Analysis
-
max time kernel
164s -
max time network
165s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-08-2024 03:40
General
-
Target
New-Client.exe
-
Size
28KB
-
MD5
c322b88311ba91359d759090203972de
-
SHA1
090597f413486ac26c76e804d4ad1fd75ab75cfc
-
SHA256
94ac06213f18172bfc549d04695c55937b8c25c8a578458841bf45fcc0bfed38
-
SHA512
839b677c15a87237f6eeb6fb9c2c6a400c569761b4d67d5291472b12bb6110c740c139c048f456b96421c6d56cac1f70fb24abecd80b8f3d02b08609fc88504b
-
SSDEEP
384:7B+Sbj6NKYPpC6BZAH9i05qDOhY1xlvvDKNrCeJE3WNg5ze5V+qgcvuHQro3lcrH:lpYPo6BZw9ThYzlH45NPD06j
Malware Config
Extracted
limerat
-
aes_key
1
-
antivm
false
-
c2_url
https://pastebin.com/raw/NfVNxzHF
-
delay
3
-
download_payload
false
-
install
true
-
install_name
WinSession.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\SystemWinSession\
-
usb_spread
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4368 WinSession.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New-Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinSession.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe 4368 WinSession.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4368 WinSession.exe Token: SeDebugPrivilege 4368 WinSession.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1268 wrote to memory of 5012 1268 New-Client.exe 84 PID 1268 wrote to memory of 5012 1268 New-Client.exe 84 PID 1268 wrote to memory of 5012 1268 New-Client.exe 84 PID 1268 wrote to memory of 4368 1268 New-Client.exe 86 PID 1268 wrote to memory of 4368 1268 New-Client.exe 86 PID 1268 wrote to memory of 4368 1268 New-Client.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\New-Client.exe"C:\Users\Admin\AppData\Local\Temp\New-Client.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\SystemWinSession\WinSession.exe'"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
C:\Users\Admin\AppData\Roaming\SystemWinSession\WinSession.exe"C:\Users\Admin\AppData\Roaming\SystemWinSession\WinSession.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c322b88311ba91359d759090203972de
SHA1090597f413486ac26c76e804d4ad1fd75ab75cfc
SHA25694ac06213f18172bfc549d04695c55937b8c25c8a578458841bf45fcc0bfed38
SHA512839b677c15a87237f6eeb6fb9c2c6a400c569761b4d67d5291472b12bb6110c740c139c048f456b96421c6d56cac1f70fb24abecd80b8f3d02b08609fc88504b