Analysis

  • max time kernel
    156s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 01:40

General

  • Target

    97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe

  • Size

    274KB

  • MD5

    98c41386d7388c9ef21006de25e62352

  • SHA1

    65c5898be57da08f0b933f9808a0b36e058736f4

  • SHA256

    97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

  • SHA512

    6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

  • SSDEEP

    6144:z7M54HWx2BNDsrH1qNB9JcDSWA0uq74HW1JfLgD5l2dSmLIVZ20:z7iQN4AuSbHOxLgb20uIVZ

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs regedit.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe
    "C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\ac.bat
      2⤵
        PID:4272
      • C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe
        "C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe"
        2⤵
          PID:2076
        • C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe
          "C:\Users\Admin\AppData\Local\Temp\97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420.exe"
          2⤵
          • Checks computer location settings
          • Suspicious behavior: RenamesItself
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\ProgramData\963665\sysmon.exe
            "C:\ProgramData\963665\sysmon.exe"
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4636
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\ac.bat
              4⤵
                PID:2352
              • C:\ProgramData\963665\sysmon.exe
                "C:\ProgramData\963665\sysmon.exe"
                4⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1756
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:3092
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ac.bat" "
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Windows\regedit.exe
              regedit.exe /s "C:\Users\Admin\AppData\Roaming\ac.bat"
              3⤵
              • UAC bypass
              • Runs regedit.exe
              PID:1940
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ac.bat" "
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2204
            • C:\Windows\regedit.exe
              regedit.exe /s "C:\Users\Admin\AppData\Roaming\ac.bat"
              3⤵
              • UAC bypass
              • Runs regedit.exe
              PID:4288

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\963665\sysmon.exe

          Filesize

          274KB

          MD5

          98c41386d7388c9ef21006de25e62352

          SHA1

          65c5898be57da08f0b933f9808a0b36e058736f4

          SHA256

          97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

          SHA512

          6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

        • C:\ProgramData\963665\sysmon.exe

          Filesize

          274KB

          MD5

          98c41386d7388c9ef21006de25e62352

          SHA1

          65c5898be57da08f0b933f9808a0b36e058736f4

          SHA256

          97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

          SHA512

          6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

        • C:\ProgramData\963665\sysmon.exe

          Filesize

          274KB

          MD5

          98c41386d7388c9ef21006de25e62352

          SHA1

          65c5898be57da08f0b933f9808a0b36e058736f4

          SHA256

          97bea1889edff67ebf2aa0f0c501531b0c0313c48848ed6e50c4aee983691420

          SHA512

          6a4ab3517bc02ee10ba7e5f94f717573883414190c2bd49757d66049cdfb7f6f3d84eba720f717d0035d773596019304601c92d4bca909f7e082400ced3bd727

        • C:\Users\Admin\AppData\Roaming\ac.bat

          Filesize

          256B

          MD5

          5901919c1b3ae845588953f254445dae

          SHA1

          3d24fd5c5a0f61c1b239c53600bcff11465a442f

          SHA256

          12286ee34a77b701f9d6fbcd507c956961bf51d91283a8e094df221eea396577

          SHA512

          e37602dae72a1ce8434d7cafd460637a88b372ab36ea5338dda9340b5637d9e2df44b9fea571d2fed1cd3ac28f4ddb8e1d6c16e563f8ec12c033df0f1522e0c7

        • C:\Users\Admin\AppData\Roaming\ac.bat

          Filesize

          256B

          MD5

          5901919c1b3ae845588953f254445dae

          SHA1

          3d24fd5c5a0f61c1b239c53600bcff11465a442f

          SHA256

          12286ee34a77b701f9d6fbcd507c956961bf51d91283a8e094df221eea396577

          SHA512

          e37602dae72a1ce8434d7cafd460637a88b372ab36ea5338dda9340b5637d9e2df44b9fea571d2fed1cd3ac28f4ddb8e1d6c16e563f8ec12c033df0f1522e0c7

        • memory/1756-156-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/1756-153-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/1756-149-0x0000000000000000-mapping.dmp

        • memory/1884-146-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/1884-137-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1884-157-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/1884-139-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/1884-136-0x0000000000000000-mapping.dmp

        • memory/1940-141-0x0000000000000000-mapping.dmp

        • memory/2076-135-0x0000000000000000-mapping.dmp

        • memory/2204-154-0x0000000000000000-mapping.dmp

        • memory/2352-148-0x0000000000000000-mapping.dmp

        • memory/2388-140-0x0000000000000000-mapping.dmp

        • memory/3796-161-0x00000000011E0000-0x00000000011F7000-memory.dmp

          Filesize

          92KB

        • memory/3796-132-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/3796-162-0x00000000011E0000-0x00000000011F7000-memory.dmp

          Filesize

          92KB

        • memory/3796-163-0x00000000011E0000-0x00000000011F7000-memory.dmp

          Filesize

          92KB

        • memory/3796-133-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/4272-134-0x0000000000000000-mapping.dmp

        • memory/4288-155-0x0000000000000000-mapping.dmp

        • memory/4636-142-0x0000000000000000-mapping.dmp

        • memory/4636-159-0x0000000005930000-0x0000000005947000-memory.dmp

          Filesize

          92KB

        • memory/4636-160-0x0000000005930000-0x0000000005947000-memory.dmp

          Filesize

          92KB

        • memory/4636-158-0x0000000005930000-0x0000000005947000-memory.dmp

          Filesize

          92KB

        • memory/4636-147-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB

        • memory/4636-145-0x00000000753F0000-0x00000000759A1000-memory.dmp

          Filesize

          5.7MB