Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-03-2023 02:56
Behavioral task
behavioral1
Sample
32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe
Resource
win7-20230220-en
General
-
Target
32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe
-
Size
29KB
-
MD5
b14bbd5479f120504684161a942a51e6
-
SHA1
e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
-
SHA256
32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
-
SHA512
1c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08
-
SSDEEP
768:szPy6kLTt3dO/cmTCUuMthT36Hslrjy+b:kPkLTtspTzthT36HirjT
Malware Config
Extracted
limerat
-
aes_key
mrrobot
-
antivm
false
-
c2_url
https://pastebin.com/raw/mndrG70y
-
delay
3
-
download_payload
false
-
install
true
-
install_name
yes.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\pok\
-
usb_spread
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 584 yes.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1736 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 yes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 yes.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe 584 yes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 584 yes.exe Token: SeDebugPrivilege 584 yes.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1736 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 29 PID 1408 wrote to memory of 1736 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 29 PID 1408 wrote to memory of 1736 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 29 PID 1408 wrote to memory of 1736 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 29 PID 1408 wrote to memory of 584 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 31 PID 1408 wrote to memory of 584 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 31 PID 1408 wrote to memory of 584 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 31 PID 1408 wrote to memory of 584 1408 32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe"C:\Users\Admin\AppData\Local\Temp\32696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\pok\yes.exe'"2⤵
- Creates scheduled task(s)
PID:1736
-
-
C:\Users\Admin\AppData\Roaming\pok\yes.exe"C:\Users\Admin\AppData\Roaming\pok\yes.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5b14bbd5479f120504684161a942a51e6
SHA1e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
SHA25632696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
SHA5121c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08
-
Filesize
29KB
MD5b14bbd5479f120504684161a942a51e6
SHA1e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
SHA25632696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
SHA5121c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08
-
Filesize
29KB
MD5b14bbd5479f120504684161a942a51e6
SHA1e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
SHA25632696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
SHA5121c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08
-
Filesize
29KB
MD5b14bbd5479f120504684161a942a51e6
SHA1e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
SHA25632696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
SHA5121c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08
-
Filesize
29KB
MD5b14bbd5479f120504684161a942a51e6
SHA1e7e0ebaeea26e10f2dfbc71c3e9e4fe5122d4ec6
SHA25632696f5d14f82da2b483b853946a88eac8ef47abf8b163446011fd4eb37f06f9
SHA5121c93f16b074ccfe1ed124d10b457ae72bf6bdff004f1fad0ed94d396fb975d6486126ee1f12346c6cc7a17f651c456011a5386b6c3aad409bd27144e5a6d5c08