Analysis Overview
SHA256
47415dc54f54a881e0fdd0c02c26b994cf881af13f849428153ae4e42bc12ed6
Threat Level: Known bad
The file WinRAR.exe was found to be: Known bad.
Malicious Activity Summary
Limerat family
LimeRAT
Loads dropped DLL
Checks computer location settings
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Enumerates physical storage devices
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-17 11:44
Signatures
Limerat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-17 11:44
Reported
2024-05-17 11:46
Platform
win7-20240215-en
Max time kernel
132s
Max time network
142s
Command Line
Signatures
LimeRAT
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\WinRAR.exe
"C:\Users\Admin\AppData\Local\Temp\WinRAR.exe"
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\System\WinRAR.exe'"
C:\Users\Admin\AppData\Roaming\System\WinRAR.exe
"C:\Users\Admin\AppData\Roaming\System\WinRAR.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.19.24:443 | pastebin.com | tcp |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp |
Files
memory/2488-0-0x000000007496E000-0x000000007496F000-memory.dmp
memory/2488-1-0x0000000000C90000-0x0000000000C9C000-memory.dmp
\Users\Admin\AppData\Roaming\System\WinRAR.exe
| MD5 | 1bb96e140f557472fc121bd147c7fef2 |
| SHA1 | f1dca9840d4619ed536c733e618f301748041f82 |
| SHA256 | 47415dc54f54a881e0fdd0c02c26b994cf881af13f849428153ae4e42bc12ed6 |
| SHA512 | 8611b8a6a4eae862d412de1e13047b36cd9854bad75b1e8224a820f91630977908c9e560326da8a538dab097cf51b9407ed17a6050535df6ce98e8bd68b4a48d |
memory/2812-12-0x0000000000BC0000-0x0000000000BCC000-memory.dmp
memory/2488-13-0x0000000074960000-0x000000007504E000-memory.dmp
memory/2812-14-0x0000000074960000-0x000000007504E000-memory.dmp
memory/2812-15-0x0000000074960000-0x000000007504E000-memory.dmp
memory/2812-16-0x0000000074960000-0x000000007504E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-17 11:44
Reported
2024-05-17 11:46
Platform
win10v2004-20240426-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
LimeRAT
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4524 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 4524 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 4524 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 4524 wrote to memory of 4392 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe |
| PID 4524 wrote to memory of 4392 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe |
| PID 4524 wrote to memory of 4392 | N/A | C:\Users\Admin\AppData\Local\Temp\WinRAR.exe | C:\Users\Admin\AppData\Roaming\System\WinRAR.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\WinRAR.exe
"C:\Users\Admin\AppData\Local\Temp\WinRAR.exe"
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\System\WinRAR.exe'"
C:\Users\Admin\AppData\Roaming\System\WinRAR.exe
"C:\Users\Admin\AppData\Roaming\System\WinRAR.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.99:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.99:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.19.24:443 | pastebin.com | tcp |
| N/A | 192.168.254.187:53 | tcp | |
| US | 8.8.8.8:53 | 24.19.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp | |
| US | 8.8.8.8:53 | 18.24.18.2.in-addr.arpa | udp |
| N/A | 192.168.254.187:53 | tcp | |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| N/A | 192.168.254.187:53 | tcp | |
| N/A | 192.168.254.187:53 | tcp |
Files
memory/4524-0-0x000000007447E000-0x000000007447F000-memory.dmp
memory/4524-1-0x0000000000740000-0x000000000074C000-memory.dmp
memory/4524-2-0x00000000050F0000-0x000000000518C000-memory.dmp
memory/4524-3-0x0000000005190000-0x00000000051F6000-memory.dmp
memory/4524-4-0x0000000074470000-0x0000000074C20000-memory.dmp
memory/4524-5-0x0000000005E90000-0x0000000006434000-memory.dmp
C:\Users\Admin\AppData\Roaming\System\WinRAR.exe
| MD5 | 1bb96e140f557472fc121bd147c7fef2 |
| SHA1 | f1dca9840d4619ed536c733e618f301748041f82 |
| SHA256 | 47415dc54f54a881e0fdd0c02c26b994cf881af13f849428153ae4e42bc12ed6 |
| SHA512 | 8611b8a6a4eae862d412de1e13047b36cd9854bad75b1e8224a820f91630977908c9e560326da8a538dab097cf51b9407ed17a6050535df6ce98e8bd68b4a48d |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WinRAR.exe.log
| MD5 | 8a1197be130e48aa5aeeafd43eb6bb9f |
| SHA1 | cb790c7c216e41524348eaa0e5b74926e78dbfc6 |
| SHA256 | 547474087ec8f71dfd32b76f9b74c86f9844addf5082df37562a2c2c0cae4bfb |
| SHA512 | 4ad9d8dbbc253c8d7b1c2b4ec5f115c770f02bdbbc21ca0b422e251a3a98331e169c5062cabf7da81d5ae0d295b3778ef105ef82709df1a4ace71be288b8f166 |
memory/4392-17-0x0000000074470000-0x0000000074C20000-memory.dmp
memory/4524-16-0x0000000074470000-0x0000000074C20000-memory.dmp
memory/4392-18-0x0000000074470000-0x0000000074C20000-memory.dmp
memory/4392-19-0x0000000074470000-0x0000000074C20000-memory.dmp