Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    24s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/12/2024, 23:35

General

  • Target

    New-Client.exe

  • Size

    28KB

  • MD5

    61a2b17f672f3acf54b7013f8a9e092c

  • SHA1

    2ae9498d0e8aca337ad32c92c0e54b0e4afd1dfe

  • SHA256

    e4e8159b917a569b84b0397df1c7e133bbb58f4f632bdafa939cc164afe0e8d0

  • SHA512

    e6fdfa98dfd24f08770803d3eec60886bd93826df21a632073e53f27110518a6330d0d93a45b6b9dbef148b4740ba72659ed3aaceec7e54762ab3d86be89a0f0

  • SSDEEP

    768:5piI6h5w9azdfpAY45NyPChGy1sEhwGxMj:5pW5w92SlePCb1Xi

Score
10/10

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    1234

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/DDTVwwbu

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Limerat family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New-Client.exe
    "C:\Users\Admin\AppData\Local\Temp\New-Client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

    Filesize

    4KB

  • memory/3044-1-0x0000000000F60000-0x0000000000F6C000-memory.dmp

    Filesize

    48KB

  • memory/3044-2-0x00000000059C0000-0x0000000005A5C000-memory.dmp

    Filesize

    624KB

  • memory/3044-3-0x0000000005A60000-0x0000000005AC6000-memory.dmp

    Filesize

    408KB

  • memory/3044-4-0x0000000074EF0000-0x00000000756A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3044-5-0x0000000006700000-0x0000000006CA4000-memory.dmp

    Filesize

    5.6MB

  • memory/3044-6-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

    Filesize

    4KB

  • memory/3044-7-0x0000000074EF0000-0x00000000756A0000-memory.dmp

    Filesize

    7.7MB