Analysis
-
max time kernel
43s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 03:48
Static task
static1
Behavioral task
behavioral1
Sample
5e150a45eeb9215dee33da8f9e6c6ae9.dll
Resource
win7-20231215-en
General
-
Target
5e150a45eeb9215dee33da8f9e6c6ae9.dll
-
Size
1.1MB
-
MD5
5e150a45eeb9215dee33da8f9e6c6ae9
-
SHA1
d05a8c383051ffacb104856b58eeda123bb70695
-
SHA256
ad59f7a299e7839f81f04f037be2234da036c58b2f6ed2a9c9cb109f3d18705b
-
SHA512
78cd3ac83eadb0431399f4fd0a8e68e2b7af1747323281d04b6c0dfa0bf6eb318df977ff75c1514de1c623fa43d67fffa9981f4c581533d6cb8aa75afd4e9906
-
SSDEEP
24576:JQfzEWuougTY5sC1Mp7vHyecNLWlGNxTRQY:qzTuuYp1G/yecNLWIxTR
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 035.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2056 2368 rundll32.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 1080 wrote to memory of 2368 1080 rundll32.exe 28 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2368 wrote to memory of 2056 2368 rundll32.exe 29 PID 2056 wrote to memory of 2544 2056 035.exe 33 PID 2056 wrote to memory of 2544 2056 035.exe 33 PID 2056 wrote to memory of 2544 2056 035.exe 33 PID 2056 wrote to memory of 2544 2056 035.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#12⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\035.exe"035.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KzSuNlCQoYKnH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp"4⤵
- Creates scheduled task(s)
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\035.exe"C:\Users\Admin\AppData\Local\Temp\035.exe"4⤵PID:1860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
47KB
MD5e151bc36baf5f3a4a5492c2d21613a08
SHA11e894bb428716cdd1f13578f0128ba3f043b4880
SHA25608ccbda6b4fc1465d0a6445930a75c6ed93f483c5b262fe598bd93a9fbba08a3
SHA512ba991a970c970a99aa23aa2df68eec177319124d0e8e378d1c90451a547e66176b63d4140f4bad6cf07be14abaae80fb7121faa3c4a7ea2f3245238e021a0f91
-
Filesize
1KB
MD55e9f3eaa69e92fab1914364809cdf31c
SHA1b3f6205957db514b5c85a0746535eff19afaef2b
SHA25655c055fdb7e480dc13cfe82dbe10896a174701e32f8034fa7eb9161da8e1fa77
SHA5128baf5120de5c3d935cdc8aa6bc1f1db18d22d83b4b9398221785198a2089653ded290cfda3aea6681c20f48b7c48ebc37f532fe54bbd5e8ed741f745665876ce
-
Filesize
5KB
MD562d2761bd5c33184f5f394b8a5232af6
SHA1ae8f31dad61e272b84048dc896318982e619a901
SHA256cb722390fb9e87f12974af6f8a5c458b46335631adb9e486fc3bdb012d9188a4
SHA512f938e757eb84b782e5428261651809727011882f440816353c2f6239671391e5306ccd9cf6e77954d3bedb100e3e3005a5d3b72700a2eca9c4ee00dfe6672f6f