Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-01-2023 10:00
Static task
static1
Behavioral task
behavioral1
Sample
35d19a9ba44fa423cb90f734f53de2aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35d19a9ba44fa423cb90f734f53de2aa.exe
Resource
win10v2004-20221111-en
General
-
Target
35d19a9ba44fa423cb90f734f53de2aa.exe
-
Size
1.3MB
-
MD5
35d19a9ba44fa423cb90f734f53de2aa
-
SHA1
104f7b53b01d3b6a7ff871b51057c3193b431a23
-
SHA256
bf9cbad13935f939f44add9a131188c73e3dda014e039debc553ebacab228d83
-
SHA512
e85c53d709977ff9f17abcbb48f02d72b8792be4393b10146f983c325c8d023d439372fb448c27ca60eb58f70c6e7139581b059d06edcb25dbfe8abcf63f5a25
-
SSDEEP
12288:yy7iK8b0X+aOAQhWL+Yr0+Et5iV4mSKj7+QHa+ZGJ8/83tPAjb5nZK0cfCoA8rKD:wXKhC8sPsbnaAmsVkonYyd3h
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1288-62-0x00000000000D0000-0x00000000000DD000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 35d19a9ba44fa423cb90f734f53de2aa.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exedescription pid process target process PID 1760 set thread context of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exepid process 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe 1760 35d19a9ba44fa423cb90f734f53de2aa.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exepid process 1760 35d19a9ba44fa423cb90f734f53de2aa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exedescription pid process Token: SeDebugPrivilege 1760 35d19a9ba44fa423cb90f734f53de2aa.exe Token: SeLoadDriverPrivilege 1760 35d19a9ba44fa423cb90f734f53de2aa.exe Token: SeDebugPrivilege 1760 35d19a9ba44fa423cb90f734f53de2aa.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
35d19a9ba44fa423cb90f734f53de2aa.exedescription pid process target process PID 1760 wrote to memory of 1740 1760 35d19a9ba44fa423cb90f734f53de2aa.exe EdmGen.exe PID 1760 wrote to memory of 1740 1760 35d19a9ba44fa423cb90f734f53de2aa.exe EdmGen.exe PID 1760 wrote to memory of 1740 1760 35d19a9ba44fa423cb90f734f53de2aa.exe EdmGen.exe PID 1760 wrote to memory of 980 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ngen.exe PID 1760 wrote to memory of 980 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ngen.exe PID 1760 wrote to memory of 980 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ngen.exe PID 1760 wrote to memory of 948 1760 35d19a9ba44fa423cb90f734f53de2aa.exe RegSvcs.exe PID 1760 wrote to memory of 948 1760 35d19a9ba44fa423cb90f734f53de2aa.exe RegSvcs.exe PID 1760 wrote to memory of 948 1760 35d19a9ba44fa423cb90f734f53de2aa.exe RegSvcs.exe PID 1760 wrote to memory of 1492 1760 35d19a9ba44fa423cb90f734f53de2aa.exe dfsvc.exe PID 1760 wrote to memory of 1492 1760 35d19a9ba44fa423cb90f734f53de2aa.exe dfsvc.exe PID 1760 wrote to memory of 1492 1760 35d19a9ba44fa423cb90f734f53de2aa.exe dfsvc.exe PID 1760 wrote to memory of 1488 1760 35d19a9ba44fa423cb90f734f53de2aa.exe InstallUtil.exe PID 1760 wrote to memory of 1488 1760 35d19a9ba44fa423cb90f734f53de2aa.exe InstallUtil.exe PID 1760 wrote to memory of 1488 1760 35d19a9ba44fa423cb90f734f53de2aa.exe InstallUtil.exe PID 1760 wrote to memory of 1540 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regiis.exe PID 1760 wrote to memory of 1540 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regiis.exe PID 1760 wrote to memory of 1540 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regiis.exe PID 1760 wrote to memory of 1756 1760 35d19a9ba44fa423cb90f734f53de2aa.exe jsc.exe PID 1760 wrote to memory of 1756 1760 35d19a9ba44fa423cb90f734f53de2aa.exe jsc.exe PID 1760 wrote to memory of 1756 1760 35d19a9ba44fa423cb90f734f53de2aa.exe jsc.exe PID 1760 wrote to memory of 1756 1760 35d19a9ba44fa423cb90f734f53de2aa.exe jsc.exe PID 1760 wrote to memory of 1328 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ServiceModelReg.exe PID 1760 wrote to memory of 1328 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ServiceModelReg.exe PID 1760 wrote to memory of 1328 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ServiceModelReg.exe PID 1760 wrote to memory of 1312 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regbrowsers.exe PID 1760 wrote to memory of 1312 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regbrowsers.exe PID 1760 wrote to memory of 1312 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_regbrowsers.exe PID 1760 wrote to memory of 1444 1760 35d19a9ba44fa423cb90f734f53de2aa.exe mscorsvw.exe PID 1760 wrote to memory of 1444 1760 35d19a9ba44fa423cb90f734f53de2aa.exe mscorsvw.exe PID 1760 wrote to memory of 1444 1760 35d19a9ba44fa423cb90f734f53de2aa.exe mscorsvw.exe PID 1760 wrote to memory of 1476 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_state.exe PID 1760 wrote to memory of 1476 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_state.exe PID 1760 wrote to memory of 1476 1760 35d19a9ba44fa423cb90f734f53de2aa.exe aspnet_state.exe PID 1760 wrote to memory of 1720 1760 35d19a9ba44fa423cb90f734f53de2aa.exe DataSvcUtil.exe PID 1760 wrote to memory of 1720 1760 35d19a9ba44fa423cb90f734f53de2aa.exe DataSvcUtil.exe PID 1760 wrote to memory of 1720 1760 35d19a9ba44fa423cb90f734f53de2aa.exe DataSvcUtil.exe PID 1760 wrote to memory of 1332 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ComSvcConfig.exe PID 1760 wrote to memory of 1332 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ComSvcConfig.exe PID 1760 wrote to memory of 1332 1760 35d19a9ba44fa423cb90f734f53de2aa.exe ComSvcConfig.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe PID 1760 wrote to memory of 1288 1760 35d19a9ba44fa423cb90f734f53de2aa.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d19a9ba44fa423cb90f734f53de2aa.exe"C:\Users\Admin\AppData\Local\Temp\35d19a9ba44fa423cb90f734f53de2aa.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:1740
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:980
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:948
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:1492
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1488
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:1540
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:1756
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:1328
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:1312
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1444
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:1476
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1720
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:1332
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:1288