Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2023 09:26

General

  • Target

    1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe

  • Size

    1.5MB

  • MD5

    4c6675bcb4996241e68fd4ac2fad45c2

  • SHA1

    e62124ae24bc980199900e5a7c392191882118cc

  • SHA256

    1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b

  • SHA512

    bf385448e4791a67e6fd79cc2310835320c7c590e95d2933eb661a5fd41712f8f6d3760410d733757effc08da32160b58909b14f8eb295b68594efa885542ab9

  • SSDEEP

    24576:C4Zv8wgIQYygkY9lA6pnLZGBrgxFdgLOjRFqD3Fd2U+1A4EKazGG7/52rhUVrp:CkYIhkeTYBrUyOjjU+1ArF/El+9

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

1B5aLZh6psoQttLGn9tpbdibiWqzyh4Jfv

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/LJe9sUk5

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\14982.exe
      "C:\Users\Admin\AppData\Local\Temp\14982.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2160
    • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe
      C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe
      2⤵
        PID:2804
      • C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe
        C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
          • Modifies Installed Components in the registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Windows\system32\ctfmon.exe
            ctfmon.exe
            4⤵
              PID:1524
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC' -Value '"C:\Users\Admin\AppData\Local\Temp\1612e6bb0cce702554b3db27bf98c140772bc85df30d210f2082cb7b01b5148b_JC.exe"' -PropertyType 'String'
            3⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2712

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • C:\Users\Admin\AppData\Local\Temp\Cab9791.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\Tar97B3.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • \Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • \Users\Admin\AppData\Local\Temp\14982.exe

        Filesize

        28KB

        MD5

        22df9b6c3a71b8dbbdef5d5bd09e445f

        SHA1

        0fdb02616c74e6eca4535d7b160a2e16a3e79943

        SHA256

        024cce95a63124cd3cbfe3f21fbacf8437fd288717fce379006064aa2a97641e

        SHA512

        2ada99e227f30c10453d588bbb6b40bdff55825a36bf5fcc16df084dbdca069e6cc0ac6aa612addd0393f8dc8751b3efc1c9626e2d78459faf9d348d1f46aaf3

      • memory/1504-3382-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1504-2678-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1504-2677-0x0000000000400000-0x0000000000500000-memory.dmp

        Filesize

        1024KB

      • memory/1704-57-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-63-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-9-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-13-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-11-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-15-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-19-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-17-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-23-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-21-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-27-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-29-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-25-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-33-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-31-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-35-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-37-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-39-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-41-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-43-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-51-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-49-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-47-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-45-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-61-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-59-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-5-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-55-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-53-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-67-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-65-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-7-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-801-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1704-899-0x0000000004B90000-0x0000000004BD0000-memory.dmp

        Filesize

        256KB

      • memory/1704-1328-0x0000000000450000-0x0000000000451000-memory.dmp

        Filesize

        4KB

      • memory/1704-1329-0x0000000005180000-0x000000000524C000-memory.dmp

        Filesize

        816KB

      • memory/1704-1330-0x0000000000AF0000-0x0000000000B3C000-memory.dmp

        Filesize

        304KB

      • memory/1704-0-0x0000000001190000-0x0000000001312000-memory.dmp

        Filesize

        1.5MB

      • memory/1704-1-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1704-1356-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1704-2-0x0000000004B90000-0x0000000004BD0000-memory.dmp

        Filesize

        256KB

      • memory/1704-3-0x00000000049F0000-0x0000000004B58000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-4-0x00000000049F0000-0x0000000004B52000-memory.dmp

        Filesize

        1.4MB

      • memory/2028-3384-0x00000000040E0000-0x00000000040E1000-memory.dmp

        Filesize

        4KB

      • memory/2028-3299-0x00000000040E0000-0x00000000040E1000-memory.dmp

        Filesize

        4KB

      • memory/2160-1342-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2160-2626-0x0000000004260000-0x00000000042A0000-memory.dmp

        Filesize

        256KB

      • memory/2160-1341-0x0000000000170000-0x000000000017C000-memory.dmp

        Filesize

        48KB

      • memory/2160-2625-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2160-3350-0x0000000004260000-0x00000000042A0000-memory.dmp

        Filesize

        256KB

      • memory/2588-1361-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2588-1360-0x0000000000400000-0x00000000004AC000-memory.dmp

        Filesize

        688KB

      • memory/2588-3310-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2588-2668-0x0000000001100000-0x0000000001140000-memory.dmp

        Filesize

        256KB

      • memory/2588-1362-0x0000000000B60000-0x0000000000C22000-memory.dmp

        Filesize

        776KB

      • memory/2588-2627-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2712-3368-0x000000006F300000-0x000000006F8AB000-memory.dmp

        Filesize

        5.7MB

      • memory/2712-3370-0x000000006F300000-0x000000006F8AB000-memory.dmp

        Filesize

        5.7MB

      • memory/2712-3383-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2712-3385-0x000000006F300000-0x000000006F8AB000-memory.dmp

        Filesize

        5.7MB

      • memory/2712-3386-0x000000006F300000-0x000000006F8AB000-memory.dmp

        Filesize

        5.7MB

      • memory/2712-3387-0x000000006F300000-0x000000006F8AB000-memory.dmp

        Filesize

        5.7MB