Analysis

  • max time kernel
    61s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 10:47

General

  • Target

    45.139.105.159_-_files_-_dVVORMr.exe___b5c6bf928455a865d23284c92ee0d6f9.exe

  • Size

    931KB

  • MD5

    b5c6bf928455a865d23284c92ee0d6f9

  • SHA1

    d1dd08dda99dd92c3ac3233d86e6ee35413c8e2b

  • SHA256

    80067654edee465f36b83d436bcfe0002d4da5b57a16df9545afed6912e379a6

  • SHA512

    86f7ee60f7bde54cc0d2a3c2686e125e6728e3cdb675349290a2c63c366d83c35e916111e449904d88146da70e41e4eb4acd41642f7d55656b8984158a8c99cc

  • SSDEEP

    24576:jyJE/eo0zlvyn9DiwzjNVVreEqrA6eyz+1ro:2rSD5zjDV36nq0

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45.139.105.159_-_files_-_dVVORMr.exe___b5c6bf928455a865d23284c92ee0d6f9.exe
    "C:\Users\Admin\AppData\Local\Temp\45.139.105.159_-_files_-_dVVORMr.exe___b5c6bf928455a865d23284c92ee0d6f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\choice.exe
      choice 3489834785637788484436574374756367847583
      2⤵
        PID:4864
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Interactive.xlt & ping -n 5 localhost
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /FI "imagename eq AvastUI.exe"
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2244
          • C:\Windows\SysWOW64\find.exe
            find /I /N "avastui.exe"
            4⤵
              PID:4464
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FI "imagename eq AVGUI.exe"
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2576
            • C:\Windows\SysWOW64\find.exe
              find /I /N "avgui.exe"
              4⤵
                PID:2612
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^jkrXiF$" Weapons.xlt
                4⤵
                  PID:2860
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                  Privileges.exe.pif O
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:836
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    5⤵
                    • Executes dropped EXE
                    PID:2160
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    5⤵
                    • Executes dropped EXE
                    PID:3868
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif
                    5⤵
                    • Executes dropped EXE
                    PID:880
                • C:\Windows\SysWOW64\PING.EXE
                  ping localhost -n 5
                  4⤵
                  • Runs ping.exe
                  PID:5116
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 5 localhost
                3⤵
                • Runs ping.exe
                PID:3004

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consecutive.xlt

            Filesize

            911KB

            MD5

            edeb147ed5ab83077da8f26b5d525db2

            SHA1

            b7e74717d56be5d1572852931a4bc0bd664aec2d

            SHA256

            ef229f26b4546d45bf09166cd36fa32ba36d383d73ddb9cf20242958806faaea

            SHA512

            8f0a27d5683601e98b9fc7a67b99418dd587279c3fcdbb7c5ef9207d54a5af62231dd0381967c8230fed83cb0e1162177acba89970e06cac35bb882922c15d02

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Interactive.xlt

            Filesize

            11KB

            MD5

            4da0e2dba171f209f7d131e44ca9989d

            SHA1

            4f8e152fe000ce28392524f1a7ceed4e1cc03b74

            SHA256

            c1bc549292d3a347865bea2569d47b98b617137a953de9e631f422775de95745

            SHA512

            c936fa788856a90fac4037f6f5577457e631241bde2d79397fc3b18815bf146e3a28472758a15e745b8983c477a879261039a6926bef185967510b13d0e0d7ac

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Privileges.exe.pif

            Filesize

            924KB

            MD5

            6987e4cd3f256462f422326a7ef115b9

            SHA1

            71672a495b4603ecfec40a65254cb3ba8766bbe0

            SHA256

            3e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0

            SHA512

            4b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Weapons.xlt

            Filesize

            924KB

            MD5

            d543d0142bb7b8525bef0f174623107d

            SHA1

            403a36f5441d962f6439a8fb590f1257ffae0a0a

            SHA256

            3682a72ea6d0f665625fd40f2eb6b83da690ac591b1fbdab299f8ee0b0b2a7b1

            SHA512

            18f6123e05e2acef0456f4621f4710106aa8536c86db9891c2782984e7429f4e91cc9e029619cd53adcab1edee04e9836bc14a6e37bb204af3a60cf4ab4df071

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hjHvIhLe.dll

            Filesize

            1.6MB

            MD5

            4f3387277ccbd6d1f21ac5c07fe4ca68

            SHA1

            e16506f662dc92023bf82def1d621497c8ab5890

            SHA256

            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

            SHA512

            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

          • memory/880-159-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/880-166-0x0000000002DF0000-0x0000000002DF9000-memory.dmp

            Filesize

            36KB

          • memory/880-167-0x0000000002E20000-0x0000000002E2D000-memory.dmp

            Filesize

            52KB

          • memory/880-165-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/880-164-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB