Analysis
-
max time kernel
129s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win10v2004-20240226-en
General
-
Target
de02ba99f65d07c4973b33fec5aefdac.exe
-
Size
1.6MB
-
MD5
de02ba99f65d07c4973b33fec5aefdac
-
SHA1
54419bd1e07a8e3ab393c55cf55570bc3fe2b526
-
SHA256
05f0ad4df75e687b4a188f34e31a60afb0a772d32e51f6e77f62ec484e7cf35e
-
SHA512
c38740af611109ebae7552045e4b1d88909840d54c91ad585adba52b2d36be806fde3f84c1cd18c086debe995ef5475faf9b53614ebe83fe56825c97a877d6d8
-
SSDEEP
49152:ReKvWKlH8SM3ShGiSTZdXTZdHXTZdXTZ:
Malware Config
Extracted
limerat
3Qus18px7doBsKbzeHGBmnanWuPS4S3tAn
-
aes_key
7aXx4CiaQxg8Py3gI
-
antivm
true
-
c2_url
https://pastebin.com/raw/ZJvAZBza
-
delay
60
-
download_payload
false
-
install
true
-
install_name
csrss.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
TeraBIT Virus Maker 3.1 (1).exeWservices.exeWservices.exepid process 2820 TeraBIT Virus Maker 3.1 (1).exe 1612 Wservices.exe 580 Wservices.exe -
Loads dropped DLL 3 IoCs
Processes:
de02ba99f65d07c4973b33fec5aefdac.exepid process 1704 de02ba99f65d07c4973b33fec5aefdac.exe 1704 de02ba99f65d07c4973b33fec5aefdac.exe 1704 de02ba99f65d07c4973b33fec5aefdac.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
de02ba99f65d07c4973b33fec5aefdac.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wservices.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Wservices.exe" de02ba99f65d07c4973b33fec5aefdac.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Wservices.exedescription pid process target process PID 1612 set thread context of 580 1612 Wservices.exe Wservices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
TeraBIT Virus Maker 3.1 (1).exepid process 2820 TeraBIT Virus Maker 3.1 (1).exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
de02ba99f65d07c4973b33fec5aefdac.exeWservices.exedescription pid process target process PID 1704 wrote to memory of 2820 1704 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 1704 wrote to memory of 2820 1704 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 1704 wrote to memory of 2820 1704 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 1704 wrote to memory of 2820 1704 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 1704 wrote to memory of 1612 1704 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 1704 wrote to memory of 1612 1704 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 1704 wrote to memory of 1612 1704 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 1704 wrote to memory of 1612 1704 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe PID 1612 wrote to memory of 580 1612 Wservices.exe Wservices.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"3⤵
- Executes dropped EXE
PID:580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD55b7cbfc8d8bc22798ee4fc4aa4b03e3b
SHA176f643b3f67f76f4182ef18e43e298e2e8570044
SHA25635bcbae8dd3191cf58c48618d0cc43fb8fee8493e7c872d7742b4d499c383af9
SHA51285228be9bc801d412bab150f3238c95390e18ab5f3a88bbc2406a40818e7c4482e77462b4a302be78075b1b631d6ac4a5939b8040d3742d3b822361642f796bd
-
Filesize
1.6MB
MD5de02ba99f65d07c4973b33fec5aefdac
SHA154419bd1e07a8e3ab393c55cf55570bc3fe2b526
SHA25605f0ad4df75e687b4a188f34e31a60afb0a772d32e51f6e77f62ec484e7cf35e
SHA512c38740af611109ebae7552045e4b1d88909840d54c91ad585adba52b2d36be806fde3f84c1cd18c086debe995ef5475faf9b53614ebe83fe56825c97a877d6d8