Analysis
-
max time kernel
47s -
max time network
44s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-02-2025 23:01
Static task
static1
Behavioral task
behavioral1
Sample
075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe
-
Size
637KB
-
MD5
a2888153204a255cd7c3928314ee2038
-
SHA1
97066f5da137d8e41c0531abf330d1753cec4d40
-
SHA256
075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3
-
SHA512
f7193b737842efcc7728d5e1ec071918a7f6d846d225210f2e770c3df4514b3ef2132550fc022d32bad3c13ebb0455a681243635254f408d0ae6b6967afa9107
-
SSDEEP
12288:+9LH05gIM7UTuUPkId0IDaUZyqKNuMxV/abCs1RHrVRb/Q:+ZAS80+5mva2sjVRc
Malware Config
Signatures
-
Luminosity 2 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 3624 schtasks.exe -
Luminosity family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4268 set thread context of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 2180 taskmgr.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2180 taskmgr.exe Token: SeSystemProfilePrivilege 2180 taskmgr.exe Token: SeCreateGlobalPrivilege 2180 taskmgr.exe Token: SeDebugPrivilege 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe Token: SeSecurityPrivilege 2180 taskmgr.exe Token: SeTakeOwnershipPrivilege 2180 taskmgr.exe Token: 33 2180 taskmgr.exe Token: SeIncBasePriorityPrivilege 2180 taskmgr.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe 2180 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 4268 wrote to memory of 1800 4268 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 83 PID 1800 wrote to memory of 3624 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 88 PID 1800 wrote to memory of 3624 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 88 PID 1800 wrote to memory of 3624 1800 075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe"C:\Users\Admin\AppData\Local\Temp\075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe"1⤵
- Luminosity
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe"C:\Users\Admin\AppData\Local\Temp\075890d64e24198252e675961d25e7d5cf24dc76a2edcf4d880e595ba6e265c3.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc onlogon /tn "Client Monitor" /rl highest /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /f3⤵
- Luminosity
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3624
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2180