Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 04:59

General

  • Target

    c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe

  • Size

    428KB

  • MD5

    e2ca6ce0321817cf237c0338e2550965

  • SHA1

    6bd96a67c5f6de32a2efa9254eb9992a8b2743ff

  • SHA256

    c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984

  • SHA512

    1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0

  • SSDEEP

    12288:EI6xnkHxLr6QBizIyYk7G6G9xI3QV+e5w1wetFREjwTzTIZKuW+WVk/4rjJcHqf8:IyRaQBq42QV+e5w1wetFREjwTzTIsuWU

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
    "C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
      "C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"
      2⤵
        PID:1828
      • C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
        "C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"
        2⤵
          PID:2040
        • C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
          "C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious behavior: RenamesItself
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\ProgramData\681634\helper.exe
            "C:\ProgramData\681634\helper.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1172
            • C:\ProgramData\681634\helper.exe
              "C:\ProgramData\681634\helper.exe"
              4⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1712

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\681634\helper.exe

        Filesize

        428KB

        MD5

        e2ca6ce0321817cf237c0338e2550965

        SHA1

        6bd96a67c5f6de32a2efa9254eb9992a8b2743ff

        SHA256

        c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984

        SHA512

        1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0

      • C:\ProgramData\681634\helper.exe

        Filesize

        428KB

        MD5

        e2ca6ce0321817cf237c0338e2550965

        SHA1

        6bd96a67c5f6de32a2efa9254eb9992a8b2743ff

        SHA256

        c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984

        SHA512

        1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0

      • C:\ProgramData\681634\helper.exe

        Filesize

        428KB

        MD5

        e2ca6ce0321817cf237c0338e2550965

        SHA1

        6bd96a67c5f6de32a2efa9254eb9992a8b2743ff

        SHA256

        c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984

        SHA512

        1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0

      • \ProgramData\681634\helper.exe

        Filesize

        428KB

        MD5

        e2ca6ce0321817cf237c0338e2550965

        SHA1

        6bd96a67c5f6de32a2efa9254eb9992a8b2743ff

        SHA256

        c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984

        SHA512

        1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0

      • memory/1172-78-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1172-92-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1172-74-0x0000000000000000-mapping.dmp

      • memory/1712-89-0x000000000045CF0E-mapping.dmp

      • memory/1712-97-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1712-99-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1948-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

        Filesize

        8KB

      • memory/1948-67-0x0000000073FC0000-0x000000007456B000-memory.dmp

        Filesize

        5.7MB

      • memory/1948-55-0x0000000073FC0000-0x000000007456B000-memory.dmp

        Filesize

        5.7MB

      • memory/2044-63-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/2044-72-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/2044-70-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/2044-79-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/2044-68-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/2044-65-0x000000000045CF0E-mapping.dmp

      • memory/2044-59-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/2044-57-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/2044-98-0x0000000073A10000-0x0000000073FBB000-memory.dmp

        Filesize

        5.7MB

      • memory/2044-56-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB