Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 04:25
Static task
static1
Behavioral task
behavioral1
Sample
050ed4cab9086901e2949a763af72b44.exe
Resource
win7-20231129-en
General
-
Target
050ed4cab9086901e2949a763af72b44.exe
-
Size
3.7MB
-
MD5
050ed4cab9086901e2949a763af72b44
-
SHA1
420ea54d7af4c52070a9206dbd37afe05272be7e
-
SHA256
acdada170f375d782d71ba45ca4021c904d9369de3f6460d25f8e1af380e9af1
-
SHA512
242f3e646360924085bcca557518cad0fc3939b71a0a88280188562eb4b4a3503832ce46b3bc18d3f62e496a185a2cd90c55d67bcfb3599edff86a473bebb1ec
-
SSDEEP
98304:PX4UCOsip5zWoW7d5OJQ8e0vDMFyWN/KQyazx14:vZ5aX81AMWBBya0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2988 050ed4cab9086901e2949a763af72b44.tmp 2840 Libero.exe -
Loads dropped DLL 4 IoCs
pid Process 2892 050ed4cab9086901e2949a763af72b44.exe 2988 050ed4cab9086901e2949a763af72b44.tmp 2988 050ed4cab9086901e2949a763af72b44.tmp 2840 Libero.exe -
resource yara_rule behavioral1/files/0x00070000000133a9-41.dat upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Facilis\maxime\is-D7G1D.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\quae\is-TQHPF.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\ab\is-F7NPE.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-TB31E.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-H591F.tmp 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\unins000.dat 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\is-RLHA5.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-RNNQI.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-R1BUD.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-T25RP.tmp 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\maxime\sqlite3.dll 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-CRMEG.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-CPDCJ.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-F75QR.tmp 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\maxime\Libero.exe 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\unins000.dat 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\is-35U1G.tmp 050ed4cab9086901e2949a763af72b44.tmp -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2988 050ed4cab9086901e2949a763af72b44.tmp 2988 050ed4cab9086901e2949a763af72b44.tmp 2840 Libero.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 050ed4cab9086901e2949a763af72b44.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2892 wrote to memory of 2988 2892 050ed4cab9086901e2949a763af72b44.exe 18 PID 2988 wrote to memory of 2840 2988 050ed4cab9086901e2949a763af72b44.tmp 25 PID 2988 wrote to memory of 2840 2988 050ed4cab9086901e2949a763af72b44.tmp 25 PID 2988 wrote to memory of 2840 2988 050ed4cab9086901e2949a763af72b44.tmp 25 PID 2988 wrote to memory of 2840 2988 050ed4cab9086901e2949a763af72b44.tmp 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\is-63LUP.tmp\050ed4cab9086901e2949a763af72b44.tmp"C:\Users\Admin\AppData\Local\Temp\is-63LUP.tmp\050ed4cab9086901e2949a763af72b44.tmp" /SL5="$40016,3221685,721408,C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Facilis\maxime\Libero.exe"C:\Program Files (x86)\Facilis/\maxime\Libero.exe" bc93afcf73c0c6cf2f0f1146193a73ae3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD587a3b02d203d1c69ef3b4f9a50f848ce
SHA1a621ca18c711e03f4c8f1deb06d7aa07c1b3d1c0
SHA2561aad33314da6b332f3c71df86d61216bf5cb4331c53b4894ef6d48059bf4effe
SHA5126c777ad8be8fb29d7a0813442b0b7b6d99fc9f1c14a592535f4208d0b0d49866d54801bdc47a81190875c142b4e35252453a141c30ccd0bf8bd72b764350f5ab
-
Filesize
889KB
MD57670dd738f7c6b6546ff4617e1f576af
SHA1705d0a42220cef73774d8ddb40ba78a0e769cfe1
SHA256c81f867b90c842ae87676ac3a1e81803fe6f199d53235e538f6e45de1995fe1e
SHA512e5bfbb9398e89c655eb7d597281c94142aaf4055dc8c0cfccbc6f6dcd17273a0dc17d2caf886a92b104e3d27cbe811819c102eef0a6fced0b8032a2d3a5498c0
-
Filesize
92KB
MD50efb9c0f438caa82ab9943bce310be6d
SHA1fc26ab92156891bdbf5def860ab4775ec2ccc2cd
SHA2561a938d69fce8d8cfd680072fcf011e7531ed0483a42613b935ad46fa2e2757aa
SHA512aedd9745fa3d60449a773276c49f0e15a0987581ab08e854f79de8a4cef625751ac6b23b8250eb78fdb32d535c3547400f41d5b5313470270b7a41c78b4297cf
-
Filesize
887KB
MD531f8614bca6ec546a1fca2d0f742988d
SHA1bef4ce8d59eeac9b8139f31f19871f9893631f60
SHA2563397c88fc8874f6cfb63446db72c414291d9f963cd143e19ff19c3a4125a07a3
SHA512c7516232aa10088c638235af7b5cf65f9a977372a7b1e11e2104448d67ecb92cb0fb866d95b88eb7816a61f71b037a22e532e00955fcc3ee701d900ebe5358e5
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63