Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 13:50

General

  • Target

    8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe

  • Size

    522KB

  • MD5

    8e4bee2b8683f28b25140d3cb1e81761

  • SHA1

    cc4de5579b8f6e96ed2feceacb4f05483533e003

  • SHA256

    bb93d16760825fb1ef7127af898b6b1e0be7e9829d0bffae4b7c0d2bdec58101

  • SHA512

    665a02d1ae0f3f85a968ad29fba913a4fe7f2a3e58c8b73713d8f9d6ea990219b1b16b5126e4ec1e2afe194e7c3c3f93a08579ea04857f32b6baedf8adf7b44c

  • SSDEEP

    12288:30/VlIyo8VLtGekSe0MylJCtcZkbAPEXe0FROFz9uTo6ubxsVsYRiSse8b5tDEV0:kIv+lJCtcZkbAPEXRGCuIsYYNHtD9t

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

359Z6KxMenwvgkA7vpGeBtinJPTj5raZz8

Attributes
  • aes_key

    arglobal

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/CV5RHE9G

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/CV5RHE9G

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-32-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-34-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-2-0x00000000004F0000-0x0000000000522000-memory.dmp

    Filesize

    200KB

  • memory/1636-0-0x000000007464E000-0x000000007464F000-memory.dmp

    Filesize

    4KB

  • memory/1636-5-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-28-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-14-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-30-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-56-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-54-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-52-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-50-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-48-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-46-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-44-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-42-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-58-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-40-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-38-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-36-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-3-0x0000000000730000-0x0000000000756000-memory.dmp

    Filesize

    152KB

  • memory/1636-1-0x00000000010A0000-0x000000000112A000-memory.dmp

    Filesize

    552KB

  • memory/1636-6-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-26-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-24-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-22-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-20-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-18-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-16-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-12-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-10-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-8-0x0000000000730000-0x000000000074F000-memory.dmp

    Filesize

    124KB

  • memory/1636-70-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1636-69-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-61-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2652-60-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2652-59-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2652-62-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2652-68-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2652-67-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2652-64-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB