Analysis
-
max time kernel
151s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe
Resource
win10v2004-20220901-en
General
-
Target
d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe
-
Size
1.2MB
-
MD5
1ab34989b3e13257b840a534734501c7
-
SHA1
3d5364edfdef0fc57dd0830406b774e63eab6919
-
SHA256
d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd
-
SHA512
481a12839f4fd3cea53f59b8be1d522cb9df37b38512061ee06c877202978749f13875e8f095e14c46b2a13266f1a24c474794a2127bbbe41dea83f5c6b20166
-
SSDEEP
12288:200kVCDhjlrQaGeZ/lSvF08nfQ1eRSvnX:200kVCDhjlrQaLZtSvJfu28n
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" sysmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\456335\\sysmon.exe\"" sysmon.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe -
Executes dropped EXE 2 IoCs
pid Process 328 sysmon.exe 428 sysmon.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\System Monitor = "\"C:\\ProgramData\\456335\\sysmon.exe\"" sysmon.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sysmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientsvr.exe sysmon.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe sysmon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 940 set thread context of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 328 set thread context of 428 328 sysmon.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs regedit.exe 1 IoCs
pid Process 1508 regedit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 428 sysmon.exe 428 sysmon.exe 428 sysmon.exe 428 sysmon.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 428 sysmon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 428 sysmon.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 1696 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 28 PID 940 wrote to memory of 992 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 29 PID 940 wrote to memory of 992 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 29 PID 940 wrote to memory of 992 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 29 PID 940 wrote to memory of 992 940 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 29 PID 992 wrote to memory of 1508 992 cmd.exe 31 PID 992 wrote to memory of 1508 992 cmd.exe 31 PID 992 wrote to memory of 1508 992 cmd.exe 31 PID 992 wrote to memory of 1508 992 cmd.exe 31 PID 1696 wrote to memory of 328 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 33 PID 1696 wrote to memory of 328 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 33 PID 1696 wrote to memory of 328 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 33 PID 1696 wrote to memory of 328 1696 d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe 33 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 PID 328 wrote to memory of 428 328 sysmon.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe"C:\Users\Admin\AppData\Local\Temp\d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940 -
C:\Users\Admin\AppData\Local\Temp\d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe"C:\Users\Admin\AppData\Local\Temp\d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\ProgramData\456335\sysmon.exe"C:\ProgramData\456335\sysmon.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:328 -
C:\ProgramData\456335\sysmon.exe"C:\ProgramData\456335\sysmon.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:428
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ac.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s "C:\Users\Admin\AppData\Local\Temp\ac.bat"3⤵
- UAC bypass
- Runs regedit.exe
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51ab34989b3e13257b840a534734501c7
SHA13d5364edfdef0fc57dd0830406b774e63eab6919
SHA256d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd
SHA512481a12839f4fd3cea53f59b8be1d522cb9df37b38512061ee06c877202978749f13875e8f095e14c46b2a13266f1a24c474794a2127bbbe41dea83f5c6b20166
-
Filesize
1.2MB
MD51ab34989b3e13257b840a534734501c7
SHA13d5364edfdef0fc57dd0830406b774e63eab6919
SHA256d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd
SHA512481a12839f4fd3cea53f59b8be1d522cb9df37b38512061ee06c877202978749f13875e8f095e14c46b2a13266f1a24c474794a2127bbbe41dea83f5c6b20166
-
Filesize
1.2MB
MD51ab34989b3e13257b840a534734501c7
SHA13d5364edfdef0fc57dd0830406b774e63eab6919
SHA256d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd
SHA512481a12839f4fd3cea53f59b8be1d522cb9df37b38512061ee06c877202978749f13875e8f095e14c46b2a13266f1a24c474794a2127bbbe41dea83f5c6b20166
-
Filesize
256B
MD55901919c1b3ae845588953f254445dae
SHA13d24fd5c5a0f61c1b239c53600bcff11465a442f
SHA25612286ee34a77b701f9d6fbcd507c956961bf51d91283a8e094df221eea396577
SHA512e37602dae72a1ce8434d7cafd460637a88b372ab36ea5338dda9340b5637d9e2df44b9fea571d2fed1cd3ac28f4ddb8e1d6c16e563f8ec12c033df0f1522e0c7
-
Filesize
1.2MB
MD51ab34989b3e13257b840a534734501c7
SHA13d5364edfdef0fc57dd0830406b774e63eab6919
SHA256d06fffcff08b714a8068f57f3b7627b40a392fe0df18dcd69aeaa438ead43cdd
SHA512481a12839f4fd3cea53f59b8be1d522cb9df37b38512061ee06c877202978749f13875e8f095e14c46b2a13266f1a24c474794a2127bbbe41dea83f5c6b20166