Analysis
-
max time kernel
99s -
max time network
141s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 13:42
Static task
static1
Behavioral task
behavioral1
Sample
MuRra1N Installer.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
MuRra1N Installer.exe
-
Size
15.7MB
-
MD5
037ac0e6baf12a5eaf477c48fe923f2e
-
SHA1
19cadd63865579f4f7ceee970c731d9ff0e5a20a
-
SHA256
13a21602d5f5fceadfb7e45828fe76a44dc2dab2932fed665938715af574be9d
-
SHA512
70f80fc9bd3c9b163d694376b294619810099146b09b0bf479e5435001758bbe9450ba72766e4cdb873e68c205d9f85df6fc4129f33f7043fc90f86bc4c4e5b0
-
SSDEEP
393216:5NqIqvpE65+X2WPccsW9DM27doT6VWD2Ln9CDuIuLGgvKcE:50i6UmGM27mmsAn9C6fGgv/
Malware Config
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2544-2-0x000000000B530000-0x000000000C89E000-memory.dmp disable_win_def behavioral1/memory/3440-63-0x0000000000C50000-0x0000000001CC6000-memory.dmp disable_win_def behavioral1/memory/3440-64-0x0000000000C50000-0x0000000001CC6000-memory.dmp disable_win_def behavioral1/memory/3440-81-0x0000000000C50000-0x0000000001CC6000-memory.dmp disable_win_def -
Limerat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MuRra1N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MuRra1N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MuRra1N.exe -
Executes dropped EXE 1 IoCs
pid Process 3440 MuRra1N.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2449540194-3226363261-2578591490-1000\Software\Wine MuRra1N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 iplogger.org 33 iplogger.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3440 MuRra1N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuRra1N Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuRra1N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ MuRra1N Installer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 MuRra1N Installer.exe 2544 MuRra1N Installer.exe 3440 MuRra1N.exe 3440 MuRra1N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 MuRra1N Installer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 MuRra1N Installer.exe Token: SeDebugPrivilege 3440 MuRra1N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3440 MuRra1N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MuRra1N Installer.exe"C:\Users\Admin\AppData\Local\Temp\MuRra1N Installer.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3596
-
C:\Users\Admin\Desktop\New folder\MuRra1N.exe"C:\Users\Admin\Desktop\New folder\MuRra1N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856KB
MD5ebbffac026869be8811d37d9efe03a48
SHA114baba0e0d272401bdbb5a49f1a51e906534dcb7
SHA2560228439a92ac9478479b6ddd105732b01794dd66e0c4edbc2b0628e6dc235b76
SHA51247af5d2057f8d67ed3b844a89b94427dca1e4c9589782147eef76b8850331ba5b1b2f9d2a718fb98c3e976ccf16c36ed8dfca998c87f60996fa6306071147f39
-
Filesize
634KB
MD52468ab7cede3b25eec7cc7754f04b6cd
SHA10f8d58d385501e9f7d6930caee6ba512635bcc0c
SHA25656549d1ce59d3e496d66f22787dd00fe6baa15ecfca03d0c0f6295b8502018d3
SHA512a434c3d5f48d6817def540eca97c4f66c372fd6cc176b4b42863d4a4b58dcaf0e4e994806b7fd902e3805634bd1b08954ad8498622ab17f989a95ebc4bf3a541
-
Filesize
729KB
MD5769d2f7417d96706bde350e6742d3801
SHA12766cdf23d3c8a38cf3b2aa7584ea90c6348e25d
SHA256d7f38a1a9f2126bff494633b35159781423196c03fff63f5a37960b309a856ce
SHA5121807dbfc3489efc67802eb9a936e962a9e9de38a867ce940c5aa41f735d4edf0ff1fc0de1da7f65727ebd52693c913f354b6f4da045b782aa26f4f38c322d587
-
Filesize
983KB
MD54e2cf56d91ba26648bdab4e808fec945
SHA16a14b798254f5dfef7d4cc3897626439080839b0
SHA256fe7e55094b056b7c9a634737c335171414edf94349018f195c5774cadb367411
SHA5123c2eab16cca0e032a92093ba250e70ac19cd3dad8094300e9a707902dfaa8dc14bb04f17251c11908b54ec3209f1600593158af01e4bf1feaf086769e2994c15
-
Filesize
444KB
MD50c2f9380e483c6ad1ddee6a36edb85cb
SHA17781292948be47cb1aff58f105e126facc15916a
SHA2563e837418337f69ba6f12ef32225c19d698b7859a81c0567e73947a314bb6ebe9
SHA5126dff1a075da0ea320e0eb6788d65822919df7d56e1c159a7ebf322ad9d383ff7365a5d4f729166480d9cec49ccd859b9f4cc75daa53a78755cd063d53b163779
-
Filesize
12KB
MD5c4fea173b412b71d21ac427fb98416cd
SHA14397909b70ebf5c657a3a7690389928daced1e03
SHA256a65abb9f91d580db2442f8f89bca1aec710b8e9e652931a23b1f368f2be69d7c
SHA5122928b661cd3ebd26868d0a5fdb291bdc0cfd1252a061887dd45b6a52877a5d7c2d5ffe4b9ef22d48ca2b9710928887bb07f63467d17ce1282f9cfd986a23ad23
-
Filesize
602KB
MD50800a6d6d3267ad0575aa5b21dc182cb
SHA1ecbf09564975f15d24f6bd3c3eb1e745c48cca9b
SHA25692f4b4bcab4e053355b0ef547b06b5e8e7064edc5fbd2d3e25ec9843c115ddbb
SHA5127d369ad322a9467ac31ea24791b7656cbe3a4afd57a887391f8d5b80f39b7d996ea44bdec6f4eff0882370a43b6b4641f182f726c37e0f1b879fce5caddfe5af
-
Filesize
19KB
MD5abc40d17bb9aa2538595c0b9f0ab95ed
SHA1003cf9d9c35d2acaf223feca0df74ecc791bbd25
SHA256f9db8eb751b4ad68dd5ef0c8d60b92e1ecf91321a2a3722e6309806a3c80dcd8
SHA512c51bde1e931ec560cc51973f4a06c6e173f616943a94131c53446260293fea8446debb313b634faf7b69edb732e6aa3e665b08f585de7b010e3ce035309d3e9f
-
Filesize
666KB
MD50d9cb12ad34632ad9d15e338868e3eb8
SHA1ec759a7daf3a153e19353c3bc6eb501a8ee88c5d
SHA256f01f0f9e6dbfec859ceadd225e4ae5a0f00235ca0a950961f34d3af32e08ede1
SHA5129bdb95b39a4ba6d4ebe3ad6ed48574cb1c56abf3c5c8298d7a192cabd14750a055a5d1e9a227eb0bb1dbd82baa61be7f59aac0206ece4fddc940ada0011b05db
-
Filesize
380KB
MD56ad326f69d823304d2062165d55188d8
SHA19997773874f493bd2f3dcb8c2f04bf004638acef
SHA256e5011e852351faa0a1d78303968690d3a7ec485df2a9f95852cfda53253eef9c
SHA5129903e8c4f4981cf8a7fd0da52a3946d4474d785f5f2baf0c3be8fac177aa153d6bf2ff83e572def67399c9c7b75fc16c9bfe5c933891a9967b3b5ed3e31c94b2
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
9.8MB
MD529cfe05afad44fdbc83fa3671891688f
SHA1429de9b3429abd612c7c8343614c62e17ff4130b
SHA2561479cd2a1a05c905f63483a40d9ec251f044161a81fb585e4d7d469b7bc291af
SHA512c749c45924d4059f30ba918b31856cea7b6c74e4ebd982dc2dd05c3de3a30014ac38e45eeb796c447450bb07e02c2da00c61126709995ff4ff3bf0266ad842e5
-
Filesize
9KB
MD51d1c996b6ff660cdb29884546d94d7f5
SHA1259123cf0e5bfeba4a44704858751042f1b036c4
SHA2567ed841b0dfa126544b3f115a70584a2a6b0e3772b937ae1f3217339cbdf899c7
SHA512825e1ad2696d1516714c619a1a2187ffa3b34dd4d6d231ed7d2abb1493fdbc601417935ac8ac7d7abecf6ad920210a88d5a8c1831d4194392aa0f771c6e63e58
-
Filesize
10KB
MD51dbbcd1d77a099492abcc5def0939ee6
SHA14598e1ba2b1276df5f8bb3090cbf2bf643da904d
SHA25620b579c80c9e6e63001bf6b0d8180bdaa8a991e8f3eac8af2dba5767fb8f2649
SHA5129367b17abe236fa690a1c51a1e661e0e5dc7248ba61156c5cf298479206e07694e5778d05c60f3fbeb17e37b743f9f59d3c6d3b3fe636beb3b34b64a5a24d48a
-
Filesize
920KB
MD55c508a0b836dae5488fca5cbb35b16b1
SHA17ad4a6c8b58001732dccf5fd6c8db089c424e91e
SHA2563230fffe0b0e8652ae067f8b9374dc3eb538a707a4f138bde852566aa95772e6
SHA512690f1aeaf2d08939e55f91ce8cf52c897b18c3a4187981ff071dcb18711ec9d12c3440f92a2d01c60a54038e81692aa727532ed0fc693165e0ebb7f842de50a8
-
Filesize
507KB
MD51cbbdfe7b2e89e71d23aea92904968a8
SHA16e34fcd7c6e0ee30fd4ad93c38676b5c5ffe1473
SHA256ce2787839de4c1ecb93db0569a1a73f39ac953f5dd0144fd01c3131165bd9955
SHA512ede1de9200b8850a87354769db96072eca9455126c9bd75005d1d8fa328e9782f95eee6e2c550884749eeedd74edb60ee061208e8035a2eed7d6bf9f7763ca3a
-
Filesize
539KB
MD5dbfeffaed6ba3be5c69db5f365105a86
SHA16aa388851544254ab51445b84379eb211a538a1a
SHA2565b4a0cb30caf288c5fa5589c365fac7f17c06fbfd15c4252c11218dbfa457fc2
SHA512d19c065ce8ec3ef44020eb587a5eda87b41d603a09e4c775bf22bdd3ac96477e7122071dbbfe9463f17fefafc608e5a52f134713272fa927dd952c14e065811f
-
Filesize
571KB
MD530925e7d2fcbe97b35530aa5cb6ee790
SHA10990dc847b3e75aae9e4ee357adc1b98afa3a68e
SHA256278ae59cc82cf18dde38ee37b015ae0cfce5527c5c14047dc20a9a5c3870df24
SHA512dcbd2a631d61ed4483fe3baee6bbbfa36154bf68a3ddf7f81e7a5420ed4f4b6f700a77f4dceee871673240675572a4d32b41e10acf5ef80c4e12c55e84a84c50
-
Filesize
476KB
MD534321a685bd70310fc488440bc060cf0
SHA11f3a13b31f008c97d649468d2a8706963f39d60e
SHA2569ee2746f99d59c2cdd3335584db73344a4445e34cbcffb412b9dee48ed7d6be4
SHA512324f8937e14db4e992d04c549a4f941b4ce4495d26d5ad24652262e47e1efaccef9dd456658692ca75608b6da12e049995c0516ad16269a774b7caaa8edeb537
-
Filesize
412KB
MD59b7eef01009d87e6c437661f99f8d1ac
SHA12b6547e1e0e42fa0b60850b77bac44ef4e59db88
SHA256ca33699fc5c82241146cd851831daa3fc985232b4804d1260c069a3a890aff4e
SHA5128e8cadadcce30a14065946e2e494548af45a293188e7318926e2562a6dcc554368bd35520a97e6f78f534d72b81eaaac471065c039ec14664d93d1373899e4a4
-
Filesize
761KB
MD5db825ed30d98e4966c66fb0f4ef24738
SHA16fc1f1e374eb0a95a6d9d1d2ff259f358b3bc0a4
SHA2563d0a5cc4e311d8674c1d652d74ae5d7b2b1a699382cef4a83512f21aa6416d04
SHA5123eeb584b081e8a898f94db15f4554897dc632ad950caf1467ac3a26e5fc8d1f73395fe6abb511f18c02d17d9d1dc2fccee3d289846dccb60cccff1dda6330a3f