Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe
Resource
win7-20221111-en
General
-
Target
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe
-
Size
147KB
-
MD5
2b6e9f65f812cb58554ef8e64fc37943
-
SHA1
c4dff76fb2ed2519300bd163ea62151d9e332651
-
SHA256
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
-
SHA512
f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
SSDEEP
3072:nz3gmOEzjQOM4rXiMrz7wuk730Xshb+jWi4nJG2FDzI:nTbBYOHLiM8T730jyHJG
Malware Config
Extracted
limerat
-
aes_key
IRj3SceatjDfweW/qMMw7g==
-
antivm
true
-
c2_url
https://pastebin.com/raw/Jpq3By4t
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Audio Realtek Driver.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Audio Realtek Driver\
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Audio Realtek Driver.exeAudio Realtek Driver.exepid Process 3712 Audio Realtek Driver.exe 4060 Audio Realtek Driver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exeAudio Realtek Driver.exedescription pid Process procid_target PID 4904 set thread context of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 3712 set thread context of 4060 3712 Audio Realtek Driver.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Audio Realtek Driver.exedescription pid Process Token: SeDebugPrivilege 4060 Audio Realtek Driver.exe Token: SeDebugPrivilege 4060 Audio Realtek Driver.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exeAudio Realtek Driver.exedescription pid Process procid_target PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 4904 wrote to memory of 2900 4904 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 81 PID 2900 wrote to memory of 2636 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 85 PID 2900 wrote to memory of 2636 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 85 PID 2900 wrote to memory of 2636 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 85 PID 2900 wrote to memory of 3712 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 87 PID 2900 wrote to memory of 3712 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 87 PID 2900 wrote to memory of 3712 2900 5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe 87 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88 PID 3712 wrote to memory of 4060 3712 Audio Realtek Driver.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"C:\Users\Admin\AppData\Local\Temp\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe'"3⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Audio Realtek Driver\Audio Realtek Driver.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7
-
Filesize
147KB
MD52b6e9f65f812cb58554ef8e64fc37943
SHA1c4dff76fb2ed2519300bd163ea62151d9e332651
SHA2565864c4d4d644e97124735542eefad82cee2db1bc1626d2d0c719c779d1e005d0
SHA512f63eba0d085d84bde238fa5635cde2bebcc965cd562e03f0aaaa81ddedbc8fc7f0b6d63530749b72a388d2fd22f8460c4f0355a2d626c27fe583c523d1d6d8c7