Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 19:07
Static task
static1
Behavioral task
behavioral1
Sample
98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe
Resource
win7-20220901-en
General
-
Target
98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe
-
Size
332KB
-
MD5
a3e1ee0eaca1c17b5c1956bd09d198b0
-
SHA1
840f647a39d9d520441ebc4d8f58e215fbcafcd3
-
SHA256
98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7
-
SHA512
189bbf227ef0886d2a2154f9effa76882024ba5a21f2fbdcbb90dce28473e77a216e9a0a509c221c7add03be36f835819fc710128fe03d5f828638702294f59e
-
SSDEEP
6144:rP0d79h8N+c8ruZNX0d8vHDOCELIu/Q7gQQBjsj6tD4IA4T1qR:ro9CF+SNXUAHkP/SPQBjsrm1
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/p8Be8nNX
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Windows Update.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\Windows\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1220 Windows Update.exe 3464 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4888 set thread context of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 1220 set thread context of 3464 1220 Windows Update.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe Token: SeDebugPrivilege 1220 Windows Update.exe Token: SeDebugPrivilege 3464 Windows Update.exe Token: SeDebugPrivilege 3464 Windows Update.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 4888 wrote to memory of 3600 4888 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 81 PID 3600 wrote to memory of 4896 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 83 PID 3600 wrote to memory of 4896 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 83 PID 3600 wrote to memory of 4896 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 83 PID 3600 wrote to memory of 1220 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 85 PID 3600 wrote to memory of 1220 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 85 PID 3600 wrote to memory of 1220 3600 98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe 85 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86 PID 1220 wrote to memory of 3464 1220 Windows Update.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe"C:\Users\Admin\AppData\Local\Temp\98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe"C:\Users\Admin\AppData\Local\Temp\98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\Windows\Windows Update.exe'"3⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\Windows\Windows Update.exe"C:\Users\Admin\Windows\Windows Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\98bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7.exe.log
Filesize425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
332KB
MD5a3e1ee0eaca1c17b5c1956bd09d198b0
SHA1840f647a39d9d520441ebc4d8f58e215fbcafcd3
SHA25698bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7
SHA512189bbf227ef0886d2a2154f9effa76882024ba5a21f2fbdcbb90dce28473e77a216e9a0a509c221c7add03be36f835819fc710128fe03d5f828638702294f59e
-
Filesize
332KB
MD5a3e1ee0eaca1c17b5c1956bd09d198b0
SHA1840f647a39d9d520441ebc4d8f58e215fbcafcd3
SHA25698bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7
SHA512189bbf227ef0886d2a2154f9effa76882024ba5a21f2fbdcbb90dce28473e77a216e9a0a509c221c7add03be36f835819fc710128fe03d5f828638702294f59e
-
Filesize
332KB
MD5a3e1ee0eaca1c17b5c1956bd09d198b0
SHA1840f647a39d9d520441ebc4d8f58e215fbcafcd3
SHA25698bd317536a3897e12a06396535593e6df8d2bef351f0f4e4f248e71c26cbbc7
SHA512189bbf227ef0886d2a2154f9effa76882024ba5a21f2fbdcbb90dce28473e77a216e9a0a509c221c7add03be36f835819fc710128fe03d5f828638702294f59e