Analysis
-
max time kernel
153s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 02:02
Static task
static1
Behavioral task
behavioral1
Sample
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe
Resource
win10v2004-20221111-en
General
-
Target
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe
-
Size
594KB
-
MD5
ee5efbffb2b92cd6414f070bdbe9525e
-
SHA1
8c5ede4793a16898d44b47314a68bd5b70e2177c
-
SHA256
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
-
SHA512
78eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c
-
SSDEEP
12288:85OiajewcaC3K/al98M2BN3mA/+QnQmuF4PsWhQzRwlpWfuMq7YsyHScppW4Lk2z:85Oiajewc53K/al98M2BN3V/+QnQmuFj
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
helper.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" helper.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\604700\\helper.exe\"" helper.exe -
Executes dropped EXE 2 IoCs
Processes:
helper.exehelper.exepid process 1632 helper.exe 1808 helper.exe -
Loads dropped DLL 2 IoCs
Processes:
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exepid process 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
helper.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Computer Helper = "\"C:\\ProgramData\\604700\\helper.exe\"" helper.exe -
Drops file in System32 directory 2 IoCs
Processes:
helper.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe helper.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe helper.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exehelper.exedescription pid process target process PID 1956 set thread context of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1632 set thread context of 1808 1632 helper.exe helper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
helper.exepid process 1808 helper.exe 1808 helper.exe 1808 helper.exe 1808 helper.exe 1808 helper.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exepid process 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
helper.exedescription pid process Token: SeDebugPrivilege 1808 helper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
helper.exepid process 1808 helper.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exehelper.exedescription pid process target process PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 1956 wrote to memory of 768 1956 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe PID 768 wrote to memory of 1632 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe helper.exe PID 768 wrote to memory of 1632 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe helper.exe PID 768 wrote to memory of 1632 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe helper.exe PID 768 wrote to memory of 1632 768 42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe PID 1632 wrote to memory of 1808 1632 helper.exe helper.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe"C:\Users\Admin\AppData\Local\Temp\42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe"C:\Users\Admin\AppData\Local\Temp\42c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:768 -
C:\ProgramData\604700\helper.exe"C:\ProgramData\604700\helper.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\ProgramData\604700\helper.exe"C:\ProgramData\604700\helper.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594KB
MD5ee5efbffb2b92cd6414f070bdbe9525e
SHA18c5ede4793a16898d44b47314a68bd5b70e2177c
SHA25642c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
SHA51278eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c
-
Filesize
594KB
MD5ee5efbffb2b92cd6414f070bdbe9525e
SHA18c5ede4793a16898d44b47314a68bd5b70e2177c
SHA25642c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
SHA51278eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c
-
Filesize
594KB
MD5ee5efbffb2b92cd6414f070bdbe9525e
SHA18c5ede4793a16898d44b47314a68bd5b70e2177c
SHA25642c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
SHA51278eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a542d3337766d1c5f3864add1e8af7a2
SHA1a716bdf979d54965c282355d1b156b980ec8d3c6
SHA256c9a59bf50facf7cac14bbc770d3fb91a2a4b558b56b579d1df954054cda91f02
SHA512eaa97710e0e1160fc7af69b6fe6c71fd15278339726e4cbc2ba432722fa5b37d9feec8a4023e8a18ecdf8351c64f5f8659ec17ecd39d7e627fbaa004a1c41208
-
Filesize
594KB
MD5ee5efbffb2b92cd6414f070bdbe9525e
SHA18c5ede4793a16898d44b47314a68bd5b70e2177c
SHA25642c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
SHA51278eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c
-
Filesize
594KB
MD5ee5efbffb2b92cd6414f070bdbe9525e
SHA18c5ede4793a16898d44b47314a68bd5b70e2177c
SHA25642c07f1fb6d60e2b206b7085e61b337f1c41bb41608801419fd91ce8b4fb8d90
SHA51278eeeebd2bd362d65e908595b1c91415e74fbd0087e566f760f038d79c50050d95961fd0da6f5b75aa92468ac64af29b6f53127fe9d10863cfc3556bf0ddce8c