Analysis
-
max time kernel
151s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 15:05
Static task
static1
Behavioral task
behavioral1
Sample
bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe
Resource
win7-20221111-en
General
-
Target
bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe
-
Size
238KB
-
MD5
440d7a7357b48507cbf9857064638dfd
-
SHA1
fbf4d41cc343cb260d0c320ade3c1271959d6eba
-
SHA256
bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
-
SHA512
ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c
-
SSDEEP
3072:zTZ5rlD8r5Yg3g7xnyfKUze1zF9Olhc7tmtpsJpQuTejgu3nypr/7Rioqz5HKd/z:zTyYg3AnySQcWlqi1ERio6q2U
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/p8Be8nNX
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Windows Update.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\Windows\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1408 Windows Update.exe 1732 Windows Update.exe -
Loads dropped DLL 2 IoCs
pid Process 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 1408 Windows Update.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2040 set thread context of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 1408 set thread context of 1732 1408 Windows Update.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1356 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1732 Windows Update.exe Token: SeDebugPrivilege 1732 Windows Update.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 2040 wrote to memory of 1964 2040 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 27 PID 1964 wrote to memory of 1356 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 29 PID 1964 wrote to memory of 1356 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 29 PID 1964 wrote to memory of 1356 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 29 PID 1964 wrote to memory of 1356 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 29 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1964 wrote to memory of 1408 1964 bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe 31 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32 PID 1408 wrote to memory of 1732 1408 Windows Update.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe"C:\Users\Admin\AppData\Local\Temp\bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe"C:\Users\Admin\AppData\Local\Temp\bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\Windows\Windows Update.exe'"3⤵
- Creates scheduled task(s)
PID:1356
-
-
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5440d7a7357b48507cbf9857064638dfd
SHA1fbf4d41cc343cb260d0c320ade3c1271959d6eba
SHA256bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
SHA512ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c
-
Filesize
238KB
MD5440d7a7357b48507cbf9857064638dfd
SHA1fbf4d41cc343cb260d0c320ade3c1271959d6eba
SHA256bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
SHA512ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c
-
Filesize
238KB
MD5440d7a7357b48507cbf9857064638dfd
SHA1fbf4d41cc343cb260d0c320ade3c1271959d6eba
SHA256bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
SHA512ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c
-
Filesize
238KB
MD5440d7a7357b48507cbf9857064638dfd
SHA1fbf4d41cc343cb260d0c320ade3c1271959d6eba
SHA256bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
SHA512ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c
-
Filesize
238KB
MD5440d7a7357b48507cbf9857064638dfd
SHA1fbf4d41cc343cb260d0c320ade3c1271959d6eba
SHA256bf5ef36eb0ab0ecb25d80207e730177d07961df7b8266167074ddbc3baf5bcb3
SHA512ee709aa46f4506aa1ce26d0edcdbf9241749ed154e1a8ab2976b691f95469c8cdef168d59ad27773506e433debb0a28550f113f6bb5b7e1e12c994fcd2aa875c