Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe
Resource
win10v2004-20220901-en
General
-
Target
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe
-
Size
267KB
-
MD5
03f81f69db69634c13210bae6b4598f4
-
SHA1
6710382e4f58f97f99fca1ae6b189fcc67e9011d
-
SHA256
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5
-
SHA512
f7f8cd15d01fd26b03881811e27356179deaafe3afd6a1b7b908edbab0357f52d8c3753c179c666c6df18e32cd784252c4cd92cd7e1ff21bd1981228708aa1f8
-
SSDEEP
6144:LIl3YnIIHBJ0X4U3cCIUqWzInoBdm4XORyGB7W0OnyYLSAXQ:ElYhQ4UMCIMdw3BTOyYLlg
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
sysconfig.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\Windows\\system32\\clientsvr.exe\"" sysconfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\ProgramData\\973692\\sysconfig.exe\"" sysconfig.exe -
Executes dropped EXE 2 IoCs
Processes:
sysconfig.exesysconfig.exepid process 2220 sysconfig.exe 4264 sysconfig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sysconfig.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System Configuration = "\"C:\\ProgramData\\973692\\sysconfig.exe\"" sysconfig.exe -
Drops file in System32 directory 2 IoCs
Processes:
sysconfig.exedescription ioc process File created C:\Windows\SysWOW64\clientsvr.exe sysconfig.exe File opened for modification C:\Windows\SysWOW64\clientsvr.exe sysconfig.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exesysconfig.exedescription pid process target process PID 4928 set thread context of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 2220 set thread context of 4264 2220 sysconfig.exe sysconfig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sysconfig.exesysconfig.exeb9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exeb9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exepid process 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 2220 sysconfig.exe 2220 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe 4264 sysconfig.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exepid process 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exesysconfig.exesysconfig.exedescription pid process Token: SeDebugPrivilege 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe Token: SeDebugPrivilege 2220 sysconfig.exe Token: SeDebugPrivilege 4264 sysconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
sysconfig.exepid process 4264 sysconfig.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exeb9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exesysconfig.exesysconfig.exedescription pid process target process PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4928 wrote to memory of 1652 4928 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 1652 wrote to memory of 2220 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe sysconfig.exe PID 1652 wrote to memory of 2220 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe sysconfig.exe PID 1652 wrote to memory of 2220 1652 b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 2220 wrote to memory of 4264 2220 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 2220 4264 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 2220 4264 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 2220 4264 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 2220 4264 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 2220 4264 sysconfig.exe sysconfig.exe PID 4264 wrote to memory of 1652 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 1652 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 1652 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 1652 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 1652 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 4928 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 4928 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 4928 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 4928 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe PID 4264 wrote to memory of 4928 4264 sysconfig.exe b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe"C:\Users\Admin\AppData\Local\Temp\b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe"C:\Users\Admin\AppData\Local\Temp\b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\ProgramData\973692\sysconfig.exe"C:\ProgramData\973692\sysconfig.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\ProgramData\973692\sysconfig.exe"C:\ProgramData\973692\sysconfig.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD503f81f69db69634c13210bae6b4598f4
SHA16710382e4f58f97f99fca1ae6b189fcc67e9011d
SHA256b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5
SHA512f7f8cd15d01fd26b03881811e27356179deaafe3afd6a1b7b908edbab0357f52d8c3753c179c666c6df18e32cd784252c4cd92cd7e1ff21bd1981228708aa1f8
-
Filesize
267KB
MD503f81f69db69634c13210bae6b4598f4
SHA16710382e4f58f97f99fca1ae6b189fcc67e9011d
SHA256b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5
SHA512f7f8cd15d01fd26b03881811e27356179deaafe3afd6a1b7b908edbab0357f52d8c3753c179c666c6df18e32cd784252c4cd92cd7e1ff21bd1981228708aa1f8
-
Filesize
267KB
MD503f81f69db69634c13210bae6b4598f4
SHA16710382e4f58f97f99fca1ae6b189fcc67e9011d
SHA256b9694c6ae1d20d43f9ee72800810658b23ea0505afba30030fd474a22f3921f5
SHA512f7f8cd15d01fd26b03881811e27356179deaafe3afd6a1b7b908edbab0357f52d8c3753c179c666c6df18e32cd784252c4cd92cd7e1ff21bd1981228708aa1f8