Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2023 19:16

General

  • Target

    ChromiumUpdateexeexeexeex.exe

  • Size

    44KB

  • MD5

    fda53976d89ab903557b9528cc2fb91d

  • SHA1

    c42781c8328b1dbb70c3571fcadd9f674c5df333

  • SHA256

    865f0c77242db6c8bc7853d56c80df25d0131978cc693fc2a05a392316cfc566

  • SHA512

    7b7f0efd96a67026aea1661fee86358557b89d67ed8c96c9125a61958570e00e9cab2cc84950cdd8eb799cdc8e5f2cdc0d1c90da2b0c891920b700c203e44444

  • SSDEEP

    768:TpYT6H3wjsG/YS445NoDamKOAZB6in1WjctC1iTIPYe:TpH3wj9/ZF8DHoBGgCuIP7

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

bc1qwycfayk08cnnj2ng0emn8yeek6hkdkdvue952a

Attributes
  • aes_key

    vELKIjFPTOEs91pZ1LF+7gl6DaQq5z3kH6Q5FyFhRO8/6K8Xpl7YLTgTqwUttOW5

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChromiumUpdateexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\ChromiumUpdateexeexeexeex.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2400-54-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/2400-55-0x0000000004E70000-0x0000000004EB0000-memory.dmp

    Filesize

    256KB

  • memory/2400-56-0x0000000004E70000-0x0000000004EB0000-memory.dmp

    Filesize

    256KB