Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe
Resource
win10v2004-20240508-en
General
-
Target
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe
-
Size
2.3MB
-
MD5
638359da4da37381f43128fc8eb6a546
-
SHA1
92fda308a7c80df157284bc5d6c5474593419285
-
SHA256
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a
-
SHA512
b93adaf03054a45e1a00eab977fcd8fb3e0ffc72858cbfac5c31fea2186e962792c96a252728b5d6f0a7191e12ec7493f6647d79e41ae079c19d1f74e4a2a018
-
SSDEEP
49152:S+dCc5rV1M9P8/ra72Nh43cv5LeTt9JX8s/L8jJvLsnYZd6kd9AFqAqr+:S+dCc5k9PArS2/xLeTZdT8jJLsYrbAmK
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
LMI_Rescue_srv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*LogMeInRescue_2163103269 = "\"C:\\Users\\Admin\\AppData\\Local\\LogMeIn Rescue Applet\\LMIR141F4001.tmp\\LMI_Rescue.exe\" -runonce -reboot" LMI_Rescue_srv.exe -
Processes:
LMI_Rescue_srv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LMI_Rescue_srv.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
LMI_Rescue_srv.exedescription ioc process File opened for modification \??\PhysicalDrive0 LMI_Rescue_srv.exe -
Executes dropped EXE 2 IoCs
Processes:
LMI_Rescue.exeLMI_Rescue_srv.exepid process 2808 LMI_Rescue.exe 2556 LMI_Rescue_srv.exe -
Loads dropped DLL 5 IoCs
Processes:
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exeLMI_Rescue.exepid process 2524 6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe 2808 LMI_Rescue.exe 2808 LMI_Rescue.exe 2808 LMI_Rescue.exe 2808 LMI_Rescue.exe -
Modifies registry class 3 IoCs
Processes:
LMI_Rescue.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Applications\LMI_Rescue.exe LMI_Rescue.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Applications LMI_Rescue.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Applications\LMI_Rescue.exe\IsHostApp LMI_Rescue.exe -
Processes:
LMI_Rescue_srv.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 LMI_Rescue_srv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 LMI_Rescue_srv.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LMI_Rescue.exeLMI_Rescue_srv.exepid process 2808 LMI_Rescue.exe 2556 LMI_Rescue_srv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
LMI_Rescue.exeLMI_Rescue_srv.exedescription pid process Token: SeCreateGlobalPrivilege 2808 LMI_Rescue.exe Token: SeCreateGlobalPrivilege 2556 LMI_Rescue_srv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LMI_Rescue.exepid process 2808 LMI_Rescue.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exeLMI_Rescue.exedescription pid process target process PID 2524 wrote to memory of 2808 2524 6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe LMI_Rescue.exe PID 2524 wrote to memory of 2808 2524 6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe LMI_Rescue.exe PID 2524 wrote to memory of 2808 2524 6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe LMI_Rescue.exe PID 2524 wrote to memory of 2808 2524 6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe LMI_Rescue.exe PID 2808 wrote to memory of 2556 2808 LMI_Rescue.exe LMI_Rescue_srv.exe PID 2808 wrote to memory of 2556 2808 LMI_Rescue.exe LMI_Rescue_srv.exe PID 2808 wrote to memory of 2556 2808 LMI_Rescue.exe LMI_Rescue_srv.exe PID 2808 wrote to memory of 2556 2808 LMI_Rescue.exe LMI_Rescue_srv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe"C:\Users\Admin\AppData\Local\Temp\6ceb08f468e49519f33eddbb38d27d0667757a5ac3db193a073eef7eccaf124a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR141F4001.tmp\LMI_Rescue.exe"C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR141F4001.tmp\LMI_Rescue.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR141F4001.tmp\LMI_Rescue_srv.exe"C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR141F4001.tmp\LMI_Rescue_srv.exe" -wd "C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR141F4001.tmp"3⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD50c01b24c35c521da884380301ec35f3b
SHA10731d61b1a577bb4b57f3581c3e3bf6465d3fdae
SHA2567a30d11ee5e4f87a3275665a76a709c64897c0bf6adf4291e4d94d3f7d8c76b0
SHA512cc21d3e6958bf606d3bec0021f2b5b7744b52dd1a20b0bc25b3c958a22eecc437cdff05b07969672259a3a110f596f184c8dac612a07a7a6da94e2e7a4fe76d1
-
Filesize
143KB
MD59a57c0a8327a8579f5b5220a6930ed0b
SHA167e4fcf5f6567e738fdb140a1d9b57770cc2c966
SHA25670367e20accb1f562e09197165b96a8bff8f5272e9d57f1657befe04af8b5374
SHA512de706534a59dfaa4a11c2512fba0159b1591a07a50157b7c294527fbb92342db400404a9da3be8e4baba8ba72ac135bcb9522a2960f9202d04207e663d9dcc8e
-
Filesize
240B
MD59340f5224aabf8eb55c9f86169fadbf2
SHA1c5fbeeb76d1880f7e8a6a2defdb9cfc67b0fdea7
SHA256122ee685fe5ef9cabe969fcc04a80a8d23384ddb4ff2a2a29a88a34ff05209f5
SHA512d6fd9e3993a663f4cfafb93962b381cebf12fd7b60a0a7fa79f03003706ccade3f687314e2510d9dc8886483258ce325d0684d7d0b1df6b473005b685027a51a
-
Filesize
112B
MD5c77a911b451e3fe8427cd78c938d2590
SHA18789cdf29b875a7de1a1d92168d97de5870b01d8
SHA2569d33004c6f27beb45736883cb57694aa52fdd863d75c36385576d6537509e713
SHA5123e61f4659dd962dd6260308d45ce1315b47b2907ebd8d7a42654603e53f8fd74906d9fd596d26733a1a6923b59b43ba56181407851e663426e30a94d09a84c0a
-
Filesize
3KB
MD5cdb31baaaccacc9273484427f39aa5cb
SHA1d6694cc7ace0bded5cd9129bdeb324c032a8d2d5
SHA256003aa4deb3d5184fb7b618df99b680611cbcfa3d764d5a2a210ff4cae5ec96b8
SHA512f2e10765b468b507a0476244d16797c5b0f5820fb45b8643fa3b37d78c741d724f35e29bb4ad2f99a9529fcd6eb12eefcfb7c28a9c16479bc002b1e4b41c39cb
-
Filesize
135KB
MD5408d59333a48d8f919bfc7bd8e4554a5
SHA1fde5a907dc0dc85a673b557b7382fc0bf26d0828
SHA256b2e9a0df37f5cfeae4924481e1353ed1bff516c5ec3bccffdca680ce33df6d19
SHA51239908d68842c4e4dca6b7cb00158c01e7328db56ec241892ba19e891db80b7a5952cea2306032cb550253d9b6d20a4ba1dec719cc16439d8655141b744117430
-
Filesize
482B
MD56542e6054b1e41b488b0e10e75dd2808
SHA1dc1ef87c42cb776ac0d88c2251165ce184c11387
SHA256b61dac4d5dd86f1cf0bee351efc921516a391076fff15018493647b2013e2905
SHA512af07f28b72fb94bbc3f34d220a94aea919591c0bdcee07b918bacc5cacb2ceb5b95074d55ddc0b89b36be004ddc89f512d9b9e2ef21328a3cc418200c9bd76bb
-
Filesize
211KB
MD5a3b979f731a4d1ff8d70b1a91941565a
SHA1d2570702a5dbe0f89ec837af10debafe55003f0d
SHA2565c26ef1fafda49d86613f7bb6c8976765c0762a762459b09f7717fdb911285e6
SHA512c37bc71c8900c83e6cbbc4f8f1e5a7f2668e41d120f44ac7f44f0553951e19a06956fc79a67c86a3b6471c5192c13e2c12311d83fdafaaf368413d78f5f318b9
-
Filesize
26KB
MD58ad28e79941ce3e002804dfe1722ea87
SHA1f0a6461b893023261056dcb0dcfab0c21615a24f
SHA25663424e176b75642ebac9e5452eccc8c6956266dacc0ae4388d636d5bee5e7933
SHA512de984c78aac30388c6a3ceb89435f4f9bbc51100a25675f9c01437dca320ca7db17bb166184435954374dff0c8e7506775a8bca786eb1a70ae6abea2456b3d70
-
Filesize
248B
MD561eb5689c5ae72ff753e7a41967439be
SHA104f210142ee813a15afb110008a0c637b64cb106
SHA25605344395b62429b0c12466494eceb5883356fd980a7d156b8426ce850678c6bc
SHA51267bb95fa9fb198fb1eee3e65a0351e67ba16fc008bb15762513485b7c4e39b57434eaa8df5f89f3acdb033936c6312ce627e891d7dc52c129e30732981071f97
-
Filesize
9KB
MD514d51d2a36ef8354b980468e0316bf91
SHA1e3fd4c98403993795b46ecff0dc09e5ff594f37f
SHA256530482a498f5bf143c89a2133ac23f768c7d5bb8bdbadfaaf413ed0ac040b412
SHA512140813b9debb62b264b3976f7dc8b5a755c3df57295b9bd9a2d5f658b356db636819f3d5a46739b1297c9c10968c5333d089d0b2a23811a597f7730dddcb43c5
-
Filesize
10KB
MD51930490bbc95c98a65dea0c61716c9da
SHA1796cfcf2b557a72623169451a273ed5f1f0c1bbc
SHA256b460ffb4e01f55c3d24a0259ad9d21368383088b29538c5ddb83b7b611e112a6
SHA5129b9ef3d4455aa3dcbb2b3a29c42aaf4748bc9cb020d75da639f552e59b854e65727e7a4a94826951eec0e8efccd722d456972e91d02ee710af0f1d7237c6019c
-
Filesize
10KB
MD5edabceb7b48f313ff2377f3788ed7bfb
SHA14670a65e4052b2ad5bb0964749ca1a1bee323f11
SHA25680bb6090b88722b7956d034e264f61ce6955c055b977c548a025623181154c96
SHA512252b8db6e19d8007cb9900ec541819daf5ca8bc245415d7c2ddcc707e890ecb876067ac89af4e2ecd2369875d1a382a67ea33ab9c082e576f864a276fda6b369
-
Filesize
2KB
MD5906ff9c752d024932aeca1cc8491d53e
SHA15da64529ab6fb1a622520ac1993e356f02aaa073
SHA256620dd1bcca8a8067322c2cf306e1b90fc741ee63318760a8c3e929f135d0e29c
SHA512e93e0012016bca9a726f31e864362afb7fb6d3d1da5048f6c72781a10aa9d65a7adbc040e2d0b74f18bdc577e9bad22c41df6ec892aa8dc73da0dba8cf5e0be0
-
Filesize
6KB
MD5d2754a6c0a062ff76cd3778dc3a573bf
SHA10e9a259c775a58f5fca480932d1e86c08599fe29
SHA25694c271a6d1279ee94c2911822b27581a6e5fa8f488e1b60ed5690f63a45eb8cf
SHA5122d2c201e49ac38eb54545e3ddd20e94a59b429bcacb5fe3cf573d97a3f148477814b5a5da1c4b25b542ff74909da6c212fbe90ad012fb5386b2c3421ccd9c34a
-
Filesize
6KB
MD5f04becd6cb3d8e08712bb35c53287a68
SHA19be722073f8b0a9413d5b0ae8a0f292c232d0da2
SHA256cdbcb1842278f41324ac5979acf9c5c743a96b62e54c378fd9a44e7bdad36827
SHA51261e9d35a429cf4f146d54715bb3952a1ea77b3b998ad40700656f7542074b542aba0d52c4cdbb7458237a7939317d70d4ecfc11a7589dd06e70dd093c974d3fe
-
Filesize
7KB
MD536c61bf304bb38088afdfd0d4e25f906
SHA12f90125461479c5e6e632748d849603a085d4ad2
SHA2569eafde81f14262a60f11b7053573710c9b7c493adc473514991be1e8838038f7
SHA51212c82f56c31752c42c85c36bfe6710d91710aba5286a7de503c3cd3c0c667d6967688e816c78ac6d2f1a2c6a906f9e21a3a2a61f2a9834d93fec79f5507b1bbf
-
Filesize
7KB
MD5c03dc3d06ac9b94c261731044a843e02
SHA1d1be60bc88a408e9327d1c517e0473f287a0560b
SHA2567f6183ed16f5d8b6ac219c4643f9a5ba1b2ea2c4ad6e9205bfe8e2a00299918c
SHA51213210062b1a24447511bda6b585f4d5f7bf80b9fa5bdefa5028b2c377c2a05eea03ddb0f769417f8c35e523b671f1ef4be69194e8c1cd465e0325527cb9656a8
-
Filesize
8KB
MD54928965970d867a668f91f9e91e72947
SHA1f6accb22c2a2b71d272c5e0ebfffbfaeb92f8cdf
SHA256dc60eb406183b9559fb669f065c46aacfd027aae67dca4d4747b86f05b009672
SHA5125cae452a2ef480d133a0c60803f6380b59ef7f6855017fd753d63301672bbe54e62d355e6a57c070fff017df5226b67d2bdef26d330bb0d8210639fac123261e
-
Filesize
350B
MD55a9ce33b418a8b0e1d488976f2792227
SHA185a3aa03f14f05241ef78691064ee9bb7d764afb
SHA2564fab63d286a00b405fe7f6ff1b146cffac6337393665683615e55072eb51b336
SHA5126a9a01b1377107409a25fce282a7249f82e7e9cfe62892bfcce4d344cffb300912af355e4cbc4cf64744367eeba806bdf1dff66915cba0962987d893df4170bb
-
Filesize
352B
MD5a891b0b38bce9d7bccb7e239a83a3830
SHA1833108a25b6b9624295094b9c7529b12b1ec1c6e
SHA256550504e461f6a334f8434b43a3e5f6a4e2977fdb521dd6d006997da1bbaf7026
SHA5129d60afb2880721e24660fa49459b715a8e48e9b314c2eb7bbb986a9acf1467df8633e371ed4d57da17ddb065a692c3d6c4a2ec9b42f35c74628442966a643fc6
-
Filesize
3.1MB
MD5d0b66f3d3366e252401f9632119daf6d
SHA1aa8e04ffdf8c944c44270c9c41a56227e08cbf5a
SHA2566c5bb386757d25c8a48b2206c0c49175fa739f581f048816b638faae16d91a74
SHA512b083d0b5c2c33525c51deb38d9a8d81452b2df1c61097b27ef24c71e54782d376b101077fba4d7a5fa74bd47c96165e4d91d154aa111b505eda5ba281ef9e8ca