Analysis
-
max time kernel
55s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/01/2023, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe
-
Size
1.9MB
-
MD5
966a5f0a7b3e96d37553e3d610a1ca06
-
SHA1
7c1f6841e0327320eb0ef2100bfd8ffe3e30813d
-
SHA256
a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9
-
SHA512
64faddde8416ce609a9a796b55a350c6d58f33a383c2b130e67a9dfa59514e68522bc18d2dacfe8446da2d16cf3f74a32d0f864db455c6174942199a9dd2d6f7
-
SSDEEP
49152:hdWMqICxUilUYX2UkjYQyYlwTMKuHEuqr:hYIUtkjYQZCMKOU
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral1/memory/4564-212-0x0000000000EF0000-0x0000000000EFD000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66 -
Program crash 1 IoCs
pid pid_target Process procid_target 3632 1968 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66 PID 1968 wrote to memory of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66 PID 1968 wrote to memory of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66 PID 1968 wrote to memory of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66 PID 1968 wrote to memory of 4564 1968 a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe"C:\Users\Admin\AppData\Local\Temp\a0d5541207037da42fb775802def799429d666a0fd52bb034e825afa2c1a51e9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 11562⤵
- Program crash
PID:3632
-