Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 04:59
Static task
static1
Behavioral task
behavioral1
Sample
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
Resource
win10v2004-20220901-en
General
-
Target
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe
-
Size
428KB
-
MD5
e2ca6ce0321817cf237c0338e2550965
-
SHA1
6bd96a67c5f6de32a2efa9254eb9992a8b2743ff
-
SHA256
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984
-
SHA512
1cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0
-
SSDEEP
12288:EI6xnkHxLr6QBizIyYk7G6G9xI3QV+e5w1wetFREjwTzTIZKuW+WVk/4rjJcHqf8:IyRaQBq42QV+e5w1wetFREjwTzTIsuWU
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
helper.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" helper.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\681634\\helper.exe\"" helper.exe -
Executes dropped EXE 2 IoCs
Processes:
helper.exehelper.exepid process 1172 helper.exe 1712 helper.exe -
Loads dropped DLL 1 IoCs
Processes:
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exepid process 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
helper.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Computer Helper = "\"C:\\ProgramData\\681634\\helper.exe\"" helper.exe -
Drops file in System32 directory 2 IoCs
Processes:
helper.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe helper.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe helper.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exehelper.exedescription pid process target process PID 1948 set thread context of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1172 set thread context of 1712 1172 helper.exe helper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
helper.exepid process 1712 helper.exe 1712 helper.exe 1712 helper.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exepid process 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
helper.exedescription pid process Token: SeDebugPrivilege 1712 helper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
helper.exepid process 1712 helper.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exec6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exehelper.exedescription pid process target process PID 1948 wrote to memory of 1828 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 1828 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 1828 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 1828 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2040 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2040 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2040 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2040 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 1948 wrote to memory of 2044 1948 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe PID 2044 wrote to memory of 1172 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe helper.exe PID 2044 wrote to memory of 1172 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe helper.exe PID 2044 wrote to memory of 1172 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe helper.exe PID 2044 wrote to memory of 1172 2044 c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe PID 1172 wrote to memory of 1712 1172 helper.exe helper.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"2⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"2⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"C:\Users\Admin\AppData\Local\Temp\c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\ProgramData\681634\helper.exe"C:\ProgramData\681634\helper.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\ProgramData\681634\helper.exe"C:\ProgramData\681634\helper.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5e2ca6ce0321817cf237c0338e2550965
SHA16bd96a67c5f6de32a2efa9254eb9992a8b2743ff
SHA256c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984
SHA5121cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0
-
Filesize
428KB
MD5e2ca6ce0321817cf237c0338e2550965
SHA16bd96a67c5f6de32a2efa9254eb9992a8b2743ff
SHA256c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984
SHA5121cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0
-
Filesize
428KB
MD5e2ca6ce0321817cf237c0338e2550965
SHA16bd96a67c5f6de32a2efa9254eb9992a8b2743ff
SHA256c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984
SHA5121cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0
-
Filesize
428KB
MD5e2ca6ce0321817cf237c0338e2550965
SHA16bd96a67c5f6de32a2efa9254eb9992a8b2743ff
SHA256c6052e5c6fd6d63c9fe20272c9847b04b41047af69f162fca3719851516de984
SHA5121cf46509b9e9a72b3018d6a2ada218bfe195a7fe0d10366abec32913e2d9149cfd2439c38c7cdf55e534bc4a876fd0112e998d0bf38720edec3647428e2c70f0