Analysis

  • max time kernel
    163s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 01:40

General

  • Target

    97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe

  • Size

    274KB

  • MD5

    98c41386d7388c9ef21006de25e62352

  • SHA1

    65c5898be57da08f0b933f9808a0b36e058736f4

  • SHA256

    97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

  • SHA512

    6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

  • SSDEEP

    6144:z7M54HWx2BNDsrH1qNB9JcDSWA0uq74HW1JfLgD5l2dSmLIVZ20:z7iQN4AuSbHOxLgb20uIVZ

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs regedit.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe
    "C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\ac.bat
      2⤵
        PID:1216
      • C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe
        "C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\ProgramData\618891\sysmon.exe
          "C:\ProgramData\618891\sysmon.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\ac.bat
            4⤵
              PID:1868
            • C:\ProgramData\618891\sysmon.exe
              "C:\ProgramData\618891\sysmon.exe"
              4⤵
              • Executes dropped EXE
              PID:364
            • C:\ProgramData\618891\sysmon.exe
              "C:\ProgramData\618891\sysmon.exe"
              4⤵
              • Executes dropped EXE
              PID:1592
            • C:\ProgramData\618891\sysmon.exe
              "C:\ProgramData\618891\sysmon.exe"
              4⤵
              • Executes dropped EXE
              PID:1744
            • C:\ProgramData\618891\sysmon.exe
              "C:\ProgramData\618891\sysmon.exe"
              4⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1120
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\ac.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\regedit.exe
            regedit.exe /s "C:\Users\Admin\AppData\Roaming\ac.bat"
            3⤵
            • UAC bypass
            • Runs regedit.exe
            PID:1656
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\ac.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Windows\regedit.exe
            regedit.exe /s "C:\Users\Admin\AppData\Roaming\ac.bat"
            3⤵
            • UAC bypass
            • Runs regedit.exe
            PID:1924

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • C:\Users\Admin\AppData\Roaming\ac.bat

        Filesize

        256B

        MD5

        5901919c1b3ae845588953f254445dae

        SHA1

        3d24fd5c5a0f61c1b239c53600bcff11465a442f

        SHA256

        12286ee34a77b701f9d6fbcd507c956961bf51d91283a8e094df221eea396577

        SHA512

        e37602dae72a1ce8434d7cafd460637a88b372ab36ea5338dda9340b5637d9e2df44b9fea571d2fed1cd3ac28f4ddb8e1d6c16e563f8ec12c033df0f1522e0c7

      • C:\Users\Admin\AppData\Roaming\ac.bat

        Filesize

        256B

        MD5

        5901919c1b3ae845588953f254445dae

        SHA1

        3d24fd5c5a0f61c1b239c53600bcff11465a442f

        SHA256

        12286ee34a77b701f9d6fbcd507c956961bf51d91283a8e094df221eea396577

        SHA512

        e37602dae72a1ce8434d7cafd460637a88b372ab36ea5338dda9340b5637d9e2df44b9fea571d2fed1cd3ac28f4ddb8e1d6c16e563f8ec12c033df0f1522e0c7

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • \ProgramData\618891\sysmon.exe

        Filesize

        274KB

        MD5

        98c41386d7388c9ef21006de25e62352

        SHA1

        65c5898be57da08f0b933f9808a0b36e058736f4

        SHA256

        97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

        SHA512

        6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

      • memory/836-124-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

        Filesize

        92KB

      • memory/836-56-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/836-126-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

        Filesize

        92KB

      • memory/836-132-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

        Filesize

        92KB

      • memory/836-129-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

        Filesize

        92KB

      • memory/836-123-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

        Filesize

        92KB

      • memory/836-55-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/836-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

        Filesize

        8KB

      • memory/916-75-0x0000000000000000-mapping.dmp

      • memory/1120-120-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1120-109-0x000000000045CF0E-mapping.dmp

      • memory/1120-121-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1216-59-0x0000000074431000-0x0000000074433000-memory.dmp

        Filesize

        8KB

      • memory/1216-57-0x0000000000000000-mapping.dmp

      • memory/1524-72-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1524-68-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1524-60-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1524-61-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1524-63-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1524-65-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1524-78-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1524-66-0x000000000045CF0E-mapping.dmp

      • memory/1524-122-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1524-70-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1632-94-0x0000000000000000-mapping.dmp

      • memory/1656-76-0x0000000000000000-mapping.dmp

      • memory/1732-73-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmp

        Filesize

        8KB

      • memory/1868-88-0x0000000000000000-mapping.dmp

      • memory/1868-91-0x0000000072AD1000-0x0000000072AD3000-memory.dmp

        Filesize

        8KB

      • memory/1924-95-0x0000000000000000-mapping.dmp

      • memory/1988-119-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1988-80-0x0000000000000000-mapping.dmp

      • memory/1988-87-0x0000000074B00000-0x00000000750AB000-memory.dmp

        Filesize

        5.7MB