Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de02ba99f65d07c4973b33fec5aefdac.exe
Resource
win10v2004-20240226-en
General
-
Target
de02ba99f65d07c4973b33fec5aefdac.exe
-
Size
1.6MB
-
MD5
de02ba99f65d07c4973b33fec5aefdac
-
SHA1
54419bd1e07a8e3ab393c55cf55570bc3fe2b526
-
SHA256
05f0ad4df75e687b4a188f34e31a60afb0a772d32e51f6e77f62ec484e7cf35e
-
SHA512
c38740af611109ebae7552045e4b1d88909840d54c91ad585adba52b2d36be806fde3f84c1cd18c086debe995ef5475faf9b53614ebe83fe56825c97a877d6d8
-
SSDEEP
49152:ReKvWKlH8SM3ShGiSTZdXTZdHXTZdXTZ:
Malware Config
Extracted
limerat
3Qus18px7doBsKbzeHGBmnanWuPS4S3tAn
-
aes_key
7aXx4CiaQxg8Py3gI
-
antivm
true
-
c2_url
https://pastebin.com/raw/ZJvAZBza
-
delay
60
-
download_payload
false
-
install
true
-
install_name
csrss.exe
-
main_folder
Temp
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
de02ba99f65d07c4973b33fec5aefdac.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation de02ba99f65d07c4973b33fec5aefdac.exe -
Executes dropped EXE 3 IoCs
Processes:
TeraBIT Virus Maker 3.1 (1).exeWservices.exeWservices.exepid process 948 TeraBIT Virus Maker 3.1 (1).exe 4992 Wservices.exe 4904 Wservices.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
de02ba99f65d07c4973b33fec5aefdac.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wservices.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Wservices.exe" de02ba99f65d07c4973b33fec5aefdac.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Wservices.exedescription pid process target process PID 4992 set thread context of 4904 4992 Wservices.exe Wservices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
TeraBIT Virus Maker 3.1 (1).exepid process 948 TeraBIT Virus Maker 3.1 (1).exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
de02ba99f65d07c4973b33fec5aefdac.exeWservices.exedescription pid process target process PID 2224 wrote to memory of 948 2224 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 2224 wrote to memory of 948 2224 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 2224 wrote to memory of 948 2224 de02ba99f65d07c4973b33fec5aefdac.exe TeraBIT Virus Maker 3.1 (1).exe PID 2224 wrote to memory of 4992 2224 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 2224 wrote to memory of 4992 2224 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 2224 wrote to memory of 4992 2224 de02ba99f65d07c4973b33fec5aefdac.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe PID 4992 wrote to memory of 4904 4992 Wservices.exe Wservices.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"C:\Users\Admin\AppData\Local\Temp\de02ba99f65d07c4973b33fec5aefdac.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"C:\Users\Admin\AppData\Local\Temp\TeraBIT Virus Maker 3.1 (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"3⤵
- Executes dropped EXE
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
617B
MD5e07efe3f1e4fcc39483a46d0644e1750
SHA1083566e513d8090982a8f2d2c57864f7e5eea721
SHA256d35da5dbc639e94852448d93722de5260388abf8a0a6b80d947d8acf02209617
SHA512e29fac6efce55130598dd9ca0be18e2934d8ed417087848f4c80c1754312f1dae2eb0fc3e85e58aa11abde23a221bdf8f6b80df3a9acad4891626f667f05b474
-
Filesize
676KB
MD55b7cbfc8d8bc22798ee4fc4aa4b03e3b
SHA176f643b3f67f76f4182ef18e43e298e2e8570044
SHA25635bcbae8dd3191cf58c48618d0cc43fb8fee8493e7c872d7742b4d499c383af9
SHA51285228be9bc801d412bab150f3238c95390e18ab5f3a88bbc2406a40818e7c4482e77462b4a302be78075b1b631d6ac4a5939b8040d3742d3b822361642f796bd
-
Filesize
1.6MB
MD5de02ba99f65d07c4973b33fec5aefdac
SHA154419bd1e07a8e3ab393c55cf55570bc3fe2b526
SHA25605f0ad4df75e687b4a188f34e31a60afb0a772d32e51f6e77f62ec484e7cf35e
SHA512c38740af611109ebae7552045e4b1d88909840d54c91ad585adba52b2d36be806fde3f84c1cd18c086debe995ef5475faf9b53614ebe83fe56825c97a877d6d8