Analysis
-
max time kernel
106s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 04:25
Static task
static1
Behavioral task
behavioral1
Sample
050ed4cab9086901e2949a763af72b44.exe
Resource
win7-20231129-en
General
-
Target
050ed4cab9086901e2949a763af72b44.exe
-
Size
3.7MB
-
MD5
050ed4cab9086901e2949a763af72b44
-
SHA1
420ea54d7af4c52070a9206dbd37afe05272be7e
-
SHA256
acdada170f375d782d71ba45ca4021c904d9369de3f6460d25f8e1af380e9af1
-
SHA512
242f3e646360924085bcca557518cad0fc3939b71a0a88280188562eb4b4a3503832ce46b3bc18d3f62e496a185a2cd90c55d67bcfb3599edff86a473bebb1ec
-
SSDEEP
98304:PX4UCOsip5zWoW7d5OJQ8e0vDMFyWN/KQyazx14:vZ5aX81AMWBBya0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3244 050ed4cab9086901e2949a763af72b44.tmp 5076 Libero.exe -
Loads dropped DLL 2 IoCs
pid Process 3244 050ed4cab9086901e2949a763af72b44.tmp 5076 Libero.exe -
resource yara_rule behavioral2/files/0x000600000002323c-40.dat upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Facilis\ab\is-ERHJR.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-5V4PD.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-BCD3G.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-RCFNV.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\unins000.dat 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\is-M1MCC.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-G53ME.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-AME22.tmp 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\unins000.dat 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\maxime\Libero.exe 050ed4cab9086901e2949a763af72b44.tmp File opened for modification C:\Program Files (x86)\Facilis\maxime\sqlite3.dll 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-ITA0H.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-1DMMK.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\is-UL48B.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\illum\is-8G1DQ.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\maxime\is-F0CT8.tmp 050ed4cab9086901e2949a763af72b44.tmp File created C:\Program Files (x86)\Facilis\quae\is-V1LNN.tmp 050ed4cab9086901e2949a763af72b44.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 5664 5076 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3244 050ed4cab9086901e2949a763af72b44.tmp 3244 050ed4cab9086901e2949a763af72b44.tmp 5076 Libero.exe 5076 Libero.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3244 050ed4cab9086901e2949a763af72b44.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3244 5008 050ed4cab9086901e2949a763af72b44.exe 18 PID 5008 wrote to memory of 3244 5008 050ed4cab9086901e2949a763af72b44.exe 18 PID 5008 wrote to memory of 3244 5008 050ed4cab9086901e2949a763af72b44.exe 18 PID 3244 wrote to memory of 5076 3244 050ed4cab9086901e2949a763af72b44.tmp 31 PID 3244 wrote to memory of 5076 3244 050ed4cab9086901e2949a763af72b44.tmp 31 PID 3244 wrote to memory of 5076 3244 050ed4cab9086901e2949a763af72b44.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\is-00SEK.tmp\050ed4cab9086901e2949a763af72b44.tmp"C:\Users\Admin\AppData\Local\Temp\is-00SEK.tmp\050ed4cab9086901e2949a763af72b44.tmp" /SL5="$E0040,3221685,721408,C:\Users\Admin\AppData\Local\Temp\050ed4cab9086901e2949a763af72b44.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Facilis\maxime\Libero.exe"C:\Program Files (x86)\Facilis/\maxime\Libero.exe" bc93afcf73c0c6cf2f0f1146193a73ae3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 8604⤵
- Program crash
PID:5664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5076 -ip 50761⤵PID:6052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5eee96630e0477c553056a3c2c01ef6eb
SHA1b4e0efe39ec2d232b48d254e685e806ff1f1fa3c
SHA25690a5cc23c8f19bc702d20d9eaa908ae9efbf0ae9038eac04100922859d5ab772
SHA512e9a5afcf78a6bd13651dcf570f8751710e49cbaa6370622ba4c63676ba9cd70655b176981a45883ef1de61b7fbd33b645490089a01a2926ab994a3e70a7c11cd
-
Filesize
381KB
MD5fd8b0b35a57a9fb904dc35235e0a2b51
SHA1b0276264641c6cc6186d4e4cf934b36aba01a5c8
SHA2567cea74cc89330e9071107a857fc407c7efe30e6fd24e1fc05f1a8ed02c65f588
SHA512e4692b6f375ff1098670f15c69e6a65f310b82751300da14146a87fd471c82e83e2036a7a2666a551cefc64c37fb1edaf14789b2b9bb9c78f28cf1c38806d6c2
-
Filesize
93KB
MD5636dac01e993b7933bd563bd8d2215e2
SHA12510b6336bd5bf2e1eef681133d82bf25733418a
SHA25612a176f9601f23c1523f8193cd93e84033585d76708f2c3d9379ca7954a7685c
SHA5122e943c783ca737cda38b608025be63d8ee21e7cef9ae37ffab8124a4669b572f5056bdc9e13a3d85fe45a1443283b52d3acf46f4682f8cd267b304244aa1a483
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63