Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 02:04

General

  • Target

    ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe

  • Size

    276KB

  • MD5

    34718d2fc0b6d1ba6e7808d8573c06c2

  • SHA1

    de0b7cde81322b73dcba104360f3aa53778efd6e

  • SHA256

    ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

  • SHA512

    05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

  • SSDEEP

    6144:oFnXtiLg8tIc4YDkm7vNyMMeO8bWzJj8trQbgBnUF:oFnXEkHcNTFM8bgSr8X

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe
    "C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe
      "C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe"
      2⤵
        PID:1104
      • C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe
        "C:\Users\Admin\AppData\Local\Temp\ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\ProgramData\708712\sysmon.exe
          "C:\ProgramData\708712\sysmon.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\ProgramData\708712\sysmon.exe
            "C:\ProgramData\708712\sysmon.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1824

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\708712\sysmon.exe

      Filesize

      276KB

      MD5

      34718d2fc0b6d1ba6e7808d8573c06c2

      SHA1

      de0b7cde81322b73dcba104360f3aa53778efd6e

      SHA256

      ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

      SHA512

      05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

    • C:\ProgramData\708712\sysmon.exe

      Filesize

      276KB

      MD5

      34718d2fc0b6d1ba6e7808d8573c06c2

      SHA1

      de0b7cde81322b73dcba104360f3aa53778efd6e

      SHA256

      ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

      SHA512

      05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

    • C:\ProgramData\708712\sysmon.exe

      Filesize

      276KB

      MD5

      34718d2fc0b6d1ba6e7808d8573c06c2

      SHA1

      de0b7cde81322b73dcba104360f3aa53778efd6e

      SHA256

      ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

      SHA512

      05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

    • \ProgramData\708712\sysmon.exe

      Filesize

      276KB

      MD5

      34718d2fc0b6d1ba6e7808d8573c06c2

      SHA1

      de0b7cde81322b73dcba104360f3aa53778efd6e

      SHA256

      ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

      SHA512

      05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

    • \ProgramData\708712\sysmon.exe

      Filesize

      276KB

      MD5

      34718d2fc0b6d1ba6e7808d8573c06c2

      SHA1

      de0b7cde81322b73dcba104360f3aa53778efd6e

      SHA256

      ed6430543467f03a94863f2f1244cee7221a556076f8514a95d279a65c8059a4

      SHA512

      05ffeeff9fb7f39651756ede3f8504e8e65e09b2dbbe8b41cc75628214c8b7b2384d63444a39dac3f32d73d45514b05626cffa56c48edbff804cc8f2a92a669a

    • memory/1496-99-0x0000000000480000-0x0000000000497000-memory.dmp

      Filesize

      92KB

    • memory/1496-94-0x0000000000480000-0x0000000000497000-memory.dmp

      Filesize

      92KB

    • memory/1496-93-0x0000000000480000-0x0000000000497000-memory.dmp

      Filesize

      92KB

    • memory/1496-54-0x0000000075131000-0x0000000075133000-memory.dmp

      Filesize

      8KB

    • memory/1496-69-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1496-96-0x0000000000480000-0x0000000000497000-memory.dmp

      Filesize

      92KB

    • memory/1496-102-0x0000000000480000-0x0000000000497000-memory.dmp

      Filesize

      92KB

    • memory/1496-55-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1824-91-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1824-103-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1824-84-0x000000000045CF0E-mapping.dmp

    • memory/1880-92-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1880-77-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1880-73-0x0000000000000000-mapping.dmp

    • memory/1964-70-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1964-68-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB

    • memory/1964-66-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-64-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-62-0x000000000045CF0E-mapping.dmp

    • memory/1964-61-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-59-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-57-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-56-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1964-104-0x0000000073FA0000-0x000000007454B000-memory.dmp

      Filesize

      5.7MB