Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
b8e0c2a24d5cf91635ea9ba58a6a05f5.exe
Resource
win7-20240221-en
General
-
Target
b8e0c2a24d5cf91635ea9ba58a6a05f5.exe
-
Size
1.1MB
-
MD5
b8e0c2a24d5cf91635ea9ba58a6a05f5
-
SHA1
29682af8815a0392780aa51ae3259ced1894e590
-
SHA256
a3347937b18828817414419e8d01ff32c7eea9090cf0d98a1074fbd38160398f
-
SHA512
049acf8c821309fd6bae067e6966ba91d776ed95bf6105f8cfd5e99c275df2e40f5f44eb83a445a34321d8174f7d784e50e9dd5ee8e1fd2ff948d930cc714f1b
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa97aWtjzjFtuM253:/h+ZkldoPK8Ya971XjFtA3
Malware Config
Extracted
limerat
1JBKLGyE6AnRGvk92A8x3m8qmXfh3fcEty
-
aes_key
nulled
-
antivm
true
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Winservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2612 sdchange.exe 900 sdchange.exe 1420 sdchange.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RegAsm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RegAsm.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000015a2d-12.dat autoit_exe behavioral1/files/0x000b000000015a2d-74.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2172 set thread context of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2612 set thread context of 2684 2612 sdchange.exe 34 PID 900 set thread context of 2912 900 sdchange.exe 40 PID 1420 set thread context of 2260 1420 sdchange.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1388 schtasks.exe 2560 schtasks.exe 1276 schtasks.exe 1288 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 RegAsm.exe Token: SeDebugPrivilege 2240 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 2240 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 28 PID 2172 wrote to memory of 1388 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 29 PID 2172 wrote to memory of 1388 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 29 PID 2172 wrote to memory of 1388 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 29 PID 2172 wrote to memory of 1388 2172 b8e0c2a24d5cf91635ea9ba58a6a05f5.exe 29 PID 2540 wrote to memory of 2612 2540 taskeng.exe 32 PID 2540 wrote to memory of 2612 2540 taskeng.exe 32 PID 2540 wrote to memory of 2612 2540 taskeng.exe 32 PID 2540 wrote to memory of 2612 2540 taskeng.exe 32 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2684 2612 sdchange.exe 34 PID 2612 wrote to memory of 2560 2612 sdchange.exe 35 PID 2612 wrote to memory of 2560 2612 sdchange.exe 35 PID 2612 wrote to memory of 2560 2612 sdchange.exe 35 PID 2612 wrote to memory of 2560 2612 sdchange.exe 35 PID 2540 wrote to memory of 900 2540 taskeng.exe 39 PID 2540 wrote to memory of 900 2540 taskeng.exe 39 PID 2540 wrote to memory of 900 2540 taskeng.exe 39 PID 2540 wrote to memory of 900 2540 taskeng.exe 39 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 2912 900 sdchange.exe 40 PID 900 wrote to memory of 1276 900 sdchange.exe 41 PID 900 wrote to memory of 1276 900 sdchange.exe 41 PID 900 wrote to memory of 1276 900 sdchange.exe 41 PID 900 wrote to memory of 1276 900 sdchange.exe 41 PID 2540 wrote to memory of 1420 2540 taskeng.exe 43 PID 2540 wrote to memory of 1420 2540 taskeng.exe 43 PID 2540 wrote to memory of 1420 2540 taskeng.exe 43 PID 2540 wrote to memory of 1420 2540 taskeng.exe 43 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 2260 1420 sdchange.exe 44 PID 1420 wrote to memory of 1288 1420 sdchange.exe 45 PID 1420 wrote to memory of 1288 1420 sdchange.exe 45 PID 1420 wrote to memory of 1288 1420 sdchange.exe 45 PID 1420 wrote to memory of 1288 1420 sdchange.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e0c2a24d5cf91635ea9ba58a6a05f5.exe"C:\Users\Admin\AppData\Local\Temp\b8e0c2a24d5cf91635ea9ba58a6a05f5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1388
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9C6CCCA6-7BE1-40BF-BE22-EEEEADEAB7B7} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2684
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2560
-
-
-
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1276
-
-
-
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1.1MB
MD5291a4c051541ebd7165ff1ebfe3debc9
SHA1c1b5581f9b42fa00420bcd1de82c97a2521abf89
SHA25642f40518f6c687a4d74f0c44dc763e77e50c68f53c9757966c12d074036e829e
SHA5127e41b6ebef0ce6e993b8bb9294d7185f1bd459dc840f29d4a24099de685fed0e63306b066f69ad2399a339b356914ba6e8d80d725437434c1417da8138eed61f
-
Filesize
880KB
MD5cebae8253666a83ca4cfea91f74f4f4d
SHA1a6036658359742b0a141c8c75223862786315cb2
SHA256c070ba60c36ede01b98a10241112ae7d6078c8bc51c0e47acc716816fa2fa104
SHA5124308e6fd4e0552cbc24e19456bb7018e583c75e1397036d511103e268c7f14089c1aa13a48e56bb1258ff8f83f848fe6f08b88baa963e35cebbd29c655972d99