Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2023 20:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.0MB
-
MD5
d1a1c0cec984bdafdb412d42f159f816
-
SHA1
06d4c6cde7311fe0bcbd25bf85b04ec249277780
-
SHA256
97b357375a52567547a6b5f537d6cccafcf3217fdad3024ea2d654795539bdbd
-
SHA512
eb267b0a2a8228a2a8cd7f7cd8e5f4fb58d2a83ee373ecb729476301f48a82339e8e44957d00ab4fb4adbbb744df7aa8ba489cfa2d3b163f32ad8605c253c6ef
-
SSDEEP
49152:YzNVaV444444444444444444444444444444444444444444444444444444444H:Yzhok8y9vWn3Z3r9Weg
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-142-0x0000000000EE0000-0x0000000000EED000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 4084 set thread context of 4856 4084 file.exe ngentask.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3276 4084 WerFault.exe file.exe 4248 4084 WerFault.exe file.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
file.exepid process 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe 4084 file.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
file.exedescription pid process target process PID 4084 wrote to memory of 4856 4084 file.exe ngentask.exe PID 4084 wrote to memory of 4856 4084 file.exe ngentask.exe PID 4084 wrote to memory of 4856 4084 file.exe ngentask.exe PID 4084 wrote to memory of 4856 4084 file.exe ngentask.exe PID 4084 wrote to memory of 4856 4084 file.exe ngentask.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 11082⤵
- Program crash
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 12562⤵
- Program crash
PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4084 -ip 40841⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4084 -ip 40841⤵PID:1308