Analysis
-
max time kernel
288s -
max time network
278s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01-11-2024 18:02
Behavioral task
behavioral1
Sample
xdwd.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
xdwd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xdwd.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
xdwd.exe
Resource
win11-20241007-en
General
-
Target
xdwd.exe
-
Size
25KB
-
MD5
aae04417cc07c39988d4fbe0e85fc9bd
-
SHA1
2d51b49f8f1faeba674dd0993911e8f65b4d2258
-
SHA256
f81bc717944ec8a599c8276d9d3b1de4b995d5570139590d263b39e47e87ba3d
-
SHA512
53cc6468da9be1f4a3cc3089b1ed6a7544eb5cc5f91ae8dc1390688ffe10ad9aff1df224a5cd936276440ee95cb4afcaec7cf4f63332297864179c3266560dfb
-
SSDEEP
384:EB+Sbj6NKIPw6LZhAHt2vTh34EnWb5j4kDhlzCTJEUmNYEYQro3lcOjsjr:CpI46Lnwt4aE+RHtN8oj
Malware Config
Extracted
limerat
-
aes_key
1337
-
antivm
false
-
c2_url
https://pastebin.com/raw/rACMKa5f
-
delay
3
-
download_payload
false
-
install
true
-
install_name
xdwd.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\xdwd\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/rACMKa5f
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Limerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Control Panel\International\Geo\Nation xdwd.exe -
Executes dropped EXE 1 IoCs
pid Process 992 xdwd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 pastebin.com 21 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe 992 xdwd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 992 xdwd.exe Token: SeDebugPrivilege 992 xdwd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4332 1920 xdwd.exe 88 PID 1920 wrote to memory of 4332 1920 xdwd.exe 88 PID 1920 wrote to memory of 4332 1920 xdwd.exe 88 PID 1920 wrote to memory of 992 1920 xdwd.exe 90 PID 1920 wrote to memory of 992 1920 xdwd.exe 90 PID 1920 wrote to memory of 992 1920 xdwd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\xdwd.exe"C:\Users\Admin\AppData\Local\Temp\xdwd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\xdwd\xdwd.exe'"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\xdwd\xdwd.exe"C:\Users\Admin\AppData\Roaming\xdwd\xdwd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
709B
MD52db0f6be9407032cd5037e8df1199f9f
SHA1953224694eca90c5e325f4dec9d7280df229c635
SHA2569631391854af05a31514d6d87f0ac19b9b4e966e9ba2a17d23ebea3f0f9dfb43
SHA512958327e527f6e75fb25782ae769ec0862131eef7fcc83ed00be215db0a3442f3620bf8f8067132375cdd632d1ce44e3999604ca554cfb7025129150c1ce73403
-
Filesize
25KB
MD5aae04417cc07c39988d4fbe0e85fc9bd
SHA12d51b49f8f1faeba674dd0993911e8f65b4d2258
SHA256f81bc717944ec8a599c8276d9d3b1de4b995d5570139590d263b39e47e87ba3d
SHA51253cc6468da9be1f4a3cc3089b1ed6a7544eb5cc5f91ae8dc1390688ffe10ad9aff1df224a5cd936276440ee95cb4afcaec7cf4f63332297864179c3266560dfb