Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 01:02

General

  • Target

    New-Clientt.exe

  • Size

    28KB

  • MD5

    8b280f12bf1b22416a5c8d7dfc521fc9

  • SHA1

    43af35bc17f400b83453633826a8aa596b05e5ca

  • SHA256

    28562bc7771379178458f8226e98b65c6a946bca57d6708d2b7528cd7724fdec

  • SHA512

    f76fb736d143cbe4cf45d9d2c63a289296bedc7b59f661124df5006408b3c9e974a6174378b9c9b79ae98f8fce1bbaf557ca2b095e9b1f48196ff44d1d9efc3b

  • SSDEEP

    384:eB+Sbj6NKXpi6h/AHH0QXlqDiErxuLvDKNrCeJE3WNgT+st/ThpOQro3lcbAd6sX:UpXI6h/wHDIxu745Ni9tr302wj

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

bc1q698dtm422e6tzu2jna8laaspy0pjz2sdecg8dn

Attributes
  • aes_key

    123345

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • delay

    5

  • download_payload

    true

  • install

    true

  • install_name

    Skin Change.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \Skin Change\

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New-Clientt.exe
    "C:\Users\Admin\AppData\Local\Temp\New-Clientt.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Skin Change\Skin Change.exe'"
      2⤵
      • Creates scheduled task(s)
      PID:3932
    • C:\Users\Admin\AppData\Roaming\Skin Change\Skin Change.exe
      "C:\Users\Admin\AppData\Roaming\Skin Change\Skin Change.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4272
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffcd39546f8,0x7ffcd3954708,0x7ffcd3954718
      2⤵
        PID:4984
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4100
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:3244
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
          2⤵
            PID:2832
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
            2⤵
              PID:4888
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
              2⤵
                PID:4064
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                2⤵
                  PID:4072
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:1
                  2⤵
                    PID:1508
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                    2⤵
                      PID:800
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4616
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                      2⤵
                        PID:4828
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                        2⤵
                          PID:2688
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:1
                          2⤵
                            PID:3768
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13393036836214641192,4928299601635782259,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2560 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:540
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4388
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4736

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              ccf8b7b618672b2da2775b890d06c7af

                              SHA1

                              83717bc0ff28b8775a1360ef02882be22e4a5263

                              SHA256

                              ef08e2971a9ba903c9b91412275b39aabfd6d4aa5c46ade37d74ff86f0285420

                              SHA512

                              eb550889db8c4c0e7d79b2bd85c7d0e61b696df10ce3d76c48ab21b935c7ecc7b12403a00d6570e7d8e4121f72747242c2358f8f0823f804e704bd44ed603b97

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              91746379e314b064719e43e3422d0388

                              SHA1

                              65f1a2b5a93922d589142a6edf99b5b35d986dba

                              SHA256

                              0b3cf8ae20afd84c9bf06546e876c84922cb5800526df72a628479f4d5487df7

                              SHA512

                              a783d8d9613cf92020fc36fd27d384dbd4e105a1ebd02c4507bf7263e61ff5b377e6d1734b066700782fa64bcbeb11af31ac3972d404625cbdb587cfa3bc0808

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              d45a2261fc64542bcd5a7655d77849a4

                              SHA1

                              2f794758241df776a5556c6c46ec9ca7c785861d

                              SHA256

                              2a8409b060dc73c312ff005ae7f0baba9ac687f06471b422a73f56ce0ea6c4c1

                              SHA512

                              ed55022712844e801a0aae37662fb2b55df37c5228d3b689d6b3b28405f1ef13caed9d15aa88893cff3f6423560a3aae13fe222e7ffacae490f84424ba7aa8a0

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              4a25ed5b36f477bf8ec35041f8cb3429

                              SHA1

                              8dc35ef0c3cc961a99197f13647b90c14ad24260

                              SHA256

                              248c0f67e8545d9e9ac6dc0384597afd039ad359494d88d4a1f3ed6e335ffdfe

                              SHA512

                              49895b29ee16671d8c5cf50f81955913a399a16114e85e43714f8a496fc295c76f0fedae6cf6cb67f2df62f7cef4b55bffe4dd94712c0aed442a372438d9b5a6

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\a001f45b-28ac-4b8b-a4c1-9e62de30e474.tmp

                              Filesize

                              11KB

                              MD5

                              b9612aef62f2402f20ed3c49cba6fbe5

                              SHA1

                              479a64864127ca3c9f0e923f63e50d704f6abb96

                              SHA256

                              6c92cea918a914d83e72810909a1f0e4c56acff26c94b1d16d6db390b4456d7e

                              SHA512

                              3b214d316650e1bae81a6f72d3aec47f4a8ee7159a49777a3aac7013660fa208abd05ad9f446425e4afff2cbf90b211d7b5c376085020ea92ff3c92042e28093

                            • C:\Users\Admin\AppData\Roaming\Skin Change\Skin Change.exe

                              Filesize

                              28KB

                              MD5

                              8b280f12bf1b22416a5c8d7dfc521fc9

                              SHA1

                              43af35bc17f400b83453633826a8aa596b05e5ca

                              SHA256

                              28562bc7771379178458f8226e98b65c6a946bca57d6708d2b7528cd7724fdec

                              SHA512

                              f76fb736d143cbe4cf45d9d2c63a289296bedc7b59f661124df5006408b3c9e974a6174378b9c9b79ae98f8fce1bbaf557ca2b095e9b1f48196ff44d1d9efc3b

                            • memory/4272-18-0x0000000006A20000-0x0000000006AB2000-memory.dmp

                              Filesize

                              584KB

                            • memory/4272-17-0x0000000005650000-0x0000000005660000-memory.dmp

                              Filesize

                              64KB

                            • memory/4272-15-0x00000000751C0000-0x0000000075970000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4272-76-0x00000000751C0000-0x0000000075970000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4272-77-0x0000000005650000-0x0000000005660000-memory.dmp

                              Filesize

                              64KB

                            • memory/4608-1-0x00000000751C0000-0x0000000075970000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4608-16-0x00000000751C0000-0x0000000075970000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4608-5-0x0000000006530000-0x0000000006AD4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4608-4-0x0000000005A70000-0x0000000005A80000-memory.dmp

                              Filesize

                              64KB

                            • memory/4608-3-0x0000000005900000-0x0000000005966000-memory.dmp

                              Filesize

                              408KB

                            • memory/4608-2-0x0000000005860000-0x00000000058FC000-memory.dmp

                              Filesize

                              624KB

                            • memory/4608-0-0x0000000000EB0000-0x0000000000EBC000-memory.dmp

                              Filesize

                              48KB