Analysis

  • max time kernel
    175s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 03:39

General

  • Target

    bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe

  • Size

    528KB

  • MD5

    dbd91f5a4c16872c1461fe82a57adfc8

  • SHA1

    f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

  • SHA256

    bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

  • SHA512

    e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

  • SSDEEP

    12288:yfeMYUCNGwaZaQUIDhiLbwO9iObtu3nIMSL:yvYPNGwaZaQUtwQbIdS

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      /c net stop MpsSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
            PID:4612
      • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
        C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
        2⤵
          PID:1080
        • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
          C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
          2⤵
            PID:1592
          • C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
            C:\Users\Admin\AppData\Local\Temp\bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1.exe
            2⤵
            • Checks computer location settings
            • Suspicious behavior: RenamesItself
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\ProgramData\377294\helper.exe
              "C:\ProgramData\377294\helper.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4524
              • C:\Windows\SysWOW64\cmd.exe
                /c net stop MpsSvc
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3512
                • C:\Windows\SysWOW64\net.exe
                  net stop MpsSvc
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3000
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop MpsSvc
                    6⤵
                      PID:2820
                • C:\ProgramData\377294\helper.exe
                  C:\ProgramData\377294\helper.exe
                  4⤵
                  • Executes dropped EXE
                  PID:724
                • C:\ProgramData\377294\helper.exe
                  C:\ProgramData\377294\helper.exe
                  4⤵
                  • Executes dropped EXE
                  PID:3800
                • C:\ProgramData\377294\helper.exe
                  C:\ProgramData\377294\helper.exe
                  4⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:4480

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\377294\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\377294\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\377294\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\377294\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\ProgramData\377294\helper.exe

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startupx\system.pif

            Filesize

            528KB

            MD5

            dbd91f5a4c16872c1461fe82a57adfc8

            SHA1

            f1324a6f57d2c52f35c3ed877ad5d2d86ed3c0f8

            SHA256

            bfe07c849b72c7065d6f179eb1fad54967090ab33ad5b9addda088d532b1ade1

            SHA512

            e6fdd09a4704a3ab2ed579f35306e56c4d6218c1ae85532c9c73bf763660854b34b8a2074648e6dd1daa966960389d3f762a0018cacc13f7ea1f3f01718a80f9

          • memory/724-151-0x0000000000000000-mapping.dmp

          • memory/1080-136-0x0000000000000000-mapping.dmp

          • memory/1592-137-0x0000000000000000-mapping.dmp

          • memory/1956-140-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/1956-134-0x0000000006670000-0x000000000686A000-memory.dmp

            Filesize

            2.0MB

          • memory/1956-133-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-138-0x0000000000000000-mapping.dmp

          • memory/2800-164-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-161-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-143-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-139-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/2820-160-0x0000000000000000-mapping.dmp

          • memory/2900-135-0x0000000000000000-mapping.dmp

          • memory/3000-159-0x0000000000000000-mapping.dmp

          • memory/3512-150-0x0000000000000000-mapping.dmp

          • memory/3800-153-0x0000000000000000-mapping.dmp

          • memory/4480-155-0x0000000000000000-mapping.dmp

          • memory/4480-162-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/4480-163-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/4524-148-0x0000000006570000-0x000000000676A000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-158-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/4524-147-0x00000000750B0000-0x0000000075661000-memory.dmp

            Filesize

            5.7MB

          • memory/4524-144-0x0000000000000000-mapping.dmp

          • memory/4612-142-0x0000000000000000-mapping.dmp

          • memory/4940-141-0x0000000000000000-mapping.dmp