Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2023 14:45

General

  • Target

    d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef.exe

  • Size

    28KB

  • MD5

    93bafe094ecbdbdb6fb425b699de95b7

  • SHA1

    dc2883aed46aea8b44e3fbc8482fa3332b8129b3

  • SHA256

    d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef

  • SHA512

    631aa5f7f6da70233404419c5714618a690766aede518ceca5d45b9aa9053417748610699fb6120f10644fe7df79459b6ae820402213e43ad26a53420f7e8728

  • SSDEEP

    384:pB+Sbj6NKYBSs6/DAH9CXYqDNQWFs5R3pqvDKNrCeJE3WNgnyzE3384GMy8lCEQ3:DpYBP6/Dw9INa5R3po45NLE8IJAj

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    1

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/5pYdnMzj

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    services64.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \Microsoft\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/5pYdnMzj

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef.exe
    "C:\Users\Admin\AppData\Local\Temp\d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe'"
      2⤵
      • Creates scheduled task(s)
      PID:2416
    • C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1572
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4148
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      48c372e4136e858b67cc33832ae4a163

      SHA1

      c1658fa3204634e19804d9b2b338a75d7207b9a1

      SHA256

      fbb675cfd39fff9149e627f3fed4eae809885f5f1344d457113fd6d07b14aa6c

      SHA512

      b666a0c958d32d91c59ae728faf5243f281ee423ef9f841d9e3c3cd2a61ad2d0743d7aa34b6f7efccf975d435b6d7faee518b73139e89845da8d9a50aacfca69

    • C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe

      Filesize

      28KB

      MD5

      93bafe094ecbdbdb6fb425b699de95b7

      SHA1

      dc2883aed46aea8b44e3fbc8482fa3332b8129b3

      SHA256

      d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef

      SHA512

      631aa5f7f6da70233404419c5714618a690766aede518ceca5d45b9aa9053417748610699fb6120f10644fe7df79459b6ae820402213e43ad26a53420f7e8728

    • C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe

      Filesize

      28KB

      MD5

      93bafe094ecbdbdb6fb425b699de95b7

      SHA1

      dc2883aed46aea8b44e3fbc8482fa3332b8129b3

      SHA256

      d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef

      SHA512

      631aa5f7f6da70233404419c5714618a690766aede518ceca5d45b9aa9053417748610699fb6120f10644fe7df79459b6ae820402213e43ad26a53420f7e8728

    • C:\Users\Admin\AppData\Roaming\Microsoft\services64.exe

      Filesize

      28KB

      MD5

      93bafe094ecbdbdb6fb425b699de95b7

      SHA1

      dc2883aed46aea8b44e3fbc8482fa3332b8129b3

      SHA256

      d1cec3fef368c66fd21ccdc2aacff88ab8bd1517c8765c44074b13c833e39cef

      SHA512

      631aa5f7f6da70233404419c5714618a690766aede518ceca5d45b9aa9053417748610699fb6120f10644fe7df79459b6ae820402213e43ad26a53420f7e8728

    • memory/1572-19-0x00000000051B0000-0x00000000051C0000-memory.dmp

      Filesize

      64KB

    • memory/1572-18-0x0000000074DE0000-0x0000000075590000-memory.dmp

      Filesize

      7.7MB

    • memory/1572-17-0x00000000051B0000-0x00000000051C0000-memory.dmp

      Filesize

      64KB

    • memory/1572-15-0x0000000074DE0000-0x0000000075590000-memory.dmp

      Filesize

      7.7MB

    • memory/2296-3-0x0000000005500000-0x0000000005566000-memory.dmp

      Filesize

      408KB

    • memory/2296-16-0x0000000074DE0000-0x0000000075590000-memory.dmp

      Filesize

      7.7MB

    • memory/2296-5-0x0000000006260000-0x0000000006804000-memory.dmp

      Filesize

      5.6MB

    • memory/2296-4-0x00000000056C0000-0x00000000056D0000-memory.dmp

      Filesize

      64KB

    • memory/2296-1-0x0000000074DE0000-0x0000000075590000-memory.dmp

      Filesize

      7.7MB

    • memory/2296-2-0x0000000005450000-0x00000000054EC000-memory.dmp

      Filesize

      624KB

    • memory/2296-0-0x0000000000AD0000-0x0000000000ADC000-memory.dmp

      Filesize

      48KB

    • memory/3860-54-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-62-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-53-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-36-0x0000027EC7840000-0x0000027EC7850000-memory.dmp

      Filesize

      64KB

    • memory/3860-55-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-56-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-57-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-58-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-59-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-60-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-61-0x0000027ECFE30000-0x0000027ECFE31000-memory.dmp

      Filesize

      4KB

    • memory/3860-52-0x0000027ECFE10000-0x0000027ECFE11000-memory.dmp

      Filesize

      4KB

    • memory/3860-63-0x0000027ECFA60000-0x0000027ECFA61000-memory.dmp

      Filesize

      4KB

    • memory/3860-64-0x0000027ECFA50000-0x0000027ECFA51000-memory.dmp

      Filesize

      4KB

    • memory/3860-66-0x0000027ECFA60000-0x0000027ECFA61000-memory.dmp

      Filesize

      4KB

    • memory/3860-69-0x0000027ECFA50000-0x0000027ECFA51000-memory.dmp

      Filesize

      4KB

    • memory/3860-72-0x0000027ECF990000-0x0000027ECF991000-memory.dmp

      Filesize

      4KB

    • memory/3860-86-0x0000027ECFBA0000-0x0000027ECFBA1000-memory.dmp

      Filesize

      4KB

    • memory/3860-84-0x0000027ECFB90000-0x0000027ECFB91000-memory.dmp

      Filesize

      4KB

    • memory/3860-20-0x0000027EC7740000-0x0000027EC7750000-memory.dmp

      Filesize

      64KB

    • memory/3860-87-0x0000027ECFBA0000-0x0000027ECFBA1000-memory.dmp

      Filesize

      4KB

    • memory/3860-88-0x0000027ECFCB0000-0x0000027ECFCB1000-memory.dmp

      Filesize

      4KB