Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
b9c8909fb90c1cef16563cd6be9f561b.exe
Resource
win7-20240220-en
General
-
Target
b9c8909fb90c1cef16563cd6be9f561b.exe
-
Size
1.1MB
-
MD5
b9c8909fb90c1cef16563cd6be9f561b
-
SHA1
afb8a215aba26131a31e76005b8b6356dec87a6b
-
SHA256
d632c85338f64894158dcc17ee01ea7f4d338916ced96e1c1b572d843d15e1c1
-
SHA512
3b35e3157585996567856a9f765f4d6d9b8734653e6ad42c072901d0341f8295730799047fc2881418c82ddbc0a4befcc2bc956c3a79fb9bedabf25e6efaadcf
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa97aWtjzjFtuM25Z:/h+ZkldoPK8Ya971XjFtAZ
Malware Config
Extracted
limerat
1JBKLGyE6AnRGvk92A8x3m8qmXfh3fcEty
-
aes_key
nulled
-
antivm
true
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Winservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2032 sdchange.exe 352 sdchange.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 2 pastebin.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RegAsm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RegAsm.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000014f57-50.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2908 set thread context of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2032 set thread context of 2204 2032 sdchange.exe 36 PID 352 set thread context of 1192 352 sdchange.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe 3060 schtasks.exe 600 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 RegAsm.exe Token: SeDebugPrivilege 1668 RegAsm.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 1668 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 28 PID 2908 wrote to memory of 3060 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 29 PID 2908 wrote to memory of 3060 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 29 PID 2908 wrote to memory of 3060 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 29 PID 2908 wrote to memory of 3060 2908 b9c8909fb90c1cef16563cd6be9f561b.exe 29 PID 2072 wrote to memory of 2032 2072 taskeng.exe 35 PID 2072 wrote to memory of 2032 2072 taskeng.exe 35 PID 2072 wrote to memory of 2032 2072 taskeng.exe 35 PID 2072 wrote to memory of 2032 2072 taskeng.exe 35 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 2204 2032 sdchange.exe 36 PID 2032 wrote to memory of 600 2032 sdchange.exe 37 PID 2032 wrote to memory of 600 2032 sdchange.exe 37 PID 2032 wrote to memory of 600 2032 sdchange.exe 37 PID 2032 wrote to memory of 600 2032 sdchange.exe 37 PID 2072 wrote to memory of 352 2072 taskeng.exe 39 PID 2072 wrote to memory of 352 2072 taskeng.exe 39 PID 2072 wrote to memory of 352 2072 taskeng.exe 39 PID 2072 wrote to memory of 352 2072 taskeng.exe 39 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1192 352 sdchange.exe 40 PID 352 wrote to memory of 1848 352 sdchange.exe 41 PID 352 wrote to memory of 1848 352 sdchange.exe 41 PID 352 wrote to memory of 1848 352 sdchange.exe 41 PID 352 wrote to memory of 1848 352 sdchange.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c8909fb90c1cef16563cd6be9f561b.exe"C:\Users\Admin\AppData\Local\Temp\b9c8909fb90c1cef16563cd6be9f561b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3060
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {561919D9-DCBC-4FED-A526-9F079C7135B2} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2204
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:600
-
-
-
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:1192
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1.1MB
MD5a1445f2a4f4b5bf46ca1fa6ff23f3811
SHA114eab63b83a7be805f177aaad3fb7433767a6ffa
SHA25668939f231a52426962ea9dfa6a662c6b1c1b2447597f070bbd7380539ec88e44
SHA512e1aac368b311488feb48f51983304a7bd78f513f6a0764f6a604d04af7b1114bffba127fd9c54b47cc9844292646a61c9ffbd5843627b4f4725bde14d8279106