Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2024, 11:09

General

  • Target

    a039c46553a47916ff3376b88dde0a81.exe

  • Size

    694KB

  • MD5

    a039c46553a47916ff3376b88dde0a81

  • SHA1

    84e9846e8895c79a3a65cf3e54aa7a52dacf995a

  • SHA256

    ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01

  • SHA512

    d342258b1f57ed230eb1e3542eebb493edbbf82aa1d62d1d9b3dcc301e6700e69a3feaf99e29544c68b9c6092a70a3a98b872da1485e78e5891f1a2fa8a22c2a

  • SSDEEP

    12288:KthfCHBrr9/uuQl7nNPV7mtU1EwiTsej472iNSzAaP:LsxV7my1cFjM1IzAg

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

bc1qdajqyl8uarnz63e2we9xchx3zqcd5xcyfshfyk

Attributes
  • aes_key

    lime

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/4Xj3extx

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/4Xj3extx

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe
    "C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcuajQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp952.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4592
    • C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe
      "C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"
      2⤵
        PID:2720
      • C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe
        "C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\Wservices.exe'"
          3⤵
          • Creates scheduled task(s)
          PID:836
        • C:\Users\Admin\AppData\Local\Temp\Wservices.exe
          "C:\Users\Admin\AppData\Local\Temp\Wservices.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1004
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcuajQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE114.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:3216
          • C:\Users\Admin\AppData\Local\Temp\Wservices.exe
            "C:\Users\Admin\AppData\Local\Temp\Wservices.exe"
            4⤵
            • Executes dropped EXE
            PID:1140
          • C:\Users\Admin\AppData\Local\Temp\Wservices.exe
            "C:\Users\Admin\AppData\Local\Temp\Wservices.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a039c46553a47916ff3376b88dde0a81.exe.log

      Filesize

      1KB

      MD5

      17573558c4e714f606f997e5157afaac

      SHA1

      13e16e9415ceef429aaf124139671ebeca09ed23

      SHA256

      c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

      SHA512

      f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

    • C:\Users\Admin\AppData\Local\Temp\Wservices.exe

      Filesize

      694KB

      MD5

      a039c46553a47916ff3376b88dde0a81

      SHA1

      84e9846e8895c79a3a65cf3e54aa7a52dacf995a

      SHA256

      ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01

      SHA512

      d342258b1f57ed230eb1e3542eebb493edbbf82aa1d62d1d9b3dcc301e6700e69a3feaf99e29544c68b9c6092a70a3a98b872da1485e78e5891f1a2fa8a22c2a

    • C:\Users\Admin\AppData\Local\Temp\Wservices.exe

      Filesize

      543KB

      MD5

      fbbda540027636d7c982bd35320e3f56

      SHA1

      d5d99b6da6c95bfb38910682e93ced94566cd2c5

      SHA256

      9a725d41cdf628f258fd868911278f575e94153186a966246164dec4ce16d0eb

      SHA512

      7c1529a77f4a6752d8523ebf0a4885e0f3bebd54800c0afa34856d34096be222b4a00f0749840fd2096ea1d1842ab0dc3e76d9b12b3b6b46829754fef6f9627c

    • C:\Users\Admin\AppData\Local\Temp\Wservices.exe

      Filesize

      576KB

      MD5

      58468a090962b06a697bca4990051d16

      SHA1

      9104aab3c71f5d2d58127bf4a2ce114c9636826c

      SHA256

      e1ecfbba5e7bf0c2d68642dc8fe536a8019b408a1f182046118b90b19daf9cf1

      SHA512

      4d2932250cf3caaac6821c55e270bf9b025ef5ed56e4b5d15030f079bb8972d4bacd916c2c534d6a2b36eede7178309b7c4eb93dbe5dc815cebd6ba52bc019d5

    • C:\Users\Admin\AppData\Local\Temp\tmp952.tmp

      Filesize

      1KB

      MD5

      2a4d4a62c87aaaa9949e3803e5f3a0d7

      SHA1

      b7dd8e8f437af01437f6f8c376cfb7ee34fad096

      SHA256

      4f66c460a361c6d9b5294269759356eecb364f4b368d40033d63d119dae851b6

      SHA512

      775189171d318a42b22c1940566a3553b45b22b13ccd5c752b93e474bd884565c5aed669aba614a7dfe3ab64d94ba00ca24392b2894189d3c5cbb7fda04fd1f0

    • memory/1004-39-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1004-37-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1004-38-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1004-40-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1004-48-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2432-36-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2432-20-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2432-23-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/2432-22-0x0000000004E80000-0x0000000004EE6000-memory.dmp

      Filesize

      408KB

    • memory/2432-18-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2696-8-0x0000000005660000-0x0000000005672000-memory.dmp

      Filesize

      72KB

    • memory/2696-5-0x00000000056D0000-0x00000000056E0000-memory.dmp

      Filesize

      64KB

    • memory/2696-12-0x00000000057A0000-0x00000000057B0000-memory.dmp

      Filesize

      64KB

    • memory/2696-11-0x00000000072C0000-0x0000000007342000-memory.dmp

      Filesize

      520KB

    • memory/2696-10-0x00000000056D0000-0x00000000056E0000-memory.dmp

      Filesize

      64KB

    • memory/2696-9-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2696-0-0x0000000000820000-0x00000000008D4000-memory.dmp

      Filesize

      720KB

    • memory/2696-6-0x00000000052C0000-0x00000000052CA000-memory.dmp

      Filesize

      40KB

    • memory/2696-7-0x0000000005400000-0x0000000005456000-memory.dmp

      Filesize

      344KB

    • memory/2696-21-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2696-4-0x00000000054A0000-0x0000000005532000-memory.dmp

      Filesize

      584KB

    • memory/2696-3-0x00000000059B0000-0x0000000005F54000-memory.dmp

      Filesize

      5.6MB

    • memory/2696-2-0x00000000052D0000-0x000000000536C000-memory.dmp

      Filesize

      624KB

    • memory/2696-1-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-49-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-50-0x0000000005180000-0x0000000005190000-memory.dmp

      Filesize

      64KB

    • memory/4068-51-0x00000000751F0000-0x00000000759A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-52-0x0000000005180000-0x0000000005190000-memory.dmp

      Filesize

      64KB