Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 11:45
Static task
static1
Behavioral task
behavioral1
Sample
678a836b41b132da287f0da90e822480.jar
Resource
win7-20231215-en
General
-
Target
678a836b41b132da287f0da90e822480.jar
-
Size
166KB
-
MD5
678a836b41b132da287f0da90e822480
-
SHA1
d4eec0106a8fffcb9c850ba515b18a84c42f7973
-
SHA256
73536c89f6d0063c32c17294ae8aedd69b75fc9b5adb6848749a0b811241ea8e
-
SHA512
221a6dbf894d8b58f1a4357df8e774b13783ad08d805b48df0ce57dbd9579118f49fe1248ea023711d2684a650d02a4789f50d6ca6986e71fd7857fed0f3aec4
-
SSDEEP
3072:O2OP/lXyajtcnHLEt+UUN3VEggvwMoGc6OFULv3rFLZmVjDBEDmhIJLPcaZMXpFd:ny/liajqnHLEt+lVEg25o16OCLRl2DqC
Malware Config
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/G9wX4J5m
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exeWScript.exeNew-Client.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation New-Client.exe -
Executes dropped EXE 2 IoCs
Processes:
New-Client.exeplayer.exepid process 2568 New-Client.exe 4732 player.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
Processes:
javaw.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
player.exedescription pid process Token: SeDebugPrivilege 4732 player.exe Token: SeDebugPrivilege 4732 player.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
java.exewscript.exeWScript.exeNew-Client.exedescription pid process target process PID 4600 wrote to memory of 4156 4600 java.exe icacls.exe PID 4600 wrote to memory of 4156 4600 java.exe icacls.exe PID 4600 wrote to memory of 4084 4600 java.exe wscript.exe PID 4600 wrote to memory of 4084 4600 java.exe wscript.exe PID 4084 wrote to memory of 3388 4084 wscript.exe WScript.exe PID 4084 wrote to memory of 3388 4084 wscript.exe WScript.exe PID 4084 wrote to memory of 2856 4084 wscript.exe javaw.exe PID 4084 wrote to memory of 2856 4084 wscript.exe javaw.exe PID 3388 wrote to memory of 2568 3388 WScript.exe New-Client.exe PID 3388 wrote to memory of 2568 3388 WScript.exe New-Client.exe PID 3388 wrote to memory of 2568 3388 WScript.exe New-Client.exe PID 2568 wrote to memory of 3156 2568 New-Client.exe schtasks.exe PID 2568 wrote to memory of 3156 2568 New-Client.exe schtasks.exe PID 2568 wrote to memory of 3156 2568 New-Client.exe schtasks.exe PID 2568 wrote to memory of 4732 2568 New-Client.exe player.exe PID 2568 wrote to memory of 4732 2568 New-Client.exe player.exe PID 2568 wrote to memory of 4732 2568 New-Client.exe player.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\678a836b41b132da287f0da90e822480.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\ddowgooevv.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rulrquxbxx.txt"3⤵
- Drops file in Program Files directory
PID:2856
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\wgQDzEaaot.js"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3388
-
-
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4156
-
-
C:\Users\Admin\AppData\Roaming\New-Client.exe"C:\Users\Admin\AppData\Roaming\New-Client.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\player.exe'"2⤵
- Creates scheduled task(s)
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\player.exe"C:\Users\Admin\AppData\Roaming\player.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5035ccf1bef2a15d762225b13cbefe1c9
SHA172c84c81ddf6a185625253afdaa21662dcea3774
SHA25619b069aa53d951438229a508831f9e2fc7814136d13878e0ddbce0eb354aecc4
SHA512ee102c3f27d3aa425972bc2aabf2dfd7b5b24c6f42c1d352d38aeed2e685e18d0e9fe552a5bb417bee76c5d9a440b8a3fe759eec828325b29d225217cb9d32d7
-
Filesize
28KB
MD51ad564a6ca1520e8886faffc4e0ff1d4
SHA17d3b61daef1afed73838351dbf788448cf88d031
SHA2562c3a771c2ecbd58409c3f348220c5d9419901e882c61531b68e07b80eb0d3df4
SHA512b54d6cb92876546c38503e5e673d765f2e323246f5adbaefa83cdc62af6a462d117d3dc183666f902a84575590aa02f94d9997e7783e6f99050c57a710fab441
-
Filesize
64KB
MD54ba645586c7a9a3eb998cf5a8238104b
SHA1db7acef39adbc260eea6d728e4811c6b0c2f8a73
SHA256b06f08da6734add59c3a3ccea97d4f1e12e70903f583e2647ef69c7e26924b2f
SHA51207e647733efd6c798de0fcb61dbbea349251960384b68ab2d90e365696e98a6bc593cbb8e1bc000e47fecfa9a891f23f43c1ea65b829c9d4ce60158ffa28a0cb
-
Filesize
53KB
MD534257f43cd09bb9f9aa171b8d5d40d15
SHA12205fc3296c2fa97706700c4e6d6f7ef1f185892
SHA2568b2a8b2e8d7b89e72c2fbdbb79596f9d4dcc0a4304c566ee26bd5b966a099568
SHA512b16feb70bddc57e556be7db50242a50a600e4775d6a64af64be2d25c055e2e7d0bf292b9c318ff1ddfd9d994995b2f27e47e22b216e864e39d579560ba8c9b08
-
Filesize
280KB
MD5aaafafd3890c93c59000316f96108b99
SHA15fba17bdc35acbb86e1cb63ea443553770552214
SHA25636664de87581e5777c3c975ad9e430ce8ac2ff80c24b565d7b40aaba75106727
SHA512a18aa97f92d612ba6c383cec57f88f5e1097171222db1eccfaff0e35019832d80f3adeb88097525b9658c950e44c461e73c4136c24b081844e4dcda37cf38543