Analysis
-
max time kernel
163s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
liberase_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
liberase_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
liberase_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
15KB
-
MD5
b9420cec45c1cb950b93a962b028571b
-
SHA1
d953292ca3d2c607a9f4ab6e9ba5138c920998c5
-
SHA256
dea464c11076686ad90fd577cf819b8e3f73469dda6907af248135399c8c1df7
-
SHA512
ac9635199d5bbe34c3f84138832a1deea1beb9c71f2330aaeb1fdeeedc34fe8c76fb7a52602cc2575ea8aaf7bfc9081966cf755ba5962fd5a176c8f2ccf903cb
-
SSDEEP
384:oVPMcMHyAcaRYkVTcvXkvDZ3e7Z7LJzl+Cq124kbrBZFE8uI:APMcMHyAcaRYkVTcvUvDZ3e7Z7LtFE8B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 5008 msedge.exe 5008 msedge.exe 1560 identity_helper.exe 1560 identity_helper.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3184 5008 msedge.exe 83 PID 5008 wrote to memory of 3184 5008 msedge.exe 83 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 1888 5008 msedge.exe 84 PID 5008 wrote to memory of 2940 5008 msedge.exe 85 PID 5008 wrote to memory of 2940 5008 msedge.exe 85 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86 PID 5008 wrote to memory of 2228 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\liberase_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8c8646f8,0x7ffd8c864708,0x7ffd8c8647182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,8791363829155237814,17707011019445526428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
Filesize
6KB
MD5f207b45d636bbdab6db07736de5404ae
SHA1408bef904309a7eb046a412ba299d9516641e6c6
SHA256bcb9126cadaa35fcc2aded99c36feff517673cbbc24e9c1b7188f1b132de11b1
SHA51268923e71b2f44dead2d7c588561c7cfea4dc99103960d13a24d300b3bad6b382f0bf81ab5091ca5881621f2b60e01e8d621d8cd0d488a3ad81e8962e011eee16
-
Filesize
6KB
MD55d8edd7dcb8afb498825b418ed47e078
SHA15b1b7f7013392b5b59af2aef4dbaafd34ad8ba30
SHA2564b28b099fb1a2d12f6cbb191a60dc3a24bf2be8dd7e1349d4c19ad7db0ca2dce
SHA512bbcc04010c1385ea3399591277e3fbaa395938c00dd79a40b658f652fb8f0af2f62abcbb24f4dd5a702d249ccddd2273a24c2e34e981a1219cc1301d6d4abeb8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50ffa260fc081fd28943a4cf5098f5476
SHA1b028cd0d74c79f55a4ec84c34cc6d5f4c790e862
SHA2565a385051d5b19a01393b477966e3dea69a0657a0c0f1132f74a139414273f69a
SHA51211ade57b4f179363a0842ad35e0056c3f118680c88f3b8872061671190e045c90679f26a04f06f542a03bb3c83a28059b9c4a80a963c7beb782641a53e61df77
-
Filesize
11KB
MD5bce8b8b983308a730f5e7005f4fe85e2
SHA184970f8ce234147671ae249a3d768ae63cd89169
SHA256e7ca12c6444b7ba9f217936ba2df69a936e0cd0e629f3b9b01e85ebea4485eab
SHA512d3e7e35f6442426f916e78995f754a2e201e8bd5736961c46e6730661c697232a4831d5684f45b86bc579f784879bd2c2a38805daac79afd74dbed732d1f97ac