Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2023, 16:51

General

  • Target

    Checkeur netflix validator by crips.exe

  • Size

    205KB

  • MD5

    d36f15bef276fd447e91af6ee9e38b28

  • SHA1

    14836dd608efb4a0c552a4f370e5aafb340e2a5d

  • SHA256

    6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

  • SHA512

    ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242

  • SSDEEP

    3072:DDiv2GSyn88sH888wQ2wmVgMk/211h36vEcIyNTY4WZd/w1UwIwEoTqPMinXHx+i:XOayy

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

86hac88hN1LipZ8Pzugfp65vMuPzKdYQudAKeKsjzU4RKRtTSSRSzZDNech2VwKy6yEPu8XZGYDsEd51M3vBG6ozAUqPpk3

Attributes
  • aes_key

    20.199.13.167

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/sxNJt2ek

  • delay

    3

  • download_payload

    true

  • install

    true

  • install_name

    checker netflix.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe
    "C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\checker netflix.exe'"
      2⤵
      • Creates scheduled task(s)
      PID:436
    • C:\Users\Admin\AppData\Roaming\checker netflix.exe
      "C:\Users\Admin\AppData\Roaming\checker netflix.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nou35bil\nou35bil.cmdline"
        3⤵
          PID:1804
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xiyaj001\xiyaj001.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE053.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE052.tmp"
            4⤵
              PID:1488
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a10dn1f3\a10dn1f3.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1672
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE0FE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE0FD.tmp"
              4⤵
                PID:1060
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2wflx53m\2wflx53m.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1068
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1D9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE1D8.tmp"
                4⤵
                  PID:1200

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2wflx53m\2wflx53m.0.vb

            Filesize

            236B

            MD5

            5111ebe13912d8a5e7a2e837f1c84c5a

            SHA1

            2463af832b53647985f5ba802ffb2b4ab542ed84

            SHA256

            6e46715b94eeae812b6883c4563c7858a5e4c11536db30c8ee6f45d2efb3ff16

            SHA512

            c57f3c92a8e67b56ef08e224092eda2eda6f17269e4169a5c8fabc4853b00396b2cc3973367e4f2fa60ff6293de1ff1de2fe3b54405746753290f495630e23d2

          • C:\Users\Admin\AppData\Local\Temp\2wflx53m\2wflx53m.cmdline

            Filesize

            306B

            MD5

            d68036887d3554b4d03e01554cdf3ed6

            SHA1

            c51e558b1953022f2be6d5387c562661b1411cad

            SHA256

            55a9450d33243dbf0e2ba1cf09a6d260df2d283c9af863592cfd02918b373b0c

            SHA512

            fea558c116f41611191a34be3614d4125377db3595f86cca42e2059266b9178fa7204b85dd994cc820686ffb0c06ebe2b3faa0ff4d131f07b84624684602d152

          • C:\Users\Admin\AppData\Local\Temp\RESE053.tmp

            Filesize

            5KB

            MD5

            14b434cf0734560879a8a717d220f9b0

            SHA1

            e6953340434068a115764ab6ae5b027899c19e2f

            SHA256

            4670594b4ddba3ce98949bf6743dea20bf0f6e64b0fe531e3e494c9f5c048e54

            SHA512

            7f7de67400e36e59596abc107f5b0f33f945b20d50fbaa7ec42ee1414b1b5deaa84db546ce9157d19e87329821098413fa7a5eb92209db2c2187c9a3cbb75929

          • C:\Users\Admin\AppData\Local\Temp\RESE0FE.tmp

            Filesize

            5KB

            MD5

            2e18b882af3f4ce80b0e52c1d97845a9

            SHA1

            7d5825a4914f11f9ecc0d075588efa93380682c0

            SHA256

            f7f41ca5f329d6f10c838468640c1a4add7fe98e28cb050b71dec86afc850fa0

            SHA512

            ef0b32331ebab85cb31c52217cd1146499b4ee798afc6b84356eeba26a93f030c9b72db62d5453b0ac44e6e4526d247dae176770daba3121c0885c738cd84a97

          • C:\Users\Admin\AppData\Local\Temp\RESE1D9.tmp

            Filesize

            5KB

            MD5

            dac011cf1ec62c582f037e9bbfbe8ca1

            SHA1

            cbb010c148cc641d4f251135838474fecb85da17

            SHA256

            8abac91921a065f064dd8f69335a404e831f8d4d1143c43f59152bb10495caad

            SHA512

            e9448a8ab44b2aabe0fa475dc6045710f13918712bbba11a3ab8c69deda67a53c80b0925a4240511461d32643bab969f1d320172ea603f5c522fa7843b514491

          • C:\Users\Admin\AppData\Local\Temp\a10dn1f3\a10dn1f3.0.vb

            Filesize

            232B

            MD5

            44e99675b985dfbbe9597e7f0d9d7007

            SHA1

            d4180f69b59d22c9d5c5041337e8c995e571d1df

            SHA256

            267b41ba93e063d9017057da132558cbb0131258cf818c488fba68b213c76f86

            SHA512

            79e0111e38a8b5c2788fe8f68d82488909dde191b066ab3db226d521fc9f27e7354687dc8d1faf6f50331b383fda9cfc53e7cf8fa90316d22364af273946b925

          • C:\Users\Admin\AppData\Local\Temp\a10dn1f3\a10dn1f3.cmdline

            Filesize

            299B

            MD5

            85eb8f9a296df79f2093d2fb49499d0d

            SHA1

            a85a59e9a1a4af7f33d0017efbc7beb42e80125c

            SHA256

            2f394e987da683fe7cbbae00bb23571a19073d866918fa0b48523e072a11ef1e

            SHA512

            3096ea4d013fdbb6a9c41a66f9be1d490732b59d9b67e0ba9cf3e077d25c756b0103356e5fc477202fc9b2370b2b22f798d0b00699ffc8d78ab475ccf1943911

          • C:\Users\Admin\AppData\Local\Temp\nou35bil\nou35bil.0.vb

            Filesize

            229B

            MD5

            e39168f49f1a906366fb5f514f9dcf57

            SHA1

            a153647bced7b0193317f533fea24363e9707268

            SHA256

            fa61ecd794be1979fea8a4c9c0ee1a0e2a6252c1e7ce872ef66dac2b0ac7a5f7

            SHA512

            5d019b9588bae234b7e214ef5508fe030f7b5425eb73f1a01ec1c1d568b4086cfab5d3987c1a2ea5c00422e0f44133efd4e48200c01c6f01839459230fdf70ca

          • C:\Users\Admin\AppData\Local\Temp\nou35bil\nou35bil.cmdline

            Filesize

            293B

            MD5

            a9124d6d18df8ec7a39d713740933538

            SHA1

            413384fdbfb33195f5b0645ed65ae6b503ea35d9

            SHA256

            5ee9ccb14d1e57c90bea7d293e7e85ef75f805d37e8e0a082f9a15ae02fd0a8c

            SHA512

            86892d4fa23746d0c8b90537791a9413e2ad7f5bf453fcde2dc3574adb177687d040bafbf88f9d76f52398580c3f9c5c783c2ba856d7f805a0e847a3e4017809

          • C:\Users\Admin\AppData\Local\Temp\vbcE052.tmp

            Filesize

            4KB

            MD5

            afe48426876eedacfdba91eb5176ecf8

            SHA1

            9da744cfff5427e51c2e7d091408539e03d80a05

            SHA256

            387dee5276fe1bb1c2c247e24436b03af42c504b6c4c48ed74ddaeae63c7cd6e

            SHA512

            f22abfb811911e8fdf4cb4df9d980beb9350e3be987debd4989b4a9afb0b0c45966600f013f2822adf26328335a6e39fe2326063aae8c24df5a3fcc9fcc9c926

          • C:\Users\Admin\AppData\Local\Temp\vbcE0FD.tmp

            Filesize

            4KB

            MD5

            a3487b776d060a4552667931e5382936

            SHA1

            fe13f9c7c180fac565d5f4ce2c88b1fb8b8023ed

            SHA256

            d12f09ec4b6d340bfbc6ab928f127a1482e3fd6a4eff6ec090875cdfad642f45

            SHA512

            e06e4ea67baf67314ae42e23c9737c675f07528c9c66a0ddfc42084be4a0f086c97f10c75015c7f93bdf229e0790136844af227562107627de5b2af00d69985e

          • C:\Users\Admin\AppData\Local\Temp\vbcE1D8.tmp

            Filesize

            4KB

            MD5

            eb7a3f68ceac4a230a060cd5056dcc5a

            SHA1

            b84047c053b4e1ace70fb47df7d6ffba8551370e

            SHA256

            d7150437b76b84dc43c2919a4b52015c07e12771269ea8ff1c386499acd8042e

            SHA512

            91339d546e1bce6bb0730c77041932e1e37a006484fd7a3fd2c8de4784df41bfa0b573559159d2f9aa0aec83ffcf7c909b7ad31b5242e983bdaf2edeb1ed8cdc

          • C:\Users\Admin\AppData\Local\Temp\xiyaj001\xiyaj001.0.vb

            Filesize

            233B

            MD5

            cc122227735f18d536f3ade85111c46b

            SHA1

            319137ebabd17d1ed9116c862b30f7a05e58cc69

            SHA256

            db5c84d2444f36ac9b371f67eff4e5f597661525276d908a9bea82e7ccd927c9

            SHA512

            f65b210cdf8cbedab77c258f548e645e6182e92bb22a4f9de646a35d79e60db0c8f2393d0e07145c691d60e27428e13cafe60075403163056b5e11b817ec851e

          • C:\Users\Admin\AppData\Local\Temp\xiyaj001\xiyaj001.cmdline

            Filesize

            301B

            MD5

            471ab829406915097ea838d72d04dedf

            SHA1

            a96f9c0a91cccd005cca7892b621b977c58779d1

            SHA256

            cab332f8c0c85325f891e98615b99230ad5fe3064588ee8fe4d32aea05ebd540

            SHA512

            0588ee6e4886cf1681a1546316d040061ab83a2fe76bc0c1811ae6ba76dc3e8be8ff0d4371995b372af0c5dbe100db2825f34365913656ebf20859ad57ce02a3

          • C:\Users\Admin\AppData\Roaming\Lime\ICO\GoogleChrome.ico

            Filesize

            6B

            MD5

            ed5a964e00f4a03ab201efe358667914

            SHA1

            d5d5370bbe3e3ce247c6f0825a9e16db2b8cd5c5

            SHA256

            025fc246f13759c192cbbae2a68f2b59b6478f21b31a05d77483a87e417906dd

            SHA512

            7f3b68419e0914cec2d853dcd8bbb45bf9ed77bdde4c9d6f2ea786b2ba99f3e49560512fbb26dd3f0189b595c0c108d32eb43f9a6f13bbc35b8c16b1561bd070

          • C:\Users\Admin\AppData\Roaming\Lime\ICO\InternetExplorer.ico

            Filesize

            4KB

            MD5

            2d14fe9fa6d3f40a6ecef5d5446a763a

            SHA1

            f312cd8312a41c5aed3bb609be3f7e9a1bc4f0f5

            SHA256

            03549b1b39e9b471c0c95a9dc673fd0c5be53ccfe81cf7811580aa59f2ed4fbb

            SHA512

            562f34d14216f50a7641afd2d927ee2ee0512389b097112d111a88709241f9e777d79e7f1a3ef5dd172d6efbb68d65f0161e13020baeb74ff4c16b060e4111df

          • C:\Users\Admin\AppData\Roaming\Lime\ICO\WindowsExplorer.ico

            Filesize

            4KB

            MD5

            ee136b4101d0e996d462c2c5de0beb95

            SHA1

            65cfa6ea0637548488e869ed8ac02c87906c0a5b

            SHA256

            d8b40d56ccc920590d12e1bb90c39e608e7176b97a0c4ad5acd36019e619b3d5

            SHA512

            faaf7f3dfcef2e2bef2cea7b99f793d1d8e114846412fd5522daed5eb58eb453c2b87a34ce76da4da9880d0d09ab6cc227a32d02fbd90d6aba25a8f04a6dbc82

          • C:\Users\Admin\AppData\Roaming\Lime\ICO\WindowsMediaPlayer.ico

            Filesize

            4KB

            MD5

            b2d35307c54450031b14fe5d694504d1

            SHA1

            17162851491fc499354ff1ec3dfa9912a07fb2c5

            SHA256

            a8543223e7c0cf878d52102af6dd4df94a6089da16caec76ab7dd98ec9297012

            SHA512

            02003d491e8f3d98cec43f815f9cc48036594a67052372bdfd47686e5cd3f38769b2ec43d06b560ebe43ef11813916ee006d633c84662b76bddc645d8c009886

          • C:\Users\Admin\AppData\Roaming\checker netflix.exe

            Filesize

            205KB

            MD5

            d36f15bef276fd447e91af6ee9e38b28

            SHA1

            14836dd608efb4a0c552a4f370e5aafb340e2a5d

            SHA256

            6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

            SHA512

            ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242

          • C:\Users\Admin\AppData\Roaming\checker netflix.exe

            Filesize

            205KB

            MD5

            d36f15bef276fd447e91af6ee9e38b28

            SHA1

            14836dd608efb4a0c552a4f370e5aafb340e2a5d

            SHA256

            6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

            SHA512

            ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242

          • \Users\Admin\AppData\Roaming\IconLib.dll

            Filesize

            59KB

            MD5

            45ecaf5e82da876240f9be946923406c

            SHA1

            0e79bfe8ecc9b0a22430d1c13c423fbf0ac2a61d

            SHA256

            087a0c5f789e964a2fbcb781015d3fc9d1757358bc63bb4e0b863b4dffdb6e4f

            SHA512

            6fd4a25051414b2d70569a82dff5522606bfc34d3eaeea54d2d924bc9c92e479c7fda178208026308a1bf9c90bee9dbcaf8716d85c2ab7f383b43b0734329bc8

          • \Users\Admin\AppData\Roaming\IconLib.dll

            Filesize

            59KB

            MD5

            45ecaf5e82da876240f9be946923406c

            SHA1

            0e79bfe8ecc9b0a22430d1c13c423fbf0ac2a61d

            SHA256

            087a0c5f789e964a2fbcb781015d3fc9d1757358bc63bb4e0b863b4dffdb6e4f

            SHA512

            6fd4a25051414b2d70569a82dff5522606bfc34d3eaeea54d2d924bc9c92e479c7fda178208026308a1bf9c90bee9dbcaf8716d85c2ab7f383b43b0734329bc8

          • \Users\Admin\AppData\Roaming\checker netflix.exe

            Filesize

            205KB

            MD5

            d36f15bef276fd447e91af6ee9e38b28

            SHA1

            14836dd608efb4a0c552a4f370e5aafb340e2a5d

            SHA256

            6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

            SHA512

            ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242

          • \Users\Admin\AppData\Roaming\checker netflix.exe

            Filesize

            205KB

            MD5

            d36f15bef276fd447e91af6ee9e38b28

            SHA1

            14836dd608efb4a0c552a4f370e5aafb340e2a5d

            SHA256

            6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334

            SHA512

            ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242

          • memory/644-64-0x00000000006A0000-0x00000000006BC000-memory.dmp

            Filesize

            112KB

          • memory/644-68-0x00000000007F0000-0x0000000000806000-memory.dmp

            Filesize

            88KB

          • memory/644-62-0x0000000000E70000-0x0000000000EAA000-memory.dmp

            Filesize

            232KB

          • memory/644-65-0x00000000007D0000-0x00000000007F2000-memory.dmp

            Filesize

            136KB

          • memory/1704-54-0x0000000000F30000-0x0000000000F6A000-memory.dmp

            Filesize

            232KB

          • memory/1704-56-0x0000000075831000-0x0000000075833000-memory.dmp

            Filesize

            8KB