Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe
Resource
win7-20220901-en
General
-
Target
56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe
-
Size
251KB
-
MD5
d64c663ca513edb1e8ad004a6e6cbb3f
-
SHA1
a95aa92c2d8a5322421e60d6f108ac54eb907bb7
-
SHA256
56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
-
SHA512
69c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a
-
SSDEEP
6144:O/EDkB/TwAFZe1EB79p1ERueqJwCVqE6Js:OcABrDZe6BD1FhVH
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/p8Be8nNX
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Windows Update.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\Windows\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 600 Windows Update.exe 980 Windows Update.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 600 Windows Update.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1720 set thread context of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 600 set thread context of 980 600 Windows Update.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1004 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 980 Windows Update.exe Token: SeDebugPrivilege 980 Windows Update.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 1720 wrote to memory of 2012 1720 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 27 PID 2012 wrote to memory of 1004 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 29 PID 2012 wrote to memory of 1004 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 29 PID 2012 wrote to memory of 1004 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 29 PID 2012 wrote to memory of 1004 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 29 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 2012 wrote to memory of 600 2012 56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe 31 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32 PID 600 wrote to memory of 980 600 Windows Update.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe"C:\Users\Admin\AppData\Local\Temp\56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe"C:\Users\Admin\AppData\Local\Temp\56d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\Windows\Windows Update.exe'"3⤵
- Creates scheduled task(s)
PID:1004
-
-
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d64c663ca513edb1e8ad004a6e6cbb3f
SHA1a95aa92c2d8a5322421e60d6f108ac54eb907bb7
SHA25656d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
SHA51269c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a
-
Filesize
251KB
MD5d64c663ca513edb1e8ad004a6e6cbb3f
SHA1a95aa92c2d8a5322421e60d6f108ac54eb907bb7
SHA25656d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
SHA51269c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a
-
Filesize
251KB
MD5d64c663ca513edb1e8ad004a6e6cbb3f
SHA1a95aa92c2d8a5322421e60d6f108ac54eb907bb7
SHA25656d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
SHA51269c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a
-
Filesize
251KB
MD5d64c663ca513edb1e8ad004a6e6cbb3f
SHA1a95aa92c2d8a5322421e60d6f108ac54eb907bb7
SHA25656d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
SHA51269c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a
-
Filesize
251KB
MD5d64c663ca513edb1e8ad004a6e6cbb3f
SHA1a95aa92c2d8a5322421e60d6f108ac54eb907bb7
SHA25656d8a883c8b9d4a2a317f9ea3cb0a3f55281970c804c08f8de6482af04868da4
SHA51269c06dd77f92fd56c86804417c114e0cc4be9eaa80549dbbec937965c75b7644ce3b90fc7598bb1e9187aeeee1c39d57c51bb4ab2d555ef6ce4482159ec2808a