Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 03:48

General

  • Target

    5e150a45eeb9215dee33da8f9e6c6ae9.dll

  • Size

    1.1MB

  • MD5

    5e150a45eeb9215dee33da8f9e6c6ae9

  • SHA1

    d05a8c383051ffacb104856b58eeda123bb70695

  • SHA256

    ad59f7a299e7839f81f04f037be2234da036c58b2f6ed2a9c9cb109f3d18705b

  • SHA512

    78cd3ac83eadb0431399f4fd0a8e68e2b7af1747323281d04b6c0dfa0bf6eb318df977ff75c1514de1c623fa43d67fffa9981f4c581533d6cb8aa75afd4e9906

  • SSDEEP

    24576:JQfzEWuougTY5sC1Mp7vHyecNLWlGNxTRQY:qzTuuYp1G/yecNLWIxTR

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV

Attributes
  • aes_key

    NYANCAT

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4pByu6u5

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e150a45eeb9215dee33da8f9e6c6ae9.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\035.exe
        "035.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KzSuNlCQoYKnH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp362E.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:3816
        • C:\Users\Admin\AppData\Local\Temp\035.exe
          "C:\Users\Admin\AppData\Local\Temp\035.exe"
          4⤵
          • Executes dropped EXE
          PID:2152
        • C:\Users\Admin\AppData\Local\Temp\035.exe
          "C:\Users\Admin\AppData\Local\Temp\035.exe"
          4⤵
          • Executes dropped EXE
          PID:2672
        • C:\Users\Admin\AppData\Local\Temp\035.exe
          "C:\Users\Admin\AppData\Local\Temp\035.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\035.exe.log

    Filesize

    1KB

    MD5

    17573558c4e714f606f997e5157afaac

    SHA1

    13e16e9415ceef429aaf124139671ebeca09ed23

    SHA256

    c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

    SHA512

    f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

  • C:\Users\Admin\AppData\Local\Temp\035.exe

    Filesize

    5KB

    MD5

    62d2761bd5c33184f5f394b8a5232af6

    SHA1

    ae8f31dad61e272b84048dc896318982e619a901

    SHA256

    cb722390fb9e87f12974af6f8a5c458b46335631adb9e486fc3bdb012d9188a4

    SHA512

    f938e757eb84b782e5428261651809727011882f440816353c2f6239671391e5306ccd9cf6e77954d3bedb100e3e3005a5d3b72700a2eca9c4ee00dfe6672f6f

  • C:\Users\Admin\AppData\Local\Temp\tmp362E.tmp

    Filesize

    1KB

    MD5

    40789395cec61edfe6de169a987aabba

    SHA1

    1889d967de421b05517f595ee27acbb782c65f58

    SHA256

    c38503bd79a81041c8766e9026a2a94c31e142ba44f0c88598bb79ee115ee754

    SHA512

    9ee84e0cb33ff7ac4486def0ab7d8f522a39df6c36d84a58310ea679c4bb0afad5dc981b42bd30d22a760a2231541cc2f48b5e58fe8da1b7389cecb59a7dd228

  • memory/4060-13-0x0000000074BC0000-0x0000000075370000-memory.dmp

    Filesize

    7.7MB

  • memory/4060-15-0x0000000006C50000-0x0000000006CD6000-memory.dmp

    Filesize

    536KB

  • memory/4060-7-0x0000000005930000-0x0000000005ED4000-memory.dmp

    Filesize

    5.6MB

  • memory/4060-9-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/4060-11-0x0000000005660000-0x00000000056B6000-memory.dmp

    Filesize

    344KB

  • memory/4060-10-0x0000000005400000-0x000000000540A000-memory.dmp

    Filesize

    40KB

  • memory/4060-12-0x0000000005730000-0x0000000005746000-memory.dmp

    Filesize

    88KB

  • memory/4060-5-0x00000000052D0000-0x000000000536C000-memory.dmp

    Filesize

    624KB

  • memory/4060-14-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/4060-8-0x0000000005420000-0x00000000054B2000-memory.dmp

    Filesize

    584KB

  • memory/4060-16-0x0000000009230000-0x000000000927A000-memory.dmp

    Filesize

    296KB

  • memory/4060-6-0x0000000074BC0000-0x0000000075370000-memory.dmp

    Filesize

    7.7MB

  • memory/4060-29-0x0000000074BC0000-0x0000000075370000-memory.dmp

    Filesize

    7.7MB

  • memory/4060-2-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/4160-24-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/4160-28-0x0000000074BC0000-0x0000000075370000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-31-0x00000000056B0000-0x00000000056C0000-memory.dmp

    Filesize

    64KB

  • memory/4160-30-0x00000000057C0000-0x0000000005826000-memory.dmp

    Filesize

    408KB

  • memory/4160-32-0x0000000074BC0000-0x0000000075370000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-33-0x00000000056B0000-0x00000000056C0000-memory.dmp

    Filesize

    64KB