Malware Analysis Report

2024-09-11 10:21

Sample ID 240618-hmmp5s1grc
Target bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118
SHA256 fc790cea14d04d9090ab085b585a8017ad469ebbce5c9d29c8d877ccf9e3efbf
Tags
limerat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fc790cea14d04d9090ab085b585a8017ad469ebbce5c9d29c8d877ccf9e3efbf

Threat Level: Known bad

The file bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

limerat rat

Limerat family

LimeRAT

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Maps connected drives based on registry

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

NSIS installer

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 06:51

Signatures

Limerat family

limerat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win7-20240611-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe"

Signatures

LimeRAT

rat limerat

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2024 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 2024 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 2024 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 2024 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 2024 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 2024 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 2024 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 2024 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 2896 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2896 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2896 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2896 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2896 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe
PID 2896 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe
PID 2896 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe
PID 2896 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe'"

C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

"C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pastebin.com udp
US 172.67.19.24:443 pastebin.com tcp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp

Files

\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

MD5 7374806e51b404de9c639cbff4226eed
SHA1 6c7466e48018fa00ccf53a24615448117697f494
SHA256 5963297e6660586d55779912944414ca8e5ccdf2769419b779e145d5fc597c9f
SHA512 5c29c8c16be3a46cf64997fda0810953fa16c3f53fd8f7979e80a97849e23e36baca1cf84cf84a1404b55cbde8543c3d740c9397da576738a14c64a9962f00f7

\Users\Admin\AppData\Local\Temp\Cure Tool.exe

MD5 7658c455f3acdc2b574da9f863855f01
SHA1 c05e0e3ccfb01bec9e6e4f8592fc21fe8a991b32
SHA256 8d0ab3ac5f70ab0d16c1c3f1f66e4580e4116175d30bece8b14514858c9174dc
SHA512 7325535c7228542cecf43c2042dd07caee54d8f61a49ea5750508f7ed27ad0f5b24c62a023c0c8f675bb8c077720d60565338ce10754ae098ec7d47bf3f83730

memory/2896-17-0x00000000741AE000-0x00000000741AF000-memory.dmp

memory/2896-18-0x0000000000F90000-0x0000000000F9C000-memory.dmp

memory/3008-19-0x0000000000300000-0x0000000000308000-memory.dmp

memory/3008-20-0x00000000741A0000-0x000000007488E000-memory.dmp

memory/2896-32-0x00000000741A0000-0x000000007488E000-memory.dmp

memory/2492-33-0x0000000000FD0000-0x0000000000FDC000-memory.dmp

memory/2896-34-0x00000000741A0000-0x000000007488E000-memory.dmp

memory/3008-35-0x00000000741A0000-0x000000007488E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win10v2004-20240611-en

Max time kernel

144s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe"

Signatures

LimeRAT

rat limerat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3968 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 3968 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 3968 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe
PID 3968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 3968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 3968 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe
PID 2692 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2692 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2692 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Windows\SysWOW64\schtasks.exe
PID 2692 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe
PID 2692 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe
PID 2692 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\bb2de5629dfeb812b45fb00a6fbadf4e_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe'"

C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

"C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe"

Network

Country Destination Domain Proto
BE 88.221.83.208:443 www.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 208.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.4.235:443 pastebin.com tcp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 235.4.20.104.in-addr.arpa udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 52.182.143.211:443 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 24.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
PL 93.184.221.240:80 tcp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp

Files

C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

MD5 7374806e51b404de9c639cbff4226eed
SHA1 6c7466e48018fa00ccf53a24615448117697f494
SHA256 5963297e6660586d55779912944414ca8e5ccdf2769419b779e145d5fc597c9f
SHA512 5c29c8c16be3a46cf64997fda0810953fa16c3f53fd8f7979e80a97849e23e36baca1cf84cf84a1404b55cbde8543c3d740c9397da576738a14c64a9962f00f7

C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe

MD5 7658c455f3acdc2b574da9f863855f01
SHA1 c05e0e3ccfb01bec9e6e4f8592fc21fe8a991b32
SHA256 8d0ab3ac5f70ab0d16c1c3f1f66e4580e4116175d30bece8b14514858c9174dc
SHA512 7325535c7228542cecf43c2042dd07caee54d8f61a49ea5750508f7ed27ad0f5b24c62a023c0c8f675bb8c077720d60565338ce10754ae098ec7d47bf3f83730

memory/2692-18-0x000000007334E000-0x000000007334F000-memory.dmp

memory/2760-20-0x0000000000580000-0x0000000000588000-memory.dmp

memory/2692-21-0x0000000000260000-0x000000000026C000-memory.dmp

memory/2692-22-0x0000000004B70000-0x0000000004C0C000-memory.dmp

memory/2760-23-0x0000000073340000-0x0000000073AF0000-memory.dmp

memory/2692-24-0x0000000004AF0000-0x0000000004B56000-memory.dmp

memory/2692-25-0x0000000073340000-0x0000000073AF0000-memory.dmp

memory/2692-26-0x0000000005780000-0x0000000005D24000-memory.dmp

memory/2692-37-0x0000000073340000-0x0000000073AF0000-memory.dmp

memory/2676-38-0x0000000006200000-0x0000000006292000-memory.dmp

memory/2760-39-0x0000000073340000-0x0000000073AF0000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win7-20240221-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

Network

N/A

Files

memory/1728-0-0x00000000744FE000-0x00000000744FF000-memory.dmp

memory/1728-1-0x00000000000C0000-0x00000000000C8000-memory.dmp

memory/1728-2-0x00000000744FE000-0x00000000744FF000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win10v2004-20240611-en

Max time kernel

91s

Max time network

93s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe

"C:\Users\Admin\AppData\Local\Temp\Cure Tool.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 88.221.83.224:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 224.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 152.107.17.2.in-addr.arpa udp

Files

memory/1000-0-0x000000007534E000-0x000000007534F000-memory.dmp

memory/1000-1-0x0000000000A30000-0x0000000000A38000-memory.dmp

memory/1000-2-0x000000007534E000-0x000000007534F000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win7-20240508-en

Max time kernel

144s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

Signatures

LimeRAT

rat limerat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe'"

C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

"C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pastebin.com udp
US 104.20.3.235:443 pastebin.com tcp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp
US 8.8.8.8:53 uipapai.duckdns.org udp

Files

memory/2420-0-0x00000000742EE000-0x00000000742EF000-memory.dmp

memory/2420-1-0x00000000002F0000-0x00000000002FC000-memory.dmp

\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

MD5 7374806e51b404de9c639cbff4226eed
SHA1 6c7466e48018fa00ccf53a24615448117697f494
SHA256 5963297e6660586d55779912944414ca8e5ccdf2769419b779e145d5fc597c9f
SHA512 5c29c8c16be3a46cf64997fda0810953fa16c3f53fd8f7979e80a97849e23e36baca1cf84cf84a1404b55cbde8543c3d740c9397da576738a14c64a9962f00f7

memory/2900-13-0x00000000011E0000-0x00000000011EC000-memory.dmp

memory/2420-14-0x00000000742E0000-0x00000000749CE000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-18 06:51

Reported

2024-06-18 06:53

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

Signatures

LimeRAT

rat limerat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe

"C:\Users\Admin\AppData\Local\Temp\tvsxwrc.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe'"

C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

"C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 pastebin.com udp

Files

memory/3700-0-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

memory/3700-1-0x0000000000600000-0x000000000060C000-memory.dmp

memory/3700-2-0x0000000004FA0000-0x000000000503C000-memory.dmp

memory/3700-3-0x0000000005040000-0x00000000050A6000-memory.dmp

memory/3700-4-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/3700-5-0x0000000005DD0000-0x0000000006374000-memory.dmp

C:\Users\Admin\AppData\Roaming\TeamViewer\twvrsvc.exe

MD5 7374806e51b404de9c639cbff4226eed
SHA1 6c7466e48018fa00ccf53a24615448117697f494
SHA256 5963297e6660586d55779912944414ca8e5ccdf2769419b779e145d5fc597c9f
SHA512 5c29c8c16be3a46cf64997fda0810953fa16c3f53fd8f7979e80a97849e23e36baca1cf84cf84a1404b55cbde8543c3d740c9397da576738a14c64a9962f00f7

memory/4308-16-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/3700-17-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4308-18-0x0000000074BC0000-0x0000000075370000-memory.dmp

memory/4308-19-0x0000000005C10000-0x0000000005CA2000-memory.dmp

memory/4308-20-0x0000000074BC0000-0x0000000075370000-memory.dmp