Analysis
-
max time kernel
39s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 23:22
Behavioral task
behavioral1
Sample
MailUpdate.exe
Resource
win10v2004-20240802-en
General
-
Target
MailUpdate.exe
-
Size
69KB
-
MD5
37d1bc1bd7eeb6b549d265db4a56da20
-
SHA1
a93c42ade354b2a706450715deacdec728e898a9
-
SHA256
ae305f441faf08f439a302b56ca00e7426160af15ca532dd1936e38f803fa286
-
SHA512
21431f94b29cc7786c77da61d1f1e9ab51f1676ab383d679a52ff10db3ca27a3fe1c73ccf879de1c28d9e8a120578bba98af840cb3b32bffd2d325001188212f
-
SSDEEP
1536:OpgFwa5ttd8yfeUzIasLQxFm5gUWd+0LDyjofAWZgzR:8Iwa7bZfRaQzm9FIDyjoY5V
Malware Config
Extracted
limerat
bc1qyej3qhu680rqc5akxac39r92g6a8g6r4708gyj
-
aes_key
Test
-
antivm
true
-
c2_url
https://pastebin.com/raw/UPe1Arqg
-
delay
3
-
download_payload
false
-
install
true
-
install_name
system32s.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/UPe1Arqg
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MailUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation MailUpdate.exe -
Executes dropped EXE 1 IoCs
Processes:
system32s.exepid process 1116 system32s.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exesystem32s.exeMailUpdate.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
system32s.exedescription pid process Token: SeDebugPrivilege 1116 system32s.exe Token: SeDebugPrivilege 1116 system32s.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
MailUpdate.exedescription pid process target process PID 1020 wrote to memory of 4112 1020 MailUpdate.exe schtasks.exe PID 1020 wrote to memory of 4112 1020 MailUpdate.exe schtasks.exe PID 1020 wrote to memory of 4112 1020 MailUpdate.exe schtasks.exe PID 1020 wrote to memory of 1116 1020 MailUpdate.exe system32s.exe PID 1020 wrote to memory of 1116 1020 MailUpdate.exe system32s.exe PID 1020 wrote to memory of 1116 1020 MailUpdate.exe system32s.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MailUpdate.exe"C:\Users\Admin\AppData\Local\Temp\MailUpdate.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\system32s.exe'"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4112
-
-
C:\Users\Admin\AppData\Roaming\system32s.exe"C:\Users\Admin\AppData\Roaming\system32s.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:81⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD537d1bc1bd7eeb6b549d265db4a56da20
SHA1a93c42ade354b2a706450715deacdec728e898a9
SHA256ae305f441faf08f439a302b56ca00e7426160af15ca532dd1936e38f803fa286
SHA51221431f94b29cc7786c77da61d1f1e9ab51f1676ab383d679a52ff10db3ca27a3fe1c73ccf879de1c28d9e8a120578bba98af840cb3b32bffd2d325001188212f