Analysis
-
max time kernel
144s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:30
Static task
static1
Behavioral task
behavioral1
Sample
70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe
Resource
win7-20221111-en
General
-
Target
70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe
-
Size
490KB
-
MD5
d7c698bb604fa3cc4babbcc3a6c79a45
-
SHA1
a22e125421efcb351108e064944a4c9f10256df7
-
SHA256
70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
-
SHA512
bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba
-
SSDEEP
3072:Nuk730Xshh+ED085419v6fECJ7Y8XWIMij70ozw+sJF3XY0PGk:NT730jEYIK6fpJ7Y8HMK5KZ
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/Jpq3By4t
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Audio Realtek Driver.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Audio Realtek Driver\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1448 Audio Realtek Driver.exe 1704 Audio Realtek Driver.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 1448 Audio Realtek Driver.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 936 set thread context of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 1448 set thread context of 1704 1448 Audio Realtek Driver.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1540 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1704 Audio Realtek Driver.exe Token: SeDebugPrivilege 1704 Audio Realtek Driver.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 936 wrote to memory of 2000 936 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 28 PID 2000 wrote to memory of 1540 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 30 PID 2000 wrote to memory of 1540 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 30 PID 2000 wrote to memory of 1540 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 30 PID 2000 wrote to memory of 1540 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 30 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 2000 wrote to memory of 1448 2000 70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe 32 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33 PID 1448 wrote to memory of 1704 1448 Audio Realtek Driver.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe"C:\Users\Admin\AppData\Local\Temp\70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe"C:\Users\Admin\AppData\Local\Temp\70f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe'"3⤵
- Creates scheduled task(s)
PID:1540
-
-
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5d7c698bb604fa3cc4babbcc3a6c79a45
SHA1a22e125421efcb351108e064944a4c9f10256df7
SHA25670f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
SHA512bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba
-
Filesize
490KB
MD5d7c698bb604fa3cc4babbcc3a6c79a45
SHA1a22e125421efcb351108e064944a4c9f10256df7
SHA25670f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
SHA512bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba
-
Filesize
490KB
MD5d7c698bb604fa3cc4babbcc3a6c79a45
SHA1a22e125421efcb351108e064944a4c9f10256df7
SHA25670f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
SHA512bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba
-
Filesize
490KB
MD5d7c698bb604fa3cc4babbcc3a6c79a45
SHA1a22e125421efcb351108e064944a4c9f10256df7
SHA25670f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
SHA512bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba
-
Filesize
490KB
MD5d7c698bb604fa3cc4babbcc3a6c79a45
SHA1a22e125421efcb351108e064944a4c9f10256df7
SHA25670f4c33eda2d8cdd793fe141489293be4ec4f70e29a55d3a4c63bac9b27d451d
SHA512bff352f54437900b94ea2846310a00f8bfbf3732a45522e5e91130cd45bd43cf34798126b9e3d8554266760865a700382b55b4544a12808b588af95e30a5b6ba