Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
215s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:32
Behavioral task
behavioral1
Sample
f998121d523426ed0afed3d21dfb0d69.exe
Resource
win7-20231215-en
General
-
Target
f998121d523426ed0afed3d21dfb0d69.exe
-
Size
380KB
-
MD5
f998121d523426ed0afed3d21dfb0d69
-
SHA1
fd4da5a1bd5ec4d6508c78a01f0002a3348df0e7
-
SHA256
7a9a5279a3ced8e2aabcb0edf0c1f5f935d33b49807de894774ad8f9c51a02f8
-
SHA512
c701c0bd0a129adb3593e66d6867f605f305a28c02351c3df607505f0e6bbe66d8755d8b9ac8ea22b550b233fed7335a179100b8bf889d843d6a8a540b1334f0
-
SSDEEP
6144:V6C4vUQ2R02etDfet3Agp0q9ygbX+1RzDU8vTMpcvEF:V7Q002e1saMJcR/VbKcvi
Malware Config
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/tDBQY6gT
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 Window Security Notification.exe -
Loads dropped DLL 4 IoCs
pid Process 2812 f998121d523426ed0afed3d21dfb0d69.exe 2812 f998121d523426ed0afed3d21dfb0d69.exe 2812 f998121d523426ed0afed3d21dfb0d69.exe 2524 Window Security Notification.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x00070000000152c7-16.dat agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2524 Window Security Notification.exe Token: SeDebugPrivilege 2524 Window Security Notification.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2204 2812 f998121d523426ed0afed3d21dfb0d69.exe 30 PID 2812 wrote to memory of 2204 2812 f998121d523426ed0afed3d21dfb0d69.exe 30 PID 2812 wrote to memory of 2204 2812 f998121d523426ed0afed3d21dfb0d69.exe 30 PID 2812 wrote to memory of 2204 2812 f998121d523426ed0afed3d21dfb0d69.exe 30 PID 2812 wrote to memory of 2524 2812 f998121d523426ed0afed3d21dfb0d69.exe 32 PID 2812 wrote to memory of 2524 2812 f998121d523426ed0afed3d21dfb0d69.exe 32 PID 2812 wrote to memory of 2524 2812 f998121d523426ed0afed3d21dfb0d69.exe 32 PID 2812 wrote to memory of 2524 2812 f998121d523426ed0afed3d21dfb0d69.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f998121d523426ed0afed3d21dfb0d69.exe"C:\Users\Admin\AppData\Local\Temp\f998121d523426ed0afed3d21dfb0d69.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\System32\Window Security Notification.exe'"2⤵
- Creates scheduled task(s)
PID:2204
-
-
C:\Users\Admin\System32\Window Security Notification.exe"C:\Users\Admin\System32\Window Security Notification.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5edd74be9723cdc6a5692954f0e51c9f3
SHA1e9fb66ceee1ba4ce7e5b8271b3e1ed7cb9acf686
SHA25655ff1e0a4e5866d565ceeb9baafac73fdcb4464160fc6c78104d935009935cd7
SHA51280abecdd07f364283f216d8f4d90a4da3efd4561900631fce05c2916afeb1b5bbce23ae92d57430b7b2b06c172b2ad701b2ab75b6dfd2a861abcf7edc38462f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
147KB
MD57ccd0d5e263e32b8c7009b6900966446
SHA10b3c4f22c57adb33e7c167d25c6461492016564b
SHA2563c62f9bbdd04e7ea33cfb3a5fd99fb3a9a8468da6d1323283ad8684d5e3c2e1a
SHA512ef396928764812cda979c1468910473264bdf07233851a4a49ec320939f1fce39fe2ef8455519ac6ce600b7a94546405f25ffa0f6cdba76865a2df8887bb903b
-
Filesize
380KB
MD5f998121d523426ed0afed3d21dfb0d69
SHA1fd4da5a1bd5ec4d6508c78a01f0002a3348df0e7
SHA2567a9a5279a3ced8e2aabcb0edf0c1f5f935d33b49807de894774ad8f9c51a02f8
SHA512c701c0bd0a129adb3593e66d6867f605f305a28c02351c3df607505f0e6bbe66d8755d8b9ac8ea22b550b233fed7335a179100b8bf889d843d6a8a540b1334f0