Overview
overview
10Static
static
10quarantine...0K.exe
windows10-2004-x64
10quarantine...0K.exe
windows11-21h2-x64
10quarantine...TS.exe
windows10-2004-x64
10quarantine...TS.exe
windows11-21h2-x64
10quarantine...qK.exe
windows10-2004-x64
3quarantine...qK.exe
windows11-21h2-x64
3quarantine...ZK.exe
windows10-2004-x64
10quarantine...ZK.exe
windows11-21h2-x64
10quarantine/Energy.exe
windows10-2004-x64
10quarantine/Energy.exe
windows11-21h2-x64
10quarantine...es.exe
windows10-2004-x64
10quarantine...es.exe
windows11-21h2-x64
10quarantine...cL.exe
windows10-2004-x64
7quarantine...cL.exe
windows11-21h2-x64
3quarantine...9O.exe
windows10-2004-x64
10quarantine...9O.exe
windows11-21h2-x64
10quarantine...6q.exe
windows10-2004-x64
10quarantine...6q.exe
windows11-21h2-x64
10quarantine...di.exe
windows10-2004-x64
10quarantine...di.exe
windows11-21h2-x64
10quarantine...89.msi
windows10-2004-x64
9quarantine...89.msi
windows11-21h2-x64
9quarantine/main.exe
windows10-2004-x64
3quarantine/main.exe
windows11-21h2-x64
3quarantine/random.exe
windows10-2004-x64
7quarantine/random.exe
windows11-21h2-x64
7quarantine..._2.exe
windows10-2004-x64
10quarantine..._2.exe
windows11-21h2-x64
10quarantine...vA.exe
windows10-2004-x64
7quarantine...vA.exe
windows11-21h2-x64
7quarantine...Z1.exe
windows10-2004-x64
10quarantine...Z1.exe
windows11-21h2-x64
10Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 23:26
Behavioral task
behavioral1
Sample
quarantine/07jGt0K.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
quarantine/07jGt0K.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
quarantine/235T1TS.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
quarantine/235T1TS.exe
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
quarantine/4CJvcqK.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
quarantine/4CJvcqK.exe
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
quarantine/CBOZ4ZK.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
quarantine/CBOZ4ZK.exe
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
quarantine/Energy.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
quarantine/Energy.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
quarantine/GPSHees.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
quarantine/GPSHees.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
quarantine/VcYJXcL.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
quarantine/VcYJXcL.exe
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
quarantine/aUdWe9O.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral16
Sample
quarantine/aUdWe9O.exe
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
quarantine/eLa1r6q.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
quarantine/eLa1r6q.exe
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
quarantine/fLoJWdi.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral20
Sample
quarantine/fLoJWdi.exe
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
quarantine/fyBqr89.msi
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
quarantine/fyBqr89.msi
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
quarantine/main.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
quarantine/main.exe
Resource
win11-20250411-en
Behavioral task
behavioral25
Sample
quarantine/random.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral26
Sample
quarantine/random.exe
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
quarantine/random_2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
quarantine/random_2.exe
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
quarantine/s8Sj4vA.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral30
Sample
quarantine/s8Sj4vA.exe
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
quarantine/t98WFZ1.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral32
Sample
quarantine/t98WFZ1.exe
Resource
win11-20250410-en
General
-
Target
quarantine/eLa1r6q.exe
-
Size
28KB
-
MD5
15e27b66a793a187332608a4308395db
-
SHA1
3d35e1afd2ec15bfe99421b16a564b85f80a1a21
-
SHA256
c21710c62b0a9cf87454c0a7465379a9fc792800be77ba95cb6fd0f2d611213f
-
SHA512
2afae47d044a03f04c87c7c790c0e13628189a249de12b73f815faf7e04b49a6837e25682f83efeb2cf06dd7621a9d2ef17dd34e7ae13e57ec2843b04bb73ae4
-
SSDEEP
768:JpW26eWrwugABZ445NwzQbF45rXupSUj:Jp/WrwuVrFkzAFkXCSU
Malware Config
Extracted
limerat
34oTgBswSRbYC4CZFC9TdmhEtC4CU2TDY7
-
aes_key
1212
-
antivm
false
-
c2_url
https://pastebin.com/raw/qEZEFuXv
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Windows.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\Security\
-
usb_spread
true
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/qEZEFuXv
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Limerat family
-
Parallax family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Control Panel\International\Geo\Nation eLa1r6q.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 Windows.exe -
Loads dropped DLL 2 IoCs
pid Process 4448 Windows.exe 4448 Windows.exe -
Uses the VBS compiler for execution 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 pastebin.com 20 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eLa1r6q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe 4448 Windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4448 Windows.exe Token: SeDebugPrivilege 4448 Windows.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1648 1880 eLa1r6q.exe 88 PID 1880 wrote to memory of 1648 1880 eLa1r6q.exe 88 PID 1880 wrote to memory of 1648 1880 eLa1r6q.exe 88 PID 1880 wrote to memory of 4448 1880 eLa1r6q.exe 90 PID 1880 wrote to memory of 4448 1880 eLa1r6q.exe 90 PID 1880 wrote to memory of 4448 1880 eLa1r6q.exe 90 PID 4448 wrote to memory of 3328 4448 Windows.exe 93 PID 4448 wrote to memory of 3328 4448 Windows.exe 93 PID 4448 wrote to memory of 3328 4448 Windows.exe 93 PID 3328 wrote to memory of 3924 3328 vbc.exe 95 PID 3328 wrote to memory of 3924 3328 vbc.exe 95 PID 3328 wrote to memory of 3924 3328 vbc.exe 95 PID 4448 wrote to memory of 3812 4448 Windows.exe 96 PID 4448 wrote to memory of 3812 4448 Windows.exe 96 PID 4448 wrote to memory of 3812 4448 Windows.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\eLa1r6q.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\eLa1r6q.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Security\Windows.exe'"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\Security\Windows.exe"C:\Users\Admin\AppData\Roaming\Security\Windows.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hvfe5mmy\hvfe5mmy.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5A0D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE705C04FF29484F8411D17CE1194666.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dwyolxx0\dwyolxx0.cmdline"3⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55cfca34a4d17dc851c1a8adfa6028a3b
SHA1bf0c1492d5940882729a80af252f799b17e92bfb
SHA2569d7b5457acb018893b4a556b8a7c727693c0cd11bff0af447c0f14c6481e1fbd
SHA512cab90245256e054932a6ba1684f1503a6c8ce1d1a5a7cca0aa18e5b3eb1c0928c2e4364e22c10217e8ed25f5e11b0c31a6506df29fa034557d26f79dde1761e8
-
Filesize
237B
MD5e33e6f613760dd7fb6cce4df88f56613
SHA16c90269821efec9be160f24ede1e8a4a1f7b9239
SHA256caf66c8d8a5605bab56494c6e9dfb71c70be2054b6e95a918efbf73f25299cf4
SHA51237d8fbb139a3b4d836afa9a32ef7df96b36f584e2dc341d2e1578f6d33d5577728c2869e0831d263d347d4b98c879d1512fe246c022450a86ccdeba741f3a31b
-
Filesize
293B
MD5873f0d41a507e9c8ad030e1e5cba3ea7
SHA1a5984c5ccc0acb09a98f8a09beaceaea09c1db01
SHA2569f41e3df4470aa44bdcead77f40e2ba7abb84f0c0a0c1a3c91b713890a4d82da
SHA5127590f5d6dcd8827f97d02a0fc074a9fd6337a0dee0ae8f073728338130640ba58a409a3dc1a467a23c4af344c2ec22a98fe3b6ae8763afdf326559019bc23309
-
Filesize
231B
MD56fb856e990ad6eb648313818605c791a
SHA1fde8e68812fa8ea48107cfdc78bbc1b6d92f0610
SHA256c07e62d947d0f35d5b365b26e126b95b738fc983f4439a3bd30b7c48bb026b15
SHA5129f04f638c63c479280571549a2492bc0b7f7ccdd134a216c98bf20118d468695bf0f5f982a4941cd48d5b156820ea449eaca42092b0125d336e90619c16d2cae
-
Filesize
282B
MD5f1ad47841c23180be7374808ce23e839
SHA1c25a32db033a3fa408a388d289c18e4c02949eeb
SHA2560d014a194057a8d7d26e54fee49c008c4b3e790664dd9837dff2a878ee68e48a
SHA5123190ee726bf35e4e68fc64e6c555bec760c4199104e260222d164342f4f4b877224a03b77cfebcab6cf3d8e9d09fe009b2e465242bd2034ab4a290ef04fde4fe
-
Filesize
4KB
MD53bc8adeb12a0fcc53a2368d6b2ac06f1
SHA11fbf854011bdb8a6d8b876dd03eb58f70422b5c9
SHA25605d3206e82e3219eaa0ea9825b64eb5d32f542f257a5ff4c72149ebe0a7be12b
SHA5128885b4fc552332b8e667e425afbc9c18ec54fb561a49b085aef5fdc51142efc61bf7d2b868632d1f1a6e03b256b9422be706aa3cfa58a8de6ef15b94abb163cd
-
Filesize
4KB
MD5a561ca41d3b29c57ab61672df8d88ec9
SHA124567a929b98c2536cd2458fdce00ce7e29710f0
SHA256f8c5b0b66dbab94ebed08de93cf2300c9933db9ba43b468a0cda09602a2520ce
SHA512eede6794c1a7318fa6107069719fb6ea885b2aa0410e70b300fa65e349a7c6798eb232fb8b6ac254821145cf9de5b91846b1e80514a402a3234c1b336223b027
-
Filesize
6B
MD5ed5a964e00f4a03ab201efe358667914
SHA1d5d5370bbe3e3ce247c6f0825a9e16db2b8cd5c5
SHA256025fc246f13759c192cbbae2a68f2b59b6478f21b31a05d77483a87e417906dd
SHA5127f3b68419e0914cec2d853dcd8bbb45bf9ed77bdde4c9d6f2ea786b2ba99f3e49560512fbb26dd3f0189b595c0c108d32eb43f9a6f13bbc35b8c16b1561bd070
-
Filesize
59KB
MD545ecaf5e82da876240f9be946923406c
SHA10e79bfe8ecc9b0a22430d1c13c423fbf0ac2a61d
SHA256087a0c5f789e964a2fbcb781015d3fc9d1757358bc63bb4e0b863b4dffdb6e4f
SHA5126fd4a25051414b2d70569a82dff5522606bfc34d3eaeea54d2d924bc9c92e479c7fda178208026308a1bf9c90bee9dbcaf8716d85c2ab7f383b43b0734329bc8
-
Filesize
28KB
MD515e27b66a793a187332608a4308395db
SHA13d35e1afd2ec15bfe99421b16a564b85f80a1a21
SHA256c21710c62b0a9cf87454c0a7465379a9fc792800be77ba95cb6fd0f2d611213f
SHA5122afae47d044a03f04c87c7c790c0e13628189a249de12b73f815faf7e04b49a6837e25682f83efeb2cf06dd7621a9d2ef17dd34e7ae13e57ec2843b04bb73ae4