Analysis

  • max time kernel
    150s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 01:48

General

  • Target

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9.exe

  • Size

    365KB

  • MD5

    257ba86a2263c16001d06f77e346ef86

  • SHA1

    1068158a1d06ac36983fb1586680224dc16a57bc

  • SHA256

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9

  • SHA512

    a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464

  • SSDEEP

    6144:WXV+JnRQtCJmM+mKwYpzyAtmLbR9JWJW+lU3hJ272Ja2P4337MqjrEVGPjk7ngIk:eAROuRvEUla2P4brEyjk7ngYsP

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9.exe
    "C:\Users\Admin\AppData\Local\Temp\3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\ProgramData\896709\scvhost.exe
      "C:\ProgramData\896709\scvhost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\896709\scvhost.exe

    Filesize

    365KB

    MD5

    257ba86a2263c16001d06f77e346ef86

    SHA1

    1068158a1d06ac36983fb1586680224dc16a57bc

    SHA256

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9

    SHA512

    a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464

  • C:\ProgramData\896709\scvhost.exe

    Filesize

    365KB

    MD5

    257ba86a2263c16001d06f77e346ef86

    SHA1

    1068158a1d06ac36983fb1586680224dc16a57bc

    SHA256

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9

    SHA512

    a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464

  • \ProgramData\896709\scvhost.exe

    Filesize

    365KB

    MD5

    257ba86a2263c16001d06f77e346ef86

    SHA1

    1068158a1d06ac36983fb1586680224dc16a57bc

    SHA256

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9

    SHA512

    a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464

  • \ProgramData\896709\scvhost.exe

    Filesize

    365KB

    MD5

    257ba86a2263c16001d06f77e346ef86

    SHA1

    1068158a1d06ac36983fb1586680224dc16a57bc

    SHA256

    3dcf071645ab0543774575cf43ba0bf2207d2257c190be11609ddd30b3d5e4a9

    SHA512

    a00c26236b71e61fd2b13710f8a64763b1bdf6199bc8a40ea9fe98a1c8fc8496fb83a5f0e04e029a049eb82dcd2c162ab782d27b9d4f8ad8db730f4f0d97d464

  • memory/772-59-0x0000000000000000-mapping.dmp

  • memory/772-63-0x0000000074290000-0x000000007483B000-memory.dmp

    Filesize

    5.7MB

  • memory/772-64-0x0000000074290000-0x000000007483B000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1164-55-0x0000000074290000-0x000000007483B000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-56-0x0000000074290000-0x000000007483B000-memory.dmp

    Filesize

    5.7MB

  • memory/1164-65-0x0000000074290000-0x000000007483B000-memory.dmp

    Filesize

    5.7MB