Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 15:22
Behavioral task
behavioral1
Sample
22df9b6c3a71b8dbbdef5d5bd09e445f.exe
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
General
-
Target
22df9b6c3a71b8dbbdef5d5bd09e445f.exe
-
Size
28KB
-
MD5
22df9b6c3a71b8dbbdef5d5bd09e445f
-
SHA1
0fdb02616c74e6eca4535d7b160a2e16a3e79943
-
SHA256
024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e
-
SHA512
2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3
-
SSDEEP
384:IB+Sbj6NKDRW16lVAH9BYVizqDyevPUQOvDKNrCeJE3WNgDnPr0ob7TyXUq7ZQrm:2pD06lVw9tc8QE45NknIgTyEql4Kj
Malware Config
Extracted
Family
limerat
Wallets
1B5aLZh6psoQttLGn9tpbdibiWqzyh4Jfv
Attributes
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/LJe9sUk5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe Token: SeDebugPrivilege 1296 22df9b6c3a71b8dbbdef5d5bd09e445f.exe