Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 02:13

General

  • Target

    scan-image.scr

  • Size

    1.2MB

  • MD5

    82bd56d1562393f6fe6804679c757e39

  • SHA1

    9f419cea26e9cfce290527a4671b3fc3a49c446d

  • SHA256

    bdfb0d576f4f54f95a314462a84449b875e7130c89d44d37942c03b82f22d92f

  • SHA512

    91908924f04b153ebb992a1b2aa935edceb07f2318c2ccf8a526a74c75448346c17502ae23ef956d6c6fbd881934e53565e6606d0ed918f04f6045c7aacd2714

  • SSDEEP

    24576:pT3yU52y8rvkYzcUYGSvEoH/Ee/i/nNhzAv9nZ4pM:ZC20vkYzc00/Ee/i/DI9UM

Malware Config

Signatures

  • Luminosity 3 IoCs

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\scan-image.scr
    "C:\Users\Admin\AppData\Local\Temp\scan-image.scr" /S
    1⤵
    • Luminosity
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /tn "Client Monitor" /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /sc MINUTE /f /rl highest
      2⤵
      • Luminosity
      • System Location Discovery: System Language Discovery
      PID:2736
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:64
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1856
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {EA71A33D-F138-430C-B40E-678276DC2580} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\Client\client.exe
      "C:\Program Files (x86)\Client\client.exe" /startup
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn "Client Monitor" /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /sc MINUTE /f /rl highest
        3⤵
        • Luminosity
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2956
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:64
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    471B

    MD5

    609b46a76cd48bb821b1f4893f40f1bc

    SHA1

    0a182f9b53fad50958702442a19760f5982a5d82

    SHA256

    5cc0d2dabe6b8816250c659f061774c6316d4d5c8e3c0b664954161cecf91c9c

    SHA512

    675cd91026d4b29731ef7da7188b357fd36a512d824f70a7fdf289a2a24cd2eba0ee155337f7ede359fd07c25801b984210728a632a3e4ac65dc73064a28f3cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_108A7991F73F2B507007C35661993162

    Filesize

    471B

    MD5

    3f0c72d80da402da75333ce2eee6e822

    SHA1

    54974826b4c7c7ac213521f57c3e7d98e6de06df

    SHA256

    5fa4a6df15caeef2b33dc4a514ffbb5f719f32e6dd312b249c2d466b6b69295c

    SHA512

    457a18ed2484e392859eb3eea5ecfd35406407c826b3d6c75a4d6a511826f36c6096986b17be2aecc64f97c03d03abf8ccba5158185a429af4b7d763473b45ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    404B

    MD5

    8f1e90062822bc2d94d491f878f074b2

    SHA1

    2decbc6103a6757b26ff70e29a60fc504f841510

    SHA256

    cb04619288c181cd09b0db6ef12eb25909dabf063d8233088f1ac41b2a50cd87

    SHA512

    b87798f3da65aa54c1c9ed36dc7d1b978ddc07117a854e914c1ac75c19af5d36f56233707e18fb34d46fc11e8e15336ef956f85083ffc07e9f07d859ae002259

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_108A7991F73F2B507007C35661993162

    Filesize

    400B

    MD5

    d876d35611e27f11f7cb3f3ef5b965aa

    SHA1

    c0d4ab52a669c47510f5ed68156283d1b511ff5e

    SHA256

    dc57820e75ae01706d66f7635cdd102f5b829de2c6ae1364116f5bc03910ce54

    SHA512

    ac01d95dd108b36dd8174cfd8ca2f9abeb418b971084422aaac24eb89497ea6ccf3c525c6370d4a9f8048fd906c654461dba8ddf85efac4f8b1d8c6a2c261d9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e7fb79c27ff9029353ca717b3e6551b

    SHA1

    f770f4b2f719762326f19d414263b301d9f8e260

    SHA256

    39963b1cca59f304eddcd0f2caf8c9a267eae0476fe385295539fbc208b609f0

    SHA512

    a7ab5fc763247476509c4627dc4adc43bfa05791a04478d61c67589a4450a7b6eb88a281edeba47a37239d8e8f740013530613e4161f06359aa4adc55714714e

  • C:\Users\Admin\AppData\Local\Temp\CabD24F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD2FD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2156-53-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2156-61-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2156-65-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-64-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-63-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-42-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-43-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-60-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/2156-58-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/2156-51-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2156-57-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2156-52-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2156-55-0x0000000000A40000-0x0000000000A57000-memory.dmp

    Filesize

    92KB

  • memory/2556-0-0x0000000074261000-0x0000000074262000-memory.dmp

    Filesize

    4KB

  • memory/2556-36-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-1-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-2-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-35-0x0000000074260000-0x000000007480B000-memory.dmp

    Filesize

    5.7MB