Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
a039c46553a47916ff3376b88dde0a81.exe
Resource
win7-20231215-en
General
-
Target
a039c46553a47916ff3376b88dde0a81.exe
-
Size
694KB
-
MD5
a039c46553a47916ff3376b88dde0a81
-
SHA1
84e9846e8895c79a3a65cf3e54aa7a52dacf995a
-
SHA256
ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01
-
SHA512
d342258b1f57ed230eb1e3542eebb493edbbf82aa1d62d1d9b3dcc301e6700e69a3feaf99e29544c68b9c6092a70a3a98b872da1485e78e5891f1a2fa8a22c2a
-
SSDEEP
12288:KthfCHBrr9/uuQl7nNPV7mtU1EwiTsej472iNSzAaP:LsxV7my1cFjM1IzAg
Malware Config
Extracted
limerat
bc1qdajqyl8uarnz63e2we9xchx3zqcd5xcyfshfyk
-
aes_key
lime
-
antivm
true
-
c2_url
https://pastebin.com/raw/4Xj3extx
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/4Xj3extx
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation a039c46553a47916ff3376b88dde0a81.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation a039c46553a47916ff3376b88dde0a81.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Wservices.exe -
Executes dropped EXE 3 IoCs
pid Process 1004 Wservices.exe 1140 Wservices.exe 4068 Wservices.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 47 pastebin.com 46 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2696 set thread context of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 1004 set thread context of 4068 1004 Wservices.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4592 schtasks.exe 836 schtasks.exe 3216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2696 a039c46553a47916ff3376b88dde0a81.exe 2696 a039c46553a47916ff3376b88dde0a81.exe 2696 a039c46553a47916ff3376b88dde0a81.exe 1004 Wservices.exe 1004 Wservices.exe 1004 Wservices.exe 4068 Wservices.exe 4068 Wservices.exe 4068 Wservices.exe 4068 Wservices.exe 4068 Wservices.exe 4068 Wservices.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2696 a039c46553a47916ff3376b88dde0a81.exe Token: SeDebugPrivilege 1004 Wservices.exe Token: SeDebugPrivilege 4068 Wservices.exe Token: SeDebugPrivilege 4068 Wservices.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4592 2696 a039c46553a47916ff3376b88dde0a81.exe 91 PID 2696 wrote to memory of 4592 2696 a039c46553a47916ff3376b88dde0a81.exe 91 PID 2696 wrote to memory of 4592 2696 a039c46553a47916ff3376b88dde0a81.exe 91 PID 2696 wrote to memory of 2720 2696 a039c46553a47916ff3376b88dde0a81.exe 93 PID 2696 wrote to memory of 2720 2696 a039c46553a47916ff3376b88dde0a81.exe 93 PID 2696 wrote to memory of 2720 2696 a039c46553a47916ff3376b88dde0a81.exe 93 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2696 wrote to memory of 2432 2696 a039c46553a47916ff3376b88dde0a81.exe 94 PID 2432 wrote to memory of 836 2432 a039c46553a47916ff3376b88dde0a81.exe 95 PID 2432 wrote to memory of 836 2432 a039c46553a47916ff3376b88dde0a81.exe 95 PID 2432 wrote to memory of 836 2432 a039c46553a47916ff3376b88dde0a81.exe 95 PID 2432 wrote to memory of 1004 2432 a039c46553a47916ff3376b88dde0a81.exe 97 PID 2432 wrote to memory of 1004 2432 a039c46553a47916ff3376b88dde0a81.exe 97 PID 2432 wrote to memory of 1004 2432 a039c46553a47916ff3376b88dde0a81.exe 97 PID 1004 wrote to memory of 3216 1004 Wservices.exe 98 PID 1004 wrote to memory of 3216 1004 Wservices.exe 98 PID 1004 wrote to memory of 3216 1004 Wservices.exe 98 PID 1004 wrote to memory of 1140 1004 Wservices.exe 100 PID 1004 wrote to memory of 1140 1004 Wservices.exe 100 PID 1004 wrote to memory of 1140 1004 Wservices.exe 100 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101 PID 1004 wrote to memory of 4068 1004 Wservices.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcuajQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp952.tmp"2⤵
- Creates scheduled task(s)
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"C:\Users\Admin\AppData\Local\Temp\a039c46553a47916ff3376b88dde0a81.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\Wservices.exe'"3⤵
- Creates scheduled task(s)
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\Wservices.exe"C:\Users\Admin\AppData\Local\Temp\Wservices.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcuajQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE114.tmp"4⤵
- Creates scheduled task(s)
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\Wservices.exe"C:\Users\Admin\AppData\Local\Temp\Wservices.exe"4⤵
- Executes dropped EXE
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\Wservices.exe"C:\Users\Admin\AppData\Local\Temp\Wservices.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a039c46553a47916ff3376b88dde0a81.exe.log
Filesize1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
694KB
MD5a039c46553a47916ff3376b88dde0a81
SHA184e9846e8895c79a3a65cf3e54aa7a52dacf995a
SHA256ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01
SHA512d342258b1f57ed230eb1e3542eebb493edbbf82aa1d62d1d9b3dcc301e6700e69a3feaf99e29544c68b9c6092a70a3a98b872da1485e78e5891f1a2fa8a22c2a
-
Filesize
543KB
MD5fbbda540027636d7c982bd35320e3f56
SHA1d5d99b6da6c95bfb38910682e93ced94566cd2c5
SHA2569a725d41cdf628f258fd868911278f575e94153186a966246164dec4ce16d0eb
SHA5127c1529a77f4a6752d8523ebf0a4885e0f3bebd54800c0afa34856d34096be222b4a00f0749840fd2096ea1d1842ab0dc3e76d9b12b3b6b46829754fef6f9627c
-
Filesize
576KB
MD558468a090962b06a697bca4990051d16
SHA19104aab3c71f5d2d58127bf4a2ce114c9636826c
SHA256e1ecfbba5e7bf0c2d68642dc8fe536a8019b408a1f182046118b90b19daf9cf1
SHA5124d2932250cf3caaac6821c55e270bf9b025ef5ed56e4b5d15030f079bb8972d4bacd916c2c534d6a2b36eede7178309b7c4eb93dbe5dc815cebd6ba52bc019d5
-
Filesize
1KB
MD52a4d4a62c87aaaa9949e3803e5f3a0d7
SHA1b7dd8e8f437af01437f6f8c376cfb7ee34fad096
SHA2564f66c460a361c6d9b5294269759356eecb364f4b368d40033d63d119dae851b6
SHA512775189171d318a42b22c1940566a3553b45b22b13ccd5c752b93e474bd884565c5aed669aba614a7dfe3ab64d94ba00ca24392b2894189d3c5cbb7fda04fd1f0