Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 02:53
Behavioral task
behavioral1
Sample
93a51bb3d03a1cebf76e63d8bdb3af04.exe
Resource
win7-20231215-en
General
-
Target
93a51bb3d03a1cebf76e63d8bdb3af04.exe
-
Size
684KB
-
MD5
93a51bb3d03a1cebf76e63d8bdb3af04
-
SHA1
0868306dcb3a1f21fdda94e7125ad3aa2ad2dfa9
-
SHA256
729782176df07dcab88ca6d476c8b78b6b78a104d5df713a526cbf8baad1ddb5
-
SHA512
17c69bdbfbe71e80dbca83b967b6d9d77a4f63e0ea46b4c418ed7b3f318cda4603c8245b06a4d67a897baf8d8c2899bfb5da2932b0aea52d8c217752eeccc830
-
SSDEEP
12288:0JOpPEhZTl8pBRxhHLMmyLgIO3GsaMJcR/Vn+R9KVYszf:0JyPEhZB8pBlHomy0IO3GsId+R9KV1f
Malware Config
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/tDBQY6gT
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00300000000146c8-41.dat disable_win_def -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 2152 .exe 2864 temp.exe 2956 Window Security Notification.exe -
Loads dropped DLL 8 IoCs
pid Process 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 2152 .exe 2152 .exe 2152 .exe 2956 Window Security Notification.exe -
Obfuscated with Agile.Net obfuscator 6 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x0009000000015d00-144.dat agile_net behavioral1/files/0x0009000000015d00-143.dat agile_net behavioral1/files/0x0009000000015d00-139.dat agile_net behavioral1/files/0x0009000000015d00-137.dat agile_net behavioral1/files/0x0007000000014a56-27.dat agile_net behavioral1/files/0x0007000000014a56-24.dat agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1536 powershell.exe 3048 powershell.exe 3036 powershell.exe 2676 powershell.exe 2668 powershell.exe 348 powershell.exe 3032 powershell.exe 2216 powershell.exe 1320 powershell.exe 1156 powershell.exe 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 348 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2864 temp.exe Token: SeDebugPrivilege 2956 Window Security Notification.exe Token: SeDebugPrivilege 2956 Window Security Notification.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2744 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 28 PID 1252 wrote to memory of 2744 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 28 PID 1252 wrote to memory of 2744 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 28 PID 1252 wrote to memory of 2744 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 28 PID 1252 wrote to memory of 2152 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 58 PID 1252 wrote to memory of 2152 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 58 PID 1252 wrote to memory of 2152 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 58 PID 1252 wrote to memory of 2152 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 58 PID 1252 wrote to memory of 2864 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 29 PID 1252 wrote to memory of 2864 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 29 PID 1252 wrote to memory of 2864 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 29 PID 1252 wrote to memory of 2864 1252 93a51bb3d03a1cebf76e63d8bdb3af04.exe 29 PID 2744 wrote to memory of 2768 2744 WScript.exe 30 PID 2744 wrote to memory of 2768 2744 WScript.exe 30 PID 2744 wrote to memory of 2768 2744 WScript.exe 30 PID 2744 wrote to memory of 2768 2744 WScript.exe 30 PID 2768 wrote to memory of 2676 2768 WScript.exe 57 PID 2768 wrote to memory of 2676 2768 WScript.exe 57 PID 2768 wrote to memory of 2676 2768 WScript.exe 57 PID 2768 wrote to memory of 2676 2768 WScript.exe 57 PID 2768 wrote to memory of 3036 2768 WScript.exe 56 PID 2768 wrote to memory of 3036 2768 WScript.exe 56 PID 2768 wrote to memory of 3036 2768 WScript.exe 56 PID 2768 wrote to memory of 3036 2768 WScript.exe 56 PID 2768 wrote to memory of 3048 2768 WScript.exe 54 PID 2768 wrote to memory of 3048 2768 WScript.exe 54 PID 2768 wrote to memory of 3048 2768 WScript.exe 54 PID 2768 wrote to memory of 3048 2768 WScript.exe 54 PID 2768 wrote to memory of 1536 2768 WScript.exe 53 PID 2768 wrote to memory of 1536 2768 WScript.exe 53 PID 2768 wrote to memory of 1536 2768 WScript.exe 53 PID 2768 wrote to memory of 1536 2768 WScript.exe 53 PID 2768 wrote to memory of 2668 2768 WScript.exe 52 PID 2768 wrote to memory of 2668 2768 WScript.exe 52 PID 2768 wrote to memory of 2668 2768 WScript.exe 52 PID 2768 wrote to memory of 2668 2768 WScript.exe 52 PID 2768 wrote to memory of 3032 2768 WScript.exe 50 PID 2768 wrote to memory of 3032 2768 WScript.exe 50 PID 2768 wrote to memory of 3032 2768 WScript.exe 50 PID 2768 wrote to memory of 3032 2768 WScript.exe 50 PID 2768 wrote to memory of 348 2768 WScript.exe 48 PID 2768 wrote to memory of 348 2768 WScript.exe 48 PID 2768 wrote to memory of 348 2768 WScript.exe 48 PID 2768 wrote to memory of 348 2768 WScript.exe 48 PID 2768 wrote to memory of 2216 2768 WScript.exe 34 PID 2768 wrote to memory of 2216 2768 WScript.exe 34 PID 2768 wrote to memory of 2216 2768 WScript.exe 34 PID 2768 wrote to memory of 2216 2768 WScript.exe 34 PID 2768 wrote to memory of 1320 2768 WScript.exe 41 PID 2768 wrote to memory of 1320 2768 WScript.exe 41 PID 2768 wrote to memory of 1320 2768 WScript.exe 41 PID 2768 wrote to memory of 1320 2768 WScript.exe 41 PID 2768 wrote to memory of 2584 2768 WScript.exe 39 PID 2768 wrote to memory of 2584 2768 WScript.exe 39 PID 2768 wrote to memory of 2584 2768 WScript.exe 39 PID 2768 wrote to memory of 2584 2768 WScript.exe 39 PID 2768 wrote to memory of 1156 2768 WScript.exe 38 PID 2768 wrote to memory of 1156 2768 WScript.exe 38 PID 2768 wrote to memory of 1156 2768 WScript.exe 38 PID 2768 wrote to memory of 1156 2768 WScript.exe 38 PID 2152 wrote to memory of 2824 2152 .exe 46 PID 2152 wrote to memory of 2824 2152 .exe 46 PID 2152 wrote to memory of 2824 2152 .exe 46 PID 2152 wrote to memory of 2824 2152 .exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\93a51bb3d03a1cebf76e63d8bdb3af04.exe"C:\Users\Admin\AppData\Local\Temp\93a51bb3d03a1cebf76e63d8bdb3af04.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\script.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWOW64\WScript.exe" "C:\ProgramData\script.vbs" /elevate3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 04⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
-
-
C:\ProgramData\temp.exe"C:\ProgramData\temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2864 -s 10603⤵PID:1228
-
-
-
C:\ProgramData\.exe"C:\ProgramData\.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152
-
-
C:\Users\Admin\System32\Window Security Notification.exe"C:\Users\Admin\System32\Window Security Notification.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\System32\Window Security Notification.exe'"1⤵
- Creates scheduled task(s)
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD5bfe968b719b9567e0914105d2f5f80a4
SHA1de78dee76dec96235312fa82ebebc51f114483c9
SHA256a96147860e86e8f6a898e7bf77c05596790595c10a63271a2dce89d56fc49dac
SHA51287040e0beacfdbce3a401e09bb912e67544f7f0cd8de6bacbf710fddd6ac5e143dca08049de006d844b8b50131de98f56faf953328f40aaedfa2675186d5d5d4
-
Filesize
277KB
MD53325a618c53b168fa3323a8753024c33
SHA14ffadc357c00e7c6b4da5f5b8491d8f8bc257535
SHA2561cc1167c4a859c63231c11053fe6258ab622d4e32eb207e68e7fb6359ddaa99c
SHA51224ade4686b9b6ab838ee9a7ea5e1c3be3246d1c4561d84c44a8666fe2c279e81017ffcca22e2b3385a9b4cdaf5c2a14ce200a3d07e855053520a0e0294177c71
-
Filesize
1KB
MD5dd82baf02caac1567f2277edca89a912
SHA136f5d8c2a67f31768b1116bb87f77b049ffd3f63
SHA256038802b33f5e7179ad59105099681003c68fdb9b3c757540e737564c1b460533
SHA5126825e10fbb3fec3619cd0b2d36f6490f28301fd723fa9b2b52403aa3d8c2e39b7bb04eedc937c5fdf76f511e9e75e533ef6cfce07d398fe13b52896c3e343554
-
Filesize
140KB
MD5edd74be9723cdc6a5692954f0e51c9f3
SHA1e9fb66ceee1ba4ce7e5b8271b3e1ed7cb9acf686
SHA25655ff1e0a4e5866d565ceeb9baafac73fdcb4464160fc6c78104d935009935cd7
SHA51280abecdd07f364283f216d8f4d90a4da3efd4561900631fce05c2916afeb1b5bbce23ae92d57430b7b2b06c172b2ad701b2ab75b6dfd2a861abcf7edc38462f3
-
Filesize
46KB
MD562047680030fa763873261d3a8b03b3e
SHA185c1c3aff454c74c7e5a8fa2a97d4ec38a98811c
SHA2568f22b1829ac70b59ce0df731223ff107cb06a2561cf0365b0d5d323f0fbd07c7
SHA512ea4449008f3874cd1b13116c9c77a2b4170a6a69c6ee5593c23ca29f2226267d6cd77c686264ae461826e0e613ceb5a542bcfa50e5b3901d1d9ba023f66df148
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
20KB
MD5cb2aac2f68b6c5a4c2d6ffda26546e8a
SHA18ff75ba3d925c793a44b0177d204a6effb966289
SHA2562c46f4e8cf118cb520e0b7873900c0bd97fa23ab579562c023fc5782e69bc919
SHA5129181f55994eadb021ec69ccb516560854b27e407988558df7d8f56f8158bea9e70fbd2c7278a485e6221e3212682c4d195bc4cbf7e62553a1a88d19e8a36b3af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD555afd39be70164aaeb5a42a4a64e0cb0
SHA1adaaed83d31508b32f1099d9576279c8d5edac33
SHA256d610507a1270f04e0247be54e310ecbe02b422ba7151ea5677725039c4dc7624
SHA512fcfa517482488183739bcc6614aa44a8f0bb1b01dd10ac3e8919bb620201d196bf9e3f5af90fbd05eb72f406bb3985160f982deac5765450b5d5444b06983b2b
-
Filesize
46KB
MD502805270fb230c810727e6ef852d8eb1
SHA13d6b9efef73b61cde51cb947892ba4480b9a521e
SHA256181d49f68a75120cf6319f377c04d371f1ca60c3db7f39e4015dfd798eaa893b
SHA51271b206cd9fecc2f14242b86bdbb0f51c69321d7e6ca391ffec19bc3d4bd7b3c48f1b2ad7bdd00630ab204dbb651c9ba2d6777f743faa1fbd59ea3c4aa5db1a2c
-
Filesize
67KB
MD5a5dcdb6c7f734f359b8d2a61f09f2dcc
SHA16ae95f2a360b6308e7f7407101929bacbc2ec234
SHA256128b05e439f60a3899c819947e11087455ea42912a8443f02f34a07e2afc8e3b
SHA512a07c6f71b2a9144755ef41bbe3a175c64af3c9ef40df97c914340682019ec29147c1f6455f082b67eda01632caa111749526bf8e5459aa204edb4bdc85af0735
-
Filesize
10KB
MD5c26e4cd9bc956f25ec249bcb75900ab2
SHA1f2a80a50639ec0c5a438c867b37ca03df286017c
SHA25680b261cf3b2206cd8786afd2b401b83dab0b97bf13d128d846910b61fde01876
SHA51271b9efcab7aae3da89e0694f29879ac786c465a9510d8b43f0ce5f629fdda3ab6be899992b7d6e94ad6ba7558cb8b4e6f29f572b188534f68e33a792e5308387
-
Filesize
123KB
MD53a098d6183a69a4f555f0833b0208a08
SHA1fe2b5c058cc5e8165d80ee3ded4c348f29e466a8
SHA25636d06d7ee8113d0a0144068ea9005b8047411ea9213d26b425a99d5547d2f2fc
SHA512562ceb360beb2dca96a4700e041d9647f473b5e0a2121cd9905bd23dfb0f29f4e09fef59adf10ef9b159f314062dbe6cf52d9b768a8272dafdb4e65034fcb200
-
Filesize
106KB
MD54a1d951af6ec1148ff0f306f0d82dc59
SHA17a4cfc23bba00935603c544e101588a9ea1fb9f8
SHA2567c9926f51a59bec5f430b9b3e3d5c257b0517644f5c4e29c1325bba6a740879b
SHA5127466dc82c2f234335592bdbf959e8c2597f95fbe43477662e8cebb0e8fdd1f06ba5b25a6d3ab3c5945ac461ca8f7bddc309109635c3f25728e8d58cee82aba00
-
Filesize
91KB
MD533211d8461c25a6d45235ccf495e2a0f
SHA1843716f56f36b0b8cfc308f7c1779bac04b4797a
SHA25612c2a17ac74ba8d25b6cb2952ca098b0976e9f35f168d478fbc51ba4c6ade14c
SHA512c1e766e07ca3183b31e71af49766760bca84bc1b052ef2b9799f82b220c2f3f9ba1b1c9a45f7fdee96ff0dc23a169712004d158725b6e90cc18e27d886a2cdc8