Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
Resource
win10v2004-20241007-en
General
-
Target
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
-
Size
90.6MB
-
MD5
62ec18c629478fe2343b7e1b70973382
-
SHA1
cedbe523e4601988a2cc7b4886621d45110cb0b0
-
SHA256
ab265c4aff84d0424bbe317659eb945118c5d33ee8946a84767a1b4a15023fbd
-
SHA512
a72f30e6d81423783a41293c2a8fe6b1ae8a3abcb519e3d08c6a80e312b4a7bd3c30698e617858ec5fb82744a9618a317745a96790d8a048605a290b05b57c19
-
SSDEEP
1572864:d6TYEmzI1b4UVMtxrVsXgfJjNEONVy1TStLI2Swrp2es7DR/uyDmD272sygEE9JK:xEm8ZutxZsXuCONs1TStWwrlPAqgEEfM
Malware Config
Signatures
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Luminosity family
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\MSCONFIGS = "\"C:\\ProgramData\\760982\\SysMon.exe\" -a /a" cedbe523e4601988a2cc7b4886621d45110cb0b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSCONFIGS = "\"C:\\ProgramData\\760982\\SysMon.exe\" -a /a" cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4312 set thread context of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedbe523e4601988a2cc7b4886621d45110cb0b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe Token: SeDebugPrivilege 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5084 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1472 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 95 PID 4312 wrote to memory of 1472 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 95 PID 4312 wrote to memory of 1472 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 95 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96 PID 4312 wrote to memory of 5084 4312 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"2⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5084
-