Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 13:50

General

  • Target

    8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe

  • Size

    522KB

  • MD5

    8e4bee2b8683f28b25140d3cb1e81761

  • SHA1

    cc4de5579b8f6e96ed2feceacb4f05483533e003

  • SHA256

    bb93d16760825fb1ef7127af898b6b1e0be7e9829d0bffae4b7c0d2bdec58101

  • SHA512

    665a02d1ae0f3f85a968ad29fba913a4fe7f2a3e58c8b73713d8f9d6ea990219b1b16b5126e4ec1e2afe194e7c3c3f93a08579ea04857f32b6baedf8adf7b44c

  • SSDEEP

    12288:30/VlIyo8VLtGekSe0MylJCtcZkbAPEXe0FROFz9uTo6ubxsVsYRiSse8b5tDEV0:kIv+lJCtcZkbAPEXRGCuIsYYNHtD9t

Score
10/10

Malware Config

Extracted

Family

limerat

Wallets

359Z6KxMenwvgkA7vpGeBtinJPTj5raZz8

Attributes
  • aes_key

    arglobal

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/CV5RHE9G

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/CV5RHE9G

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8e4bee2b8683f28b25140d3cb1e81761_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-60-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2392-70-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2392-69-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2392-67-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/2392-66-0x0000000005B10000-0x00000000060B4000-memory.dmp

    Filesize

    5.6MB

  • memory/2392-65-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2392-64-0x0000000004DE0000-0x0000000004E46000-memory.dmp

    Filesize

    408KB

  • memory/2392-63-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2944-27-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-16-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-52-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-59-0x00000000059E0000-0x0000000005A7C000-memory.dmp

    Filesize

    624KB

  • memory/2944-48-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-46-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-44-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-42-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-40-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-38-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-32-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-29-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-0-0x0000000074DBE000-0x0000000074DBF000-memory.dmp

    Filesize

    4KB

  • memory/2944-24-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-22-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-20-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-18-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-62-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2944-14-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-12-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-10-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-8-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-58-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-56-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-50-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-31-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-6-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-5-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-54-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-34-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-36-0x00000000058C0000-0x00000000058DF000-memory.dmp

    Filesize

    124KB

  • memory/2944-3-0x00000000058C0000-0x00000000058E6000-memory.dmp

    Filesize

    152KB

  • memory/2944-68-0x0000000074DB0000-0x0000000075560000-memory.dmp

    Filesize

    7.7MB

  • memory/2944-2-0x0000000005890000-0x00000000058C2000-memory.dmp

    Filesize

    200KB

  • memory/2944-1-0x0000000000F50000-0x0000000000FDA000-memory.dmp

    Filesize

    552KB