Analysis

  • max time kernel
    183s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 03:39

General

  • Target

    bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe

  • Size

    528KB

  • MD5

    dbd91f5a4c16872c1461fe82a57adfc8

  • SHA1

    f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

  • SHA256

    bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

  • SHA512

    e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

  • SSDEEP

    12288:yfeMYUCNGwaZaQUIDhiLbwO9iObtu3nIMSL:yvYPNGwaZaQUtwQbIdS

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\cmd.exe
      /c net stop MpsSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
            PID:916
      • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
        C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
        2⤵
          PID:580
        • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
          C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
          2⤵
            PID:1004
          • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
            C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
            2⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: RenamesItself
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\ProgramData\691411\helper.exe
              "C:\ProgramData\691411\helper.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:888
              • C:\Windows\SysWOW64\cmd.exe
                /c net stop MpsSvc
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1544
                • C:\Windows\SysWOW64\net.exe
                  net stop MpsSvc
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1224
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop MpsSvc
                    6⤵
                      PID:280
                • C:\ProgramData\691411\helper.exe
                  C:\ProgramData\691411\helper.exe
                  4⤵
                  • Executes dropped EXE
                  PID:844
                • C:\ProgramData\691411\helper.exe
                  C:\ProgramData\691411\helper.exe
                  4⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1820
                • C:\ProgramData\691411\helper.exe
                  C:\ProgramData\691411\helper.exe
                  4⤵
                  • Executes dropped EXE
                  PID:936

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • \ProgramData\691411\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • memory/888-99-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/888-81-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/1228-55-0x0000000074800000-0x0000000074DAB000-memory.dmp

            Filesize

            5.7MB

          • memory/1228-69-0x0000000074800000-0x0000000074DAB000-memory.dmp

            Filesize

            5.7MB

          • memory/1228-54-0x00000000761F1000-0x00000000761F3000-memory.dmp

            Filesize

            8KB

          • memory/1228-56-0x0000000000370000-0x0000000000374000-memory.dmp

            Filesize

            16KB

          • memory/1820-116-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/1820-105-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/1868-66-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-104-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/1868-60-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-61-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-64-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-75-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB

          • memory/1868-58-0x00000000000F0000-0x00000000001EA000-memory.dmp

            Filesize

            1000KB

          • memory/1868-70-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-106-0x0000000002210000-0x0000000002227000-memory.dmp

            Filesize

            92KB

          • memory/1868-107-0x0000000002210000-0x0000000002227000-memory.dmp

            Filesize

            92KB

          • memory/1868-109-0x0000000002210000-0x0000000002227000-memory.dmp

            Filesize

            92KB

          • memory/1868-112-0x0000000002210000-0x0000000002227000-memory.dmp

            Filesize

            92KB

          • memory/1868-115-0x0000000002210000-0x0000000002227000-memory.dmp

            Filesize

            92KB

          • memory/1868-72-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/1868-117-0x0000000074780000-0x0000000074D2B000-memory.dmp

            Filesize

            5.7MB