Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win10v2004-20231215-en
General
-
Target
de02ba99f65d07c4973b33fec5aefdac.exe
-
Size
1.6MB
-
MD5
de02ba99f65d07c4973b33fec5aefdac
-
SHA1
54419bd1e07a8e3ab393c55cf55570bc3fe2b526
-
SHA256
05f0ad4df75e687b4a188f34e31a60afb0a772d32e51f6e77f62ec484e7cf35e
-
SHA512
c38740af611109ebae7552045e4b1d88909840d54c91ad585adba52b2d36be806fde3f84c1cd18c086debe995ef5475faf9b53614ebe83fe56825c97a877d6d8
-
SSDEEP
49152:ReKvWKlH8SM3ShGiSTZdXTZdHXTZdXTZ:
Malware Config
Extracted
limerat
3Qus18px7doBsKbzeHGBmnanWuPS4S3tAn
-
aes_key
7aXx4CiaQxg8Py3gI
-
antivm
true
-
c2_url
https://pastebin.com/raw/ZJvAZBza
-
delay
60
-
download_payload
false
-
install
true
-
install_name
csrss.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2624 TeraBIT Virus Maker 3.1 (1).exe 2968 Wservices.exe 1560 Wservices.exe -
Loads dropped DLL 3 IoCs
pid Process 2360 de02ba99f65d07c4973b33fec5aefdac.exe 2360 de02ba99f65d07c4973b33fec5aefdac.exe 2360 de02ba99f65d07c4973b33fec5aefdac.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wservices.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Wservices.exe" de02ba99f65d07c4973b33fec5aefdac.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 1560 2968 Wservices.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 TeraBIT Virus Maker 3.1 (1).exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2624 2360 de02ba99f65d07c4973b33fec5aefdac.exe 28 PID 2360 wrote to memory of 2624 2360 de02ba99f65d07c4973b33fec5aefdac.exe 28 PID 2360 wrote to memory of 2624 2360 de02ba99f65d07c4973b33fec5aefdac.exe 28 PID 2360 wrote to memory of 2624 2360 de02ba99f65d07c4973b33fec5aefdac.exe 28 PID 2360 wrote to memory of 2968 2360 de02ba99f65d07c4973b33fec5aefdac.exe 31 PID 2360 wrote to memory of 2968 2360 de02ba99f65d07c4973b33fec5aefdac.exe 31 PID 2360 wrote to memory of 2968 2360 de02ba99f65d07c4973b33fec5aefdac.exe 31 PID 2360 wrote to memory of 2968 2360 de02ba99f65d07c4973b33fec5aefdac.exe 31 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32 PID 2968 wrote to memory of 1560 2968 Wservices.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"3⤵
- Executes dropped EXE
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
709KB
MD5f4ff4ceb4cc85a280ed26f892f22c3a2
SHA11ec2e312693367216e25b30f95cecc2092a57fb4
SHA256a8b46ea560c34dea55a54d1972a88997387e6e549853b3fc0883856b2ee04494
SHA512df8d92e0bfc00a9ff2918b92af8deb9f5dcaf8b3498b9d46d53d9fea4c601bc7e9f6ebf904213ecaf83d8238192b3004e046bf2c3a3981248bdffce3aa004b8f
-
Filesize
388KB
MD5ceaf8241dd72a70cbb0d9f88ddd49846
SHA16d5531e66c895c8e54aa57225a079219653aa295
SHA256587f76428a4a2e87f9abc2f7287b2d0b9061fd5cad11be2646d985f1d930f3c2
SHA512f05d97533b3e460f566baefa5752638ef12d0603b65a5dca587b37e8ed4df2bc0d5ec799bd72c4efceafe868dbc0dde264d225cf8d4fba7e89609d4ccb97bd5a