Analysis Overview
SHA256
1894c87402a76aee2b84ee22449b925486e428f690e42fe288a3982ed71ab20f
Threat Level: Known bad
The file WinRAR archive.rar was found to be: Known bad.
Malicious Activity Summary
Contains code to disable Windows Defender
Modifies security service
Modifies Windows Defender Real-time Protection settings
Modifies WinLogon for persistence
LimeRAT
Limerat family
Deletes shadow copies
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Enumerates connected drives
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Uses Task Scheduler COM API
Creates scheduled task(s)
Runs ping.exe
Disables Windows logging functionality
Interacts with shadow copies
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-04-26 19:22
Signatures
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Limerat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-26 19:22
Reported
2024-04-26 19:53
Platform
win11-20240426-en
Max time kernel
1799s
Max time network
1803s
Command Line
Signatures
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
LimeRAT
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\AdminMIcrosoft TeamsMIcrosoft Teams.exe\"" | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\AdminMIcrosoft TeamsMIcrosoft Teams.exe\"" | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Modifies security service
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Deletes shadow copies
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\D: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\H: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\G: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\H: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\F: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\F: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\g: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\e: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\g: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\E: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\G: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\h: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\E: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\h: | C:\Windows\system32\vssadmin.exe | N/A |
| File opened (read-only) | \??\e: | C:\Windows\system32\vssadmin.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | iplogger.org | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | iplogger.org | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Disables Windows logging functionality
Interacts with shadow copies
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
| N/A | N/A | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
| N/A | N/A | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
| Token: SeAuditPrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Processes
C:\Users\Admin\AppData\Local\Temp\Client.exe
"C:\Users\Admin\AppData\Local\Temp\Client.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" Get-MpPreference -verbose
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin Delete Shadows /all /quiet
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadow /for=c: /on=c: /maxsize=401MB
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB
C:\Windows\SYSTEM32\cmd.exe
cmd /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded
C:\Windows\SYSTEM32\cmd.exe
cmd /c Vssadmin delete shadowstorage /all /quiet
C:\Windows\system32\vssadmin.exe
vssadmin Delete Shadows /all /quiet
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded
C:\Windows\system32\vssadmin.exe
vssadmin resize shadow /for=c: /on=c: /maxsize=401MB
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB
C:\Windows\system32\vssadmin.exe
Vssadmin delete shadowstorage /all /quiet
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB
C:\Windows\system32\vssadmin.exe
vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /st "20:17" /sc daily /mo "3" /tn "Intel Platform Trust Technology" /tr "'explorer'http://bit.ly/2uTvEZn"
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /st "18:29" /sc daily /mo "5" /tn "Intel Platform Trust Technology" /tr "'explorer'http://bit.ly/2uTvEZn"
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /st "09:53" /sc daily /mo "1" /tn "Intel Platform Trust Technology" /tr "'explorer'http://bit.ly/2uTvEZn"
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /st "13:02" /sc weekly /mo "3" /d "Sun" /tn "Intel Platform Trust Technology" /tr "'explorer'http://bit.ly/2uTvEZn"
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /st "05:01" /sc monthly /m "may" /tn "Intel Platform Trust Technology" /tr "'explorer'http://bit.ly/2uTvEZn"
C:\Windows\SYSTEM32\cmd.exe
cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Client.exe"
C:\Windows\system32\PING.EXE
ping 0 -n 2
C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe
"C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | iplogger.org | udp |
| US | 172.67.132.113:443 | iplogger.org | tcp |
| US | 64.40.144.30:21 | ftp.encompossoftware.com | tcp |
| US | 8.8.8.8:53 | 113.132.67.172.in-addr.arpa | udp |
| US | 64.40.144.30:56903 | ftp.encompossoftware.com | tcp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 93.184.215.14:443 | www.example.com | tcp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 172.67.19.24:443 | pastebin.com | tcp |
| US | 104.20.4.235:443 | pastebin.com | tcp |
Files
memory/5068-0-0x0000024A54500000-0x0000024A54544000-memory.dmp
memory/5068-1-0x00007FFAF1660000-0x00007FFAF2122000-memory.dmp
memory/5068-2-0x0000024A6EB40000-0x0000024A6EB50000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dsenrjdy.php.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1300-3-0x0000023538650000-0x0000023538672000-memory.dmp
memory/1300-14-0x0000023520140000-0x0000023520150000-memory.dmp
memory/1300-13-0x0000023520140000-0x0000023520150000-memory.dmp
memory/1300-12-0x00007FFAF1660000-0x00007FFAF2122000-memory.dmp
memory/1300-15-0x0000023520140000-0x0000023520150000-memory.dmp
memory/1300-16-0x0000023520140000-0x0000023520150000-memory.dmp
memory/1300-18-0x00007FFAF1660000-0x00007FFAF2122000-memory.dmp
memory/5068-20-0x00007FFAF1660000-0x00007FFAF2122000-memory.dmp
C:\Users\AdminMIcrosoft TeamsMIcrosoft Teams.exe
| MD5 | 7746b64cfda991754c277e8dbfcb12bf |
| SHA1 | f3d05a15cf7c4f1d07bca938076cb53df9c39e16 |
| SHA256 | ba34bf8ee0d74e9978464c7daa4c0f44cfeafbb2096364ee58432fd6ebbced91 |
| SHA512 | 04b7a7dc507c150cc21217ba41a2f0cc7448f59e5b62e2f9279540a1cd2ed4b02b56d1d20ce901f09f6e347fb6e7208bfc08f1ecf814810af9ae05cf54327334 |
memory/5068-32-0x00007FFAF1660000-0x00007FFAF2122000-memory.dmp