Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe
Resource
win7-20221111-en
General
-
Target
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe
-
Size
147KB
-
MD5
2b6e9f65f812cb58554ef8e64fc37943
-
SHA1
c4dff76fb2ed2519300bd163ea62151d9e332651
-
SHA256
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
-
SHA512
f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
SSDEEP
3072:nz3gmOEzjQOM4rXiMrz7wuk730Xshb+jWi4nJG2FDzI:nTbBYOHLiM8T730jyHJG
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/Jpq3By4t
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Audio Realtek Driver.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Audio Realtek Driver\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Audio Realtek Driver.exeAudio Realtek Driver.exepid Process 1080 Audio Realtek Driver.exe 760 Audio Realtek Driver.exe -
Loads dropped DLL 2 IoCs
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exeAudio Realtek Driver.exepid Process 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 1080 Audio Realtek Driver.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exeAudio Realtek Driver.exedescription pid Process procid_target PID 1972 set thread context of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1080 set thread context of 760 1080 Audio Realtek Driver.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Audio Realtek Driver.exedescription pid Process Token: SeDebugPrivilege 760 Audio Realtek Driver.exe Token: SeDebugPrivilege 760 Audio Realtek Driver.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exeAudio Realtek Driver.exedescription pid Process procid_target PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 1972 wrote to memory of 592 1972 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 28 PID 592 wrote to memory of 1888 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 30 PID 592 wrote to memory of 1888 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 30 PID 592 wrote to memory of 1888 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 30 PID 592 wrote to memory of 1888 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 30 PID 592 wrote to memory of 1080 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 32 PID 592 wrote to memory of 1080 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 32 PID 592 wrote to memory of 1080 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 32 PID 592 wrote to memory of 1080 592 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 32 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33 PID 1080 wrote to memory of 760 1080 Audio Realtek Driver.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe'"3⤵
- Creates scheduled task(s)
PID:1888
-
-
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7