Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08/02/2023, 16:51
Behavioral task
behavioral1
Sample
Checkeur netflix validator by crips.exe
Resource
win7-20221111-en
General
-
Target
Checkeur netflix validator by crips.exe
-
Size
205KB
-
MD5
d36f15bef276fd447e91af6ee9e38b28
-
SHA1
14836dd608efb4a0c552a4f370e5aafb340e2a5d
-
SHA256
6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
-
SHA512
ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
SSDEEP
3072:DDiv2GSyn88sH888wQ2wmVgMk/211h36vEcIyNTY4WZd/w1UwIwEoTqPMinXHx+i:XOayy
Malware Config
Extracted
limerat
86hac88hN1LipZ8Pzugfp65vMuPzKdYQudAKeKsjzU4RKRtTSSRSzZDNech2VwKy6yEPu8XZGYDsEd51M3vBG6ozAUqPpk3
-
aes_key
20.199.13.167
-
antivm
true
-
c2_url
https://pastebin.com/raw/sxNJt2ek
-
delay
3
-
download_payload
true
-
install
true
-
install_name
checker netflix.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 644 checker netflix.exe -
Loads dropped DLL 4 IoCs
pid Process 1704 Checkeur netflix validator by crips.exe 1704 Checkeur netflix validator by crips.exe 644 checker netflix.exe 644 checker netflix.exe -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Checkeur netflix validator by crips.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Checkeur netflix validator by crips.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum checker netflix.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 checker netflix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe 644 checker netflix.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 checker netflix.exe Token: SeDebugPrivilege 644 checker netflix.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1704 wrote to memory of 436 1704 Checkeur netflix validator by crips.exe 29 PID 1704 wrote to memory of 436 1704 Checkeur netflix validator by crips.exe 29 PID 1704 wrote to memory of 436 1704 Checkeur netflix validator by crips.exe 29 PID 1704 wrote to memory of 436 1704 Checkeur netflix validator by crips.exe 29 PID 1704 wrote to memory of 644 1704 Checkeur netflix validator by crips.exe 31 PID 1704 wrote to memory of 644 1704 Checkeur netflix validator by crips.exe 31 PID 1704 wrote to memory of 644 1704 Checkeur netflix validator by crips.exe 31 PID 1704 wrote to memory of 644 1704 Checkeur netflix validator by crips.exe 31 PID 644 wrote to memory of 1804 644 checker netflix.exe 32 PID 644 wrote to memory of 1804 644 checker netflix.exe 32 PID 644 wrote to memory of 1804 644 checker netflix.exe 32 PID 644 wrote to memory of 1804 644 checker netflix.exe 32 PID 644 wrote to memory of 1928 644 checker netflix.exe 34 PID 644 wrote to memory of 1928 644 checker netflix.exe 34 PID 644 wrote to memory of 1928 644 checker netflix.exe 34 PID 644 wrote to memory of 1928 644 checker netflix.exe 34 PID 1928 wrote to memory of 1488 1928 vbc.exe 36 PID 1928 wrote to memory of 1488 1928 vbc.exe 36 PID 1928 wrote to memory of 1488 1928 vbc.exe 36 PID 1928 wrote to memory of 1488 1928 vbc.exe 36 PID 644 wrote to memory of 1672 644 checker netflix.exe 37 PID 644 wrote to memory of 1672 644 checker netflix.exe 37 PID 644 wrote to memory of 1672 644 checker netflix.exe 37 PID 644 wrote to memory of 1672 644 checker netflix.exe 37 PID 1672 wrote to memory of 1060 1672 vbc.exe 39 PID 1672 wrote to memory of 1060 1672 vbc.exe 39 PID 1672 wrote to memory of 1060 1672 vbc.exe 39 PID 1672 wrote to memory of 1060 1672 vbc.exe 39 PID 644 wrote to memory of 1068 644 checker netflix.exe 40 PID 644 wrote to memory of 1068 644 checker netflix.exe 40 PID 644 wrote to memory of 1068 644 checker netflix.exe 40 PID 644 wrote to memory of 1068 644 checker netflix.exe 40 PID 1068 wrote to memory of 1200 1068 vbc.exe 42 PID 1068 wrote to memory of 1200 1068 vbc.exe 42 PID 1068 wrote to memory of 1200 1068 vbc.exe 42 PID 1068 wrote to memory of 1200 1068 vbc.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe"C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\checker netflix.exe'"2⤵
- Creates scheduled task(s)
PID:436
-
-
C:\Users\Admin\AppData\Roaming\checker netflix.exe"C:\Users\Admin\AppData\Roaming\checker netflix.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nou35bil\nou35bil.cmdline"3⤵PID:1804
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xiyaj001\xiyaj001.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE053.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE052.tmp"4⤵PID:1488
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a10dn1f3\a10dn1f3.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE0FE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE0FD.tmp"4⤵PID:1060
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2wflx53m\2wflx53m.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1D9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE1D8.tmp"4⤵PID:1200
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD55111ebe13912d8a5e7a2e837f1c84c5a
SHA12463af832b53647985f5ba802ffb2b4ab542ed84
SHA2566e46715b94eeae812b6883c4563c7858a5e4c11536db30c8ee6f45d2efb3ff16
SHA512c57f3c92a8e67b56ef08e224092eda2eda6f17269e4169a5c8fabc4853b00396b2cc3973367e4f2fa60ff6293de1ff1de2fe3b54405746753290f495630e23d2
-
Filesize
306B
MD5d68036887d3554b4d03e01554cdf3ed6
SHA1c51e558b1953022f2be6d5387c562661b1411cad
SHA25655a9450d33243dbf0e2ba1cf09a6d260df2d283c9af863592cfd02918b373b0c
SHA512fea558c116f41611191a34be3614d4125377db3595f86cca42e2059266b9178fa7204b85dd994cc820686ffb0c06ebe2b3faa0ff4d131f07b84624684602d152
-
Filesize
5KB
MD514b434cf0734560879a8a717d220f9b0
SHA1e6953340434068a115764ab6ae5b027899c19e2f
SHA2564670594b4ddba3ce98949bf6743dea20bf0f6e64b0fe531e3e494c9f5c048e54
SHA5127f7de67400e36e59596abc107f5b0f33f945b20d50fbaa7ec42ee1414b1b5deaa84db546ce9157d19e87329821098413fa7a5eb92209db2c2187c9a3cbb75929
-
Filesize
5KB
MD52e18b882af3f4ce80b0e52c1d97845a9
SHA17d5825a4914f11f9ecc0d075588efa93380682c0
SHA256f7f41ca5f329d6f10c838468640c1a4add7fe98e28cb050b71dec86afc850fa0
SHA512ef0b32331ebab85cb31c52217cd1146499b4ee798afc6b84356eeba26a93f030c9b72db62d5453b0ac44e6e4526d247dae176770daba3121c0885c738cd84a97
-
Filesize
5KB
MD5dac011cf1ec62c582f037e9bbfbe8ca1
SHA1cbb010c148cc641d4f251135838474fecb85da17
SHA2568abac91921a065f064dd8f69335a404e831f8d4d1143c43f59152bb10495caad
SHA512e9448a8ab44b2aabe0fa475dc6045710f13918712bbba11a3ab8c69deda67a53c80b0925a4240511461d32643bab969f1d320172ea603f5c522fa7843b514491
-
Filesize
232B
MD544e99675b985dfbbe9597e7f0d9d7007
SHA1d4180f69b59d22c9d5c5041337e8c995e571d1df
SHA256267b41ba93e063d9017057da132558cbb0131258cf818c488fba68b213c76f86
SHA51279e0111e38a8b5c2788fe8f68d82488909dde191b066ab3db226d521fc9f27e7354687dc8d1faf6f50331b383fda9cfc53e7cf8fa90316d22364af273946b925
-
Filesize
299B
MD585eb8f9a296df79f2093d2fb49499d0d
SHA1a85a59e9a1a4af7f33d0017efbc7beb42e80125c
SHA2562f394e987da683fe7cbbae00bb23571a19073d866918fa0b48523e072a11ef1e
SHA5123096ea4d013fdbb6a9c41a66f9be1d490732b59d9b67e0ba9cf3e077d25c756b0103356e5fc477202fc9b2370b2b22f798d0b00699ffc8d78ab475ccf1943911
-
Filesize
229B
MD5e39168f49f1a906366fb5f514f9dcf57
SHA1a153647bced7b0193317f533fea24363e9707268
SHA256fa61ecd794be1979fea8a4c9c0ee1a0e2a6252c1e7ce872ef66dac2b0ac7a5f7
SHA5125d019b9588bae234b7e214ef5508fe030f7b5425eb73f1a01ec1c1d568b4086cfab5d3987c1a2ea5c00422e0f44133efd4e48200c01c6f01839459230fdf70ca
-
Filesize
293B
MD5a9124d6d18df8ec7a39d713740933538
SHA1413384fdbfb33195f5b0645ed65ae6b503ea35d9
SHA2565ee9ccb14d1e57c90bea7d293e7e85ef75f805d37e8e0a082f9a15ae02fd0a8c
SHA51286892d4fa23746d0c8b90537791a9413e2ad7f5bf453fcde2dc3574adb177687d040bafbf88f9d76f52398580c3f9c5c783c2ba856d7f805a0e847a3e4017809
-
Filesize
4KB
MD5afe48426876eedacfdba91eb5176ecf8
SHA19da744cfff5427e51c2e7d091408539e03d80a05
SHA256387dee5276fe1bb1c2c247e24436b03af42c504b6c4c48ed74ddaeae63c7cd6e
SHA512f22abfb811911e8fdf4cb4df9d980beb9350e3be987debd4989b4a9afb0b0c45966600f013f2822adf26328335a6e39fe2326063aae8c24df5a3fcc9fcc9c926
-
Filesize
4KB
MD5a3487b776d060a4552667931e5382936
SHA1fe13f9c7c180fac565d5f4ce2c88b1fb8b8023ed
SHA256d12f09ec4b6d340bfbc6ab928f127a1482e3fd6a4eff6ec090875cdfad642f45
SHA512e06e4ea67baf67314ae42e23c9737c675f07528c9c66a0ddfc42084be4a0f086c97f10c75015c7f93bdf229e0790136844af227562107627de5b2af00d69985e
-
Filesize
4KB
MD5eb7a3f68ceac4a230a060cd5056dcc5a
SHA1b84047c053b4e1ace70fb47df7d6ffba8551370e
SHA256d7150437b76b84dc43c2919a4b52015c07e12771269ea8ff1c386499acd8042e
SHA51291339d546e1bce6bb0730c77041932e1e37a006484fd7a3fd2c8de4784df41bfa0b573559159d2f9aa0aec83ffcf7c909b7ad31b5242e983bdaf2edeb1ed8cdc
-
Filesize
233B
MD5cc122227735f18d536f3ade85111c46b
SHA1319137ebabd17d1ed9116c862b30f7a05e58cc69
SHA256db5c84d2444f36ac9b371f67eff4e5f597661525276d908a9bea82e7ccd927c9
SHA512f65b210cdf8cbedab77c258f548e645e6182e92bb22a4f9de646a35d79e60db0c8f2393d0e07145c691d60e27428e13cafe60075403163056b5e11b817ec851e
-
Filesize
301B
MD5471ab829406915097ea838d72d04dedf
SHA1a96f9c0a91cccd005cca7892b621b977c58779d1
SHA256cab332f8c0c85325f891e98615b99230ad5fe3064588ee8fe4d32aea05ebd540
SHA5120588ee6e4886cf1681a1546316d040061ab83a2fe76bc0c1811ae6ba76dc3e8be8ff0d4371995b372af0c5dbe100db2825f34365913656ebf20859ad57ce02a3
-
Filesize
6B
MD5ed5a964e00f4a03ab201efe358667914
SHA1d5d5370bbe3e3ce247c6f0825a9e16db2b8cd5c5
SHA256025fc246f13759c192cbbae2a68f2b59b6478f21b31a05d77483a87e417906dd
SHA5127f3b68419e0914cec2d853dcd8bbb45bf9ed77bdde4c9d6f2ea786b2ba99f3e49560512fbb26dd3f0189b595c0c108d32eb43f9a6f13bbc35b8c16b1561bd070
-
Filesize
4KB
MD52d14fe9fa6d3f40a6ecef5d5446a763a
SHA1f312cd8312a41c5aed3bb609be3f7e9a1bc4f0f5
SHA25603549b1b39e9b471c0c95a9dc673fd0c5be53ccfe81cf7811580aa59f2ed4fbb
SHA512562f34d14216f50a7641afd2d927ee2ee0512389b097112d111a88709241f9e777d79e7f1a3ef5dd172d6efbb68d65f0161e13020baeb74ff4c16b060e4111df
-
Filesize
4KB
MD5ee136b4101d0e996d462c2c5de0beb95
SHA165cfa6ea0637548488e869ed8ac02c87906c0a5b
SHA256d8b40d56ccc920590d12e1bb90c39e608e7176b97a0c4ad5acd36019e619b3d5
SHA512faaf7f3dfcef2e2bef2cea7b99f793d1d8e114846412fd5522daed5eb58eb453c2b87a34ce76da4da9880d0d09ab6cc227a32d02fbd90d6aba25a8f04a6dbc82
-
Filesize
4KB
MD5b2d35307c54450031b14fe5d694504d1
SHA117162851491fc499354ff1ec3dfa9912a07fb2c5
SHA256a8543223e7c0cf878d52102af6dd4df94a6089da16caec76ab7dd98ec9297012
SHA51202003d491e8f3d98cec43f815f9cc48036594a67052372bdfd47686e5cd3f38769b2ec43d06b560ebe43ef11813916ee006d633c84662b76bddc645d8c009886
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
Filesize
59KB
MD545ecaf5e82da876240f9be946923406c
SHA10e79bfe8ecc9b0a22430d1c13c423fbf0ac2a61d
SHA256087a0c5f789e964a2fbcb781015d3fc9d1757358bc63bb4e0b863b4dffdb6e4f
SHA5126fd4a25051414b2d70569a82dff5522606bfc34d3eaeea54d2d924bc9c92e479c7fda178208026308a1bf9c90bee9dbcaf8716d85c2ab7f383b43b0734329bc8
-
Filesize
59KB
MD545ecaf5e82da876240f9be946923406c
SHA10e79bfe8ecc9b0a22430d1c13c423fbf0ac2a61d
SHA256087a0c5f789e964a2fbcb781015d3fc9d1757358bc63bb4e0b863b4dffdb6e4f
SHA5126fd4a25051414b2d70569a82dff5522606bfc34d3eaeea54d2d924bc9c92e479c7fda178208026308a1bf9c90bee9dbcaf8716d85c2ab7f383b43b0734329bc8
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242