Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/01/2023, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe
Resource
win7-20220812-en
General
-
Target
39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe
-
Size
489KB
-
MD5
6b6219d4bdbe2afc7761374809bb6878
-
SHA1
d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
-
SHA256
39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
-
SHA512
559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d
-
SSDEEP
3072:yuk730Xshh+ED085419v6fECJ7Y8XWIMij70ozw+sJF3XY0PA:yT730jEYIK6fpJ7Y8HMK5K
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/Jpq3By4t
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Audio Realtek Driver.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Audio Realtek Driver\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1180 Audio Realtek Driver.exe 1376 Audio Realtek Driver.exe -
Loads dropped DLL 2 IoCs
pid Process 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 1180 Audio Realtek Driver.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1944 set thread context of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1180 set thread context of 1376 1180 Audio Realtek Driver.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1912 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 Audio Realtek Driver.exe Token: SeDebugPrivilege 1376 Audio Realtek Driver.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1944 wrote to memory of 1484 1944 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 28 PID 1484 wrote to memory of 1912 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 30 PID 1484 wrote to memory of 1912 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 30 PID 1484 wrote to memory of 1912 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 30 PID 1484 wrote to memory of 1912 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 30 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1484 wrote to memory of 1180 1484 39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe 32 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33 PID 1180 wrote to memory of 1376 1180 Audio Realtek Driver.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe"C:\Users\Admin\AppData\Local\Temp\39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe"C:\Users\Admin\AppData\Local\Temp\39cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe'"3⤵
- Creates scheduled task(s)
PID:1912
-
-
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD56b6219d4bdbe2afc7761374809bb6878
SHA1d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
SHA25639cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
SHA512559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d
-
Filesize
489KB
MD56b6219d4bdbe2afc7761374809bb6878
SHA1d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
SHA25639cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
SHA512559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d
-
Filesize
489KB
MD56b6219d4bdbe2afc7761374809bb6878
SHA1d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
SHA25639cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
SHA512559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d
-
Filesize
489KB
MD56b6219d4bdbe2afc7761374809bb6878
SHA1d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
SHA25639cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
SHA512559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d
-
Filesize
489KB
MD56b6219d4bdbe2afc7761374809bb6878
SHA1d38dbfdd5e427de71b0879a02ba5f0fe2c2daf67
SHA25639cf80b8b2f6267107baf94a021f6a59379d225b9ce839b367812eae8d3c8cfe
SHA512559c8a80cd12da4756480337397ae0bdbdd4085ff76dbeb7ba0873c257bd973073d3faabb02c18766fe77b3a551f5ee3fe3e5341e7ea619a70292315ad3f3d8d