Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 01:37
Behavioral task
behavioral1
Sample
BLTools 2.5 by Lukyy.exe
Resource
win7-20241010-en
General
-
Target
BLTools 2.5 by Lukyy.exe
-
Size
95KB
-
MD5
e6df3f5026e18a97eb35edf5c0e495c9
-
SHA1
ca6735634fb04ee28e71cab27fb1fe1de150315e
-
SHA256
538edc7ac07999b9551153f7db6a90b7a4ba95cd0307d1e617a3ecde2d486d73
-
SHA512
1eb49e6b47688c5352936926ec1e07afbc6012613067da183425976b6114bb28178008a9f88b337d3c53948a41d69fd63935a4dcc0dd01399205428d6e13107e
-
SSDEEP
768:6pRS6bcwLoR9hy245NLxW+FjJ0eSvH9ZcTyrzgEhR2nsCt7CNFd7mic2knK+:6p5cwL4IXfxb1nC9ZcKOsCtKjb+
Malware Config
Extracted
limerat
bc1q0gmdxcfwzc5wnfpk36nmvuyqnuhz775nzlassz
-
aes_key
hakai
-
antivm
true
-
c2_url
https://pastebin.com/raw/CpekHPPQ
-
delay
5
-
download_payload
false
-
install
true
-
install_name
Microsoft.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\Microsoft\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/CpekHPPQ
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Limerat family
-
Executes dropped EXE 1 IoCs
pid Process 2928 Microsoft.exe -
Loads dropped DLL 2 IoCs
pid Process 1492 BLTools 2.5 by Lukyy.exe 1492 BLTools 2.5 by Lukyy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLTools 2.5 by Lukyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2928 Microsoft.exe 2928 Microsoft.exe 2928 Microsoft.exe 2928 Microsoft.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2928 Microsoft.exe Token: SeDebugPrivilege 2928 Microsoft.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2884 1492 BLTools 2.5 by Lukyy.exe 30 PID 1492 wrote to memory of 2884 1492 BLTools 2.5 by Lukyy.exe 30 PID 1492 wrote to memory of 2884 1492 BLTools 2.5 by Lukyy.exe 30 PID 1492 wrote to memory of 2884 1492 BLTools 2.5 by Lukyy.exe 30 PID 1492 wrote to memory of 2928 1492 BLTools 2.5 by Lukyy.exe 32 PID 1492 wrote to memory of 2928 1492 BLTools 2.5 by Lukyy.exe 32 PID 1492 wrote to memory of 2928 1492 BLTools 2.5 by Lukyy.exe 32 PID 1492 wrote to memory of 2928 1492 BLTools 2.5 by Lukyy.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLTools 2.5 by Lukyy.exe"C:\Users\Admin\AppData\Local\Temp\BLTools 2.5 by Lukyy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Microsoft\Microsoft.exe'"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Microsoft.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Microsoft.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5e6df3f5026e18a97eb35edf5c0e495c9
SHA1ca6735634fb04ee28e71cab27fb1fe1de150315e
SHA256538edc7ac07999b9551153f7db6a90b7a4ba95cd0307d1e617a3ecde2d486d73
SHA5121eb49e6b47688c5352936926ec1e07afbc6012613067da183425976b6114bb28178008a9f88b337d3c53948a41d69fd63935a4dcc0dd01399205428d6e13107e