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\ProgramData\978503\rundll32.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\ProgramData\978503\rundll32.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\ProgramData\978503\rundll32.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ChromeUpdater.exe.log

    Filesize

    312B

    MD5

    9cde1b33892f16d131b7a3d41c285e1b

    SHA1

    fd97fcde96259b3d78187cfcd697c60c3111abc6

    SHA256

    d053e3cb7642f1c46c3d572f30691c7779e6d299dd4008148f391886fa529d9c

    SHA512

    4e4d70c70060c7f68b99626939d6d6bfd455825d4df639ce0597fc3278691194acb2938718fad4c73551712ee84cc11880b53bce75ca31a1ef4972a7b5487d2c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\rundll32.exe.log

    Filesize

    312B

    MD5

    9cde1b33892f16d131b7a3d41c285e1b

    SHA1

    fd97fcde96259b3d78187cfcd697c60c3111abc6

    SHA256

    d053e3cb7642f1c46c3d572f30691c7779e6d299dd4008148f391886fa529d9c

    SHA512

    4e4d70c70060c7f68b99626939d6d6bfd455825d4df639ce0597fc3278691194acb2938718fad4c73551712ee84cc11880b53bce75ca31a1ef4972a7b5487d2c

  • C:\Users\Admin\AppData\Local\Temp\0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\1204636960.xml

    Filesize

    1KB

    MD5

    55d6e14e82b92b5108dc7781abb40711

    SHA1

    784162d8e6eb170e176f4e1f2f3d0f7b820abd83

    SHA256

    040a96a4bd0ee0318955b091eea6a600f845fd4db7cb15f535d69fb1d3090360

    SHA512

    3462bb84f1d321f4cad34a237aa70f4cb8560e94c5c257b9599c8c7fef7af5001d8e896afc65304122e51301c731df2102ac2a743f08271ab3da6227d0547448

  • C:\Users\Admin\AppData\Local\Temp\411640054.xml

    Filesize

    1KB

    MD5

    6a3a5e6d0ff74d54b4343b03b05dc545

    SHA1

    e46560aa8734ef0dd8a7fb484d6e48b6c037fd5f

    SHA256

    a4445ae503b8d9e9ddfa757867f27a5e55eab0b768cd573b15997fce441dab8c

    SHA512

    e54e724ca0c07276350b018ec1ac909c44eb0ed49fc2c5d96a79ff1bcab8abad1980595d502ee4a0393917b7e1e415672da2ea6194746033a086f82c09cada9a

  • C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\ChromeUpdater.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe

    Filesize

    692KB

    MD5

    36917de8baf55c2061d3e2cfbd63c26f

    SHA1

    7ecd8a25b4f502f361f1cb872ea1624b7040dba7

    SHA256

    0e9e6ee83a8a08a88332aed0feb005820931952b515dbd1ce742cc5529827b9f

    SHA512

    864cf3d5074930fee8f6d9e00c344e9354c411d5906257e2dbc2c36b18561c25727694202d5493596796b4bb351dec0f6eb35bc92972a31d1427d153d05166be

  • memory/316-147-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/316-133-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/316-132-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-156-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-152-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-149-0x0000000000000000-mapping.dmp

  • memory/3932-158-0x0000000000000000-mapping.dmp

  • memory/4016-174-0x0000000000000000-mapping.dmp

  • memory/4016-178-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4160-139-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4160-142-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4160-143-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4160-137-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4160-136-0x0000000000000000-mapping.dmp

  • memory/4332-144-0x0000000000000000-mapping.dmp

  • memory/4332-160-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4332-148-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4360-169-0x0000000000000000-mapping.dmp

  • memory/4360-179-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4360-172-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4460-153-0x0000000000000000-mapping.dmp

  • memory/4460-157-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4460-168-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4460-171-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4496-134-0x0000000000000000-mapping.dmp

  • memory/4744-161-0x0000000000000000-mapping.dmp

  • memory/4744-173-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/4744-167-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB