Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 16:51
Behavioral task
behavioral1
Sample
Checkeur netflix validator by crips.exe
Resource
win7-20221111-en
General
-
Target
Checkeur netflix validator by crips.exe
-
Size
205KB
-
MD5
d36f15bef276fd447e91af6ee9e38b28
-
SHA1
14836dd608efb4a0c552a4f370e5aafb340e2a5d
-
SHA256
6d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
-
SHA512
ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
SSDEEP
3072:DDiv2GSyn88sH888wQ2wmVgMk/211h36vEcIyNTY4WZd/w1UwIwEoTqPMinXHx+i:XOayy
Malware Config
Extracted
limerat
86hac88hN1LipZ8Pzugfp65vMuPzKdYQudAKeKsjzU4RKRtTSSRSzZDNech2VwKy6yEPu8XZGYDsEd51M3vBG6ozAUqPpk3
-
aes_key
20.199.13.167
-
antivm
true
-
c2_url
https://pastebin.com/raw/sxNJt2ek
-
delay
3
-
download_payload
true
-
install
true
-
install_name
checker netflix.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Checkeur netflix validator by crips.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 checker netflix.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum checker netflix.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 checker netflix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Checkeur netflix validator by crips.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Checkeur netflix validator by crips.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe 4864 checker netflix.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4864 checker netflix.exe Token: SeDebugPrivilege 4864 checker netflix.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4764 4656 Checkeur netflix validator by crips.exe 81 PID 4656 wrote to memory of 4764 4656 Checkeur netflix validator by crips.exe 81 PID 4656 wrote to memory of 4764 4656 Checkeur netflix validator by crips.exe 81 PID 4656 wrote to memory of 4864 4656 Checkeur netflix validator by crips.exe 83 PID 4656 wrote to memory of 4864 4656 Checkeur netflix validator by crips.exe 83 PID 4656 wrote to memory of 4864 4656 Checkeur netflix validator by crips.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe"C:\Users\Admin\AppData\Local\Temp\Checkeur netflix validator by crips.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\checker netflix.exe'"2⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\Users\Admin\AppData\Roaming\checker netflix.exe"C:\Users\Admin\AppData\Roaming\checker netflix.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242
-
Filesize
205KB
MD5d36f15bef276fd447e91af6ee9e38b28
SHA114836dd608efb4a0c552a4f370e5aafb340e2a5d
SHA2566d08ed6acac230f41d9d6fe2a26245eeaf08c84bc7a66fddc764d82d6786d334
SHA512ada85b6334f457b1217d4d08246f4ccb23bfb22a024aa6a7e1df00c9e83d72b58020b45fefc43eddfa41c54743b01f73632da2ff7b7bcee01d401235289ab242