Analysis
-
max time kernel
311s -
max time network
333s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:25
Static task
static1
Behavioral task
behavioral1
Sample
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe
Resource
win10v2004-20221111-en
General
-
Target
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe
-
Size
225KB
-
MD5
0516e57beb0b7b716f6b5fd138a3a9d6
-
SHA1
14db1c62a45108b725cec294928c33e12415d900
-
SHA256
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61
-
SHA512
199662f06bc7106b1164462eb143dc5c7835237689f7a8426d92a603df5779f0d0ca592f2d36b6a75b1b15ed1a4e0485a53bee943e475a409eb781d16fc4ebd6
-
SSDEEP
3072:XC/sHTUt0pfM90Ckr01V3CdqQFxXWVZJtN7TD3sCSBo+nuikD91L6TrDIJ7YmWt:XC/sHot0p/Q30yJtVgCH+29Uf1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ligee.exepid process 3168 ligee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ligee.exepid process 3168 ligee.exe 3168 ligee.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ligee.exepid process 3168 ligee.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exeligee.exedescription pid process Token: SeCreateTokenPrivilege 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe Token: SeBackupPrivilege 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe Token: SeSecurityPrivilege 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe Token: SeCreateTokenPrivilege 3168 ligee.exe Token: SeBackupPrivilege 3168 ligee.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exeligee.exedescription pid process target process PID 4876 wrote to memory of 3168 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe ligee.exe PID 4876 wrote to memory of 3168 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe ligee.exe PID 4876 wrote to memory of 3168 4876 96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe ligee.exe PID 3168 wrote to memory of 2148 3168 ligee.exe explorer.exe PID 3168 wrote to memory of 2148 3168 ligee.exe explorer.exe PID 3168 wrote to memory of 2148 3168 ligee.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe"C:\Users\Admin\AppData\Local\Temp\96c2a28ff80cbd8d0d02cb497273026003ba9b9275619996479c439e6ee9da61.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Efori\ligee.exe"C:\Users\Admin\AppData\Roaming\Efori\ligee.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Efori\ligee.exeFilesize
225KB
MD5f87acffdbd19a066747852a4f924d8cc
SHA17dda2b025576647a72b368cf4451a1cc94026023
SHA256913996a11f8a3522b85671ce6b8d8c9485271c1574fb713e13a32585618ed439
SHA5121634cf6e86d4ca7ff4c9443fe62212ad32d539fe4454ac5db48b0d57661ce72339f753a121ba472ffea8571053e5bd6840cde1635c75fa7dff71d5b00132c2db
-
C:\Users\Admin\AppData\Roaming\Efori\ligee.exeFilesize
225KB
MD5f87acffdbd19a066747852a4f924d8cc
SHA17dda2b025576647a72b368cf4451a1cc94026023
SHA256913996a11f8a3522b85671ce6b8d8c9485271c1574fb713e13a32585618ed439
SHA5121634cf6e86d4ca7ff4c9443fe62212ad32d539fe4454ac5db48b0d57661ce72339f753a121ba472ffea8571053e5bd6840cde1635c75fa7dff71d5b00132c2db
-
memory/2148-141-0x0000000000000000-mapping.dmp
-
memory/2148-142-0x0000000001090000-0x00000000010BD000-memory.dmpFilesize
180KB
-
memory/3168-135-0x0000000000000000-mapping.dmp
-
memory/3168-138-0x00000000022A0000-0x0000000002335000-memory.dmpFilesize
596KB
-
memory/3168-139-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4876-132-0x0000000002470000-0x0000000002505000-memory.dmpFilesize
596KB
-
memory/4876-133-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB