Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 01:53
Static task
static1
Behavioral task
behavioral1
Sample
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe
Resource
win10v2004-20220901-en
General
-
Target
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe
-
Size
196KB
-
MD5
4e3b4a58556b73a525ac4ad4a667fc5f
-
SHA1
8647ce41e973ec67d068c14921d80942a55f8bb4
-
SHA256
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89
-
SHA512
f85285858789a1e30b2afad625dfede84853c6154108b83a6a53cc7b88c5d6996ba2eb0dd38298fdd312f5ff280f3ea9aa523ba8a51ab83cff9efb8b20dcb6c7
-
SSDEEP
6144:1L5Bx3DhHc6peTzhKeLTHav3bjUl2yzac:1VBx3tHc6khK4EPe2yV
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
csrd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" csrd.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\106150\\csrd.exe\"" csrd.exe -
Executes dropped EXE 2 IoCs
Processes:
csrd.execsrd.exepid process 4004 csrd.exe 856 csrd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
csrd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csrdLink = "\"C:\\ProgramData\\106150\\csrd.exe\"" csrd.exe -
Drops file in System32 directory 2 IoCs
Processes:
csrd.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe csrd.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe csrd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.execsrd.exedescription pid process target process PID 4284 set thread context of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4004 set thread context of 856 4004 csrd.exe csrd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exepid process 4244 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.execsrd.exedescription pid process Token: SeDebugPrivilege 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe Token: SeDebugPrivilege 4004 csrd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csrd.exepid process 856 csrd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.execsrd.exedescription pid process target process PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4284 wrote to memory of 4244 4284 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe PID 4244 wrote to memory of 4004 4244 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe csrd.exe PID 4244 wrote to memory of 4004 4244 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe csrd.exe PID 4244 wrote to memory of 4004 4244 804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe PID 4004 wrote to memory of 856 4004 csrd.exe csrd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe"C:\Users\Admin\AppData\Local\Temp\804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe"C:\Users\Admin\AppData\Local\Temp\804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89.exe"2⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\ProgramData\106150\csrd.exe"C:\ProgramData\106150\csrd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\ProgramData\106150\csrd.exe"C:\ProgramData\106150\csrd.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD54e3b4a58556b73a525ac4ad4a667fc5f
SHA18647ce41e973ec67d068c14921d80942a55f8bb4
SHA256804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89
SHA512f85285858789a1e30b2afad625dfede84853c6154108b83a6a53cc7b88c5d6996ba2eb0dd38298fdd312f5ff280f3ea9aa523ba8a51ab83cff9efb8b20dcb6c7
-
Filesize
196KB
MD54e3b4a58556b73a525ac4ad4a667fc5f
SHA18647ce41e973ec67d068c14921d80942a55f8bb4
SHA256804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89
SHA512f85285858789a1e30b2afad625dfede84853c6154108b83a6a53cc7b88c5d6996ba2eb0dd38298fdd312f5ff280f3ea9aa523ba8a51ab83cff9efb8b20dcb6c7
-
Filesize
196KB
MD54e3b4a58556b73a525ac4ad4a667fc5f
SHA18647ce41e973ec67d068c14921d80942a55f8bb4
SHA256804a74007782f858db9f08ec1797aa92429c1ae2f2496045854db975777ffe89
SHA512f85285858789a1e30b2afad625dfede84853c6154108b83a6a53cc7b88c5d6996ba2eb0dd38298fdd312f5ff280f3ea9aa523ba8a51ab83cff9efb8b20dcb6c7