Analysis

  • max time kernel
    119s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 12:39

General

  • Target

    9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fdN.exe

  • Size

    846KB

  • MD5

    e3ca517e9b655d1072d7ddd0a08b71b0

  • SHA1

    3bc6c35adf3d135ca63b7b31d9bb309bf0189f9e

  • SHA256

    9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fd

  • SHA512

    ce0b982d7c6643da46d85d15ff45df7a32b9b6c64fc5612e9d2f9664421c8390ab4d42bd33f25f98735ca3539c20931c80d3f28c9e3ee76557a2e42e35806107

  • SSDEEP

    24576:jivDwwT8n0TawwU2hUsUyY8UgNkHN53e/J1XIqfPHhh5/cn5qVppW5NR/ctc0z1p:jivDwwT8n0TawwU2hUsUyY8UgNkHN53q

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Luminosity family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fdN.exe
    "C:\Users\Admin\AppData\Local\Temp\9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fdN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Local\Temp\9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fdN.exe
      "C:\Users\Admin\AppData\Local\Temp\9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fdN.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\ProgramData\447873\WinCOMHost.exe
        "C:\ProgramData\447873\WinCOMHost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\ProgramData\447873\WinCOMHost.exe
          "C:\ProgramData\447873\WinCOMHost.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    70KB

    MD5

    95a27f88a987e10ceb1dec133e37c1a4

    SHA1

    f157a537954fcaba1390b65c92b6d502c62d27e7

    SHA256

    21c98d96dc09c1aaa4d16cde4137e2915b155ccfb44d9f8b32fb2723714e8599

    SHA512

    9dc819fc0c8aa01c082e7dcb72a64c8dfbd66522f1bbd41e139deba2cc1ff191e2e49cf4d3b420b64bcecdf996692863dcb29344fc449a251d1849c8abeb3531

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_A7A10F1A90F22C5287FE77A6FF73101B

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    212B

    MD5

    00148f292562f4a74ad614ad4a1702b4

    SHA1

    f19e562cb0d932ee823ee9f5713e82a0ba52c603

    SHA256

    0e90f27dba7d9042e6f2b9279c3bb81100f22c3ce5ccb100ba865f64100d3e8d

    SHA512

    10cfdf1d9004e5e6906ce6789b3ff27f868f9e94925716cf83f0d8074d63963d78a769312234312e6fed7ac01d6e875ea103651168ce1c6f0b0e1603aafff423

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_A7A10F1A90F22C5287FE77A6FF73101B

    Filesize

    408B

    MD5

    0ceed1c324faf265b4c8ba6db2bef09a

    SHA1

    87877b38a09f835a706ff4828fa4fbc8c2e5e260

    SHA256

    1194819902d2b03360ec6fcc25f4750804ef823cfd933ca0d1cd1a7f949d8821

    SHA512

    53f44b5a3dce925143a5f4d8313d779ed6d0aee2918afc907a38ad926f37c00cd7cabeb9134aaa64d1d46a9dacbbb35dc4e8ad994e4cd2c42676e330051b516b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    82f99d84760de9dead2f160ddc02e1a4

    SHA1

    395a48624ed24d5da0ec96aea50d1986a306586c

    SHA256

    fbbd59e368f350722cfa309955ad59c68c383265dce5dd0b1555d383cc1b4c6b

    SHA512

    bcf7cf64fdee37a47f1291a302d8c293b670d395551bae0c583c1dc5c8979538379b390618c0c049081e5dc371f2ba9f1d54600528106ed06cb6d024d2c33e20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    b56fe26322be087db29f0b3af4170fea

    SHA1

    e36ae5e5370e648b29c1bc2c44d2a0e01ee6a849

    SHA256

    307e84fd8783006911ab7b04799b6064e0142002777043488f7171bff03067dc

    SHA512

    a15e536b9e5756d29cded714e97531b80ee95d2491c77a48dfc7d17d4367753a2c9c7bd6b18b8c87603becf2064bd8004ea7be8434998fc455793c203fbd8917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa2949d4fc16cd8b3a847b9e2c833418

    SHA1

    0ff18a7639c9573a7a9083ba66b5a5e0efc11e83

    SHA256

    e96f42585f28540d025f8110da15d3da314a10b1c0b7c1329f310e7f41237d8a

    SHA512

    5b4e75bb32e9e99658aa69231fc0bd1dbc665b8eb0aa6d908d4cd081f20a2ea6cc7d0e52f559020e0143ade86c52b177dc72d71e7b6a0703a5fa038ca8a62f74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    413804db4d05c9fd642ab790daef943d

    SHA1

    9ed451459133f674a2120626a5a4e1b489053d40

    SHA256

    3190095515dd78bba01c0247e4f1a0a1d0af3c9cce1592e41636d3c6e0ab64a5

    SHA512

    133c73bc7c1c7baf841c45b2f4f15a9286e0384f4c7f17b857d6c66e49373328c18d2b6483f03ce3c0cac5c85053bd91644d5e65b263ff70ec3c57fce78bee6a

  • C:\Users\Admin\AppData\Local\Temp\CabDE12.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDE63.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \ProgramData\447873\WinCOMHost.exe

    Filesize

    846KB

    MD5

    e3ca517e9b655d1072d7ddd0a08b71b0

    SHA1

    3bc6c35adf3d135ca63b7b31d9bb309bf0189f9e

    SHA256

    9fa0e11feb58183577fefa4268bfff35e336af6e3432154d4618eb9828fd63fd

    SHA512

    ce0b982d7c6643da46d85d15ff45df7a32b9b6c64fc5612e9d2f9664421c8390ab4d42bd33f25f98735ca3539c20931c80d3f28c9e3ee76557a2e42e35806107

  • memory/2608-0-0x0000000074621000-0x0000000074622000-memory.dmp

    Filesize

    4KB

  • memory/2608-2-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2608-124-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2608-1-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-123-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-211-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-109-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-117-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-121-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-125-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-116-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-111-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-107-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2828-224-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-210-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-128-0x0000000074620000-0x0000000074BCB000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-213-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-220-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/2828-218-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/2828-217-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-215-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-212-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-221-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/2828-223-0x0000000002310000-0x0000000002327000-memory.dmp

    Filesize

    92KB

  • memory/3064-203-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB