Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
c819e2b4d2c91d98aae0304c1ff5aa38.exe
Resource
win7-20240221-en
General
-
Target
c819e2b4d2c91d98aae0304c1ff5aa38.exe
-
Size
1.1MB
-
MD5
c819e2b4d2c91d98aae0304c1ff5aa38
-
SHA1
5bf1b2d544e7e4cce5f082d19e5e48def970bb83
-
SHA256
f46f42d48bccbc1ddf2758cac437b81e6d6c6d3e920d29ef2cbe627cc6a5f89f
-
SHA512
cfa54d31df64f8776d12696b59368eee5653c2249429f771f79565c30a3f652331f8ec24638cd2c522bd4d8a32682634a3d3c0b518ad3ce4e923fcb5916beeda
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa97aWtjzjFtuM25t:/h+ZkldoPK8Ya971XjFtAt
Malware Config
Extracted
limerat
1JBKLGyE6AnRGvk92A8x3m8qmXfh3fcEty
-
aes_key
nulled
-
antivm
true
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Winservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/cXuQ0V20
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2504 sdchange.exe 1264 sdchange.exe 1588 sdchange.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RegAsm.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d000000014267-12.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2020 set thread context of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2504 set thread context of 2588 2504 sdchange.exe 33 PID 1264 set thread context of 1684 1264 sdchange.exe 40 PID 1588 set thread context of 2212 1588 sdchange.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1972 schtasks.exe 2536 schtasks.exe 240 schtasks.exe 1252 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 RegAsm.exe Token: SeDebugPrivilege 1728 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1728 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 28 PID 2020 wrote to memory of 1972 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 29 PID 2020 wrote to memory of 1972 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 29 PID 2020 wrote to memory of 1972 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 29 PID 2020 wrote to memory of 1972 2020 c819e2b4d2c91d98aae0304c1ff5aa38.exe 29 PID 2200 wrote to memory of 2504 2200 taskeng.exe 32 PID 2200 wrote to memory of 2504 2200 taskeng.exe 32 PID 2200 wrote to memory of 2504 2200 taskeng.exe 32 PID 2200 wrote to memory of 2504 2200 taskeng.exe 32 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2588 2504 sdchange.exe 33 PID 2504 wrote to memory of 2536 2504 sdchange.exe 34 PID 2504 wrote to memory of 2536 2504 sdchange.exe 34 PID 2504 wrote to memory of 2536 2504 sdchange.exe 34 PID 2504 wrote to memory of 2536 2504 sdchange.exe 34 PID 2200 wrote to memory of 1264 2200 taskeng.exe 39 PID 2200 wrote to memory of 1264 2200 taskeng.exe 39 PID 2200 wrote to memory of 1264 2200 taskeng.exe 39 PID 2200 wrote to memory of 1264 2200 taskeng.exe 39 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 1684 1264 sdchange.exe 40 PID 1264 wrote to memory of 240 1264 sdchange.exe 41 PID 1264 wrote to memory of 240 1264 sdchange.exe 41 PID 1264 wrote to memory of 240 1264 sdchange.exe 41 PID 1264 wrote to memory of 240 1264 sdchange.exe 41 PID 2200 wrote to memory of 1588 2200 taskeng.exe 43 PID 2200 wrote to memory of 1588 2200 taskeng.exe 43 PID 2200 wrote to memory of 1588 2200 taskeng.exe 43 PID 2200 wrote to memory of 1588 2200 taskeng.exe 43 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 2212 1588 sdchange.exe 44 PID 1588 wrote to memory of 1252 1588 sdchange.exe 45 PID 1588 wrote to memory of 1252 1588 sdchange.exe 45 PID 1588 wrote to memory of 1252 1588 sdchange.exe 45 PID 1588 wrote to memory of 1252 1588 sdchange.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c819e2b4d2c91d98aae0304c1ff5aa38.exe"C:\Users\Admin\AppData\Local\Temp\c819e2b4d2c91d98aae0304c1ff5aa38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1972
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {19F93AAD-5AF1-472A-8BA8-6006DBF6AEAD} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2588
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2536
-
-
-
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:1684
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:240
-
-
-
C:\Users\Admin\secinit\sdchange.exeC:\Users\Admin\secinit\sdchange.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵PID:2212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SettingSyncHost /tr "C:\Users\Admin\secinit\sdchange.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1.1MB
MD5422e25352d7ca91bea1753312de65466
SHA1aebcddda6623d1e44a47d88866f4f3c24c15bf44
SHA2563bd47218aa5e92140b982b30ef5f5160a6b6ce06b8a817af5a3346e0609e8fe3
SHA512cac08f8e5a8d75486860d83d92580d7bba133dae5f8067fe271b74864458f5e474814860a64b47bb661215e474c2c1528a03e0f83c36167dc005e97b7c8f36f5