Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
34257f43cd09bb9f9aa171b8d5d40d15.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
34257f43cd09bb9f9aa171b8d5d40d15.js
Resource
win10v2004-20231222-en
General
-
Target
34257f43cd09bb9f9aa171b8d5d40d15.js
-
Size
53KB
-
MD5
34257f43cd09bb9f9aa171b8d5d40d15
-
SHA1
2205fc3296c2fa97706700c4e6d6f7ef1f185892
-
SHA256
8b2a8b2e8d7b89e72c2fbdbb79596f9d4dcc0a4304c566ee26bd5b966a099568
-
SHA512
b16feb70bddc57e556be7db50242a50a600e4775d6a64af64be2d25c055e2e7d0bf292b9c318ff1ddfd9d994995b2f27e47e22b216e864e39d579560ba8c9b08
-
SSDEEP
768:H7XWEtO8a1ZLbWVfgiZb1pW0GpswDx79qs8dfcdaXKzC5Oo+eVO5p+JD1z:LW9v1lWdjQDx79qtdco+eVOnu
Malware Config
Extracted
limerat
1Cs8MjxkXtYwkDKypg8i1Vj5nzhANpgC6y
-
aes_key
2249
-
antivm
false
-
c2_url
https://pastebin.com/raw/G9wX4J5m
-
delay
8
-
download_payload
false
-
install
true
-
install_name
player.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/G9wX4J5m
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1424 New-Client.exe 2580 player.exe -
Loads dropped DLL 2 IoCs
pid Process 1424 New-Client.exe 1424 New-Client.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 player.exe Token: SeDebugPrivilege 2580 player.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1424 1288 wscript.exe 28 PID 1288 wrote to memory of 1424 1288 wscript.exe 28 PID 1288 wrote to memory of 1424 1288 wscript.exe 28 PID 1288 wrote to memory of 1424 1288 wscript.exe 28 PID 1424 wrote to memory of 2740 1424 New-Client.exe 30 PID 1424 wrote to memory of 2740 1424 New-Client.exe 30 PID 1424 wrote to memory of 2740 1424 New-Client.exe 30 PID 1424 wrote to memory of 2740 1424 New-Client.exe 30 PID 1424 wrote to memory of 2580 1424 New-Client.exe 32 PID 1424 wrote to memory of 2580 1424 New-Client.exe 32 PID 1424 wrote to memory of 2580 1424 New-Client.exe 32 PID 1424 wrote to memory of 2580 1424 New-Client.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\34257f43cd09bb9f9aa171b8d5d40d15.js1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\New-Client.exe"C:\Users\Admin\AppData\Roaming\New-Client.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\player.exe'"3⤵
- Creates scheduled task(s)
PID:2740
-
-
C:\Users\Admin\AppData\Roaming\player.exe"C:\Users\Admin\AppData\Roaming\player.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
28KB
MD51ad564a6ca1520e8886faffc4e0ff1d4
SHA17d3b61daef1afed73838351dbf788448cf88d031
SHA2562c3a771c2ecbd58409c3f348220c5d9419901e882c61531b68e07b80eb0d3df4
SHA512b54d6cb92876546c38503e5e673d765f2e323246f5adbaefa83cdc62af6a462d117d3dc183666f902a84575590aa02f94d9997e7783e6f99050c57a710fab441