Analysis

  • max time kernel
    43s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 03:48

General

  • Target

    5e150a45eeb9215dee33da8f9e6c6ae9.dll

  • Size

    1.1MB

  • MD5

    5e150a45eeb9215dee33da8f9e6c6ae9

  • SHA1

    d05a8c383051ffacb104856b58eeda123bb70695

  • SHA256

    ad59f7a299e7839f81f04f037be2234da036c58b2f6ed2a9c9cb109f3d18705b

  • SHA512

    78cd3ac83eadb0431399f4fd0a8e68e2b7af1747323281d04b6c0dfa0bf6eb318df977ff75c1514de1c623fa43d67fffa9981f4c581533d6cb8aa75afd4e9906

  • SSDEEP

    24576:JQfzEWuougTY5sC1Mp7vHyecNLWlGNxTRQY:qzTuuYp1G/yecNLWIxTR

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#1
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\035.exe
        "035.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KzSuNlCQoYKnH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:2544
        • C:\Users\Admin\AppData\Local\Temp\035.exe
          "C:\Users\Admin\AppData\Local\Temp\035.exe"
          4⤵
            PID:1860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabDAA.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarDEC.tmp

      Filesize

      47KB

      MD5

      e151bc36baf5f3a4a5492c2d21613a08

      SHA1

      1e894bb428716cdd1f13578f0128ba3f043b4880

      SHA256

      08ccbda6b4fc1465d0a6445930a75c6ed93f483c5b262fe598bd93a9fbba08a3

      SHA512

      ba991a970c970a99aa23aa2df68eec177319124d0e8e378d1c90451a547e66176b63d4140f4bad6cf07be14abaae80fb7121faa3c4a7ea2f3245238e021a0f91

    • C:\Users\Admin\AppData\Local\Temp\tmpEF10.tmp

      Filesize

      1KB

      MD5

      5e9f3eaa69e92fab1914364809cdf31c

      SHA1

      b3f6205957db514b5c85a0746535eff19afaef2b

      SHA256

      55c055fdb7e480dc13cfe82dbe10896a174701e32f8034fa7eb9161da8e1fa77

      SHA512

      8baf5120de5c3d935cdc8aa6bc1f1db18d22d83b4b9398221785198a2089653ded290cfda3aea6681c20f48b7c48ebc37f532fe54bbd5e8ed741f745665876ce

    • \Users\Admin\AppData\Local\Temp\035.exe

      Filesize

      5KB

      MD5

      62d2761bd5c33184f5f394b8a5232af6

      SHA1

      ae8f31dad61e272b84048dc896318982e619a901

      SHA256

      cb722390fb9e87f12974af6f8a5c458b46335631adb9e486fc3bdb012d9188a4

      SHA512

      f938e757eb84b782e5428261651809727011882f440816353c2f6239671391e5306ccd9cf6e77954d3bedb100e3e3005a5d3b72700a2eca9c4ee00dfe6672f6f

    • memory/1860-30-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1860-46-0x0000000000430000-0x0000000000470000-memory.dmp

      Filesize

      256KB

    • memory/1860-81-0x0000000074240000-0x000000007492E000-memory.dmp

      Filesize

      6.9MB

    • memory/1860-82-0x0000000000430000-0x0000000000470000-memory.dmp

      Filesize

      256KB

    • memory/1860-32-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1860-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1860-38-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1860-41-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1860-45-0x0000000074240000-0x000000007492E000-memory.dmp

      Filesize

      6.9MB

    • memory/1860-43-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1860-34-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2056-15-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-18-0x0000000004E50000-0x0000000004E90000-memory.dmp

      Filesize

      256KB

    • memory/2056-22-0x0000000005090000-0x0000000005116000-memory.dmp

      Filesize

      536KB

    • memory/2056-21-0x0000000004E50000-0x0000000004E90000-memory.dmp

      Filesize

      256KB

    • memory/2056-20-0x0000000074240000-0x000000007492E000-memory.dmp

      Filesize

      6.9MB

    • memory/2056-44-0x0000000074240000-0x000000007492E000-memory.dmp

      Filesize

      6.9MB

    • memory/2056-19-0x0000000000240000-0x0000000000256000-memory.dmp

      Filesize

      88KB

    • memory/2056-23-0x0000000000D50000-0x0000000000D9A000-memory.dmp

      Filesize

      296KB

    • memory/2056-17-0x0000000074240000-0x000000007492E000-memory.dmp

      Filesize

      6.9MB

    • memory/2056-13-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-10-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-7-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2056-6-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-5-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2056-4-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB