Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-01-2023 12:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
8cc5e4b790ca6dbd8042b00ef47343b8
-
SHA1
977960d16c18c0e2944d7ac6e9641f9a85ff5fe4
-
SHA256
53af5fe3b8955c9975a05b1607e5dd7fafdc4eb5b23c44b04e40e073f9ac7f99
-
SHA512
e7d3ef3fd25721e966e800ab618cfe224e4edbb2d9f0103da45709097d41879692791705aa6c457ed3e30381686b8b302862ef17074f6a3ee7ea6ddb13de8570
-
SSDEEP
12288:U8nE71zd/89j+/UgZZMzuab9HO4rdpWz67pc8TO3/iCO8hsiS0vOUw0ZT9avvqpt:I1dLuua5BLzDgqYLqoa9wascTwwTb3mD
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/268-62-0x0000000000100000-0x000000000010D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 940 set thread context of 268 940 file.exe jsc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
file.exepid process 940 file.exe 940 file.exe 940 file.exe 940 file.exe 940 file.exe 940 file.exe 940 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
file.exepid process 940 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 940 file.exe Token: SeLoadDriverPrivilege 940 file.exe Token: SeDebugPrivilege 940 file.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
file.exedescription pid process target process PID 940 wrote to memory of 844 940 file.exe Microsoft.Workflow.Compiler.exe PID 940 wrote to memory of 844 940 file.exe Microsoft.Workflow.Compiler.exe PID 940 wrote to memory of 844 940 file.exe Microsoft.Workflow.Compiler.exe PID 940 wrote to memory of 1816 940 file.exe AppLaunch.exe PID 940 wrote to memory of 1816 940 file.exe AppLaunch.exe PID 940 wrote to memory of 1816 940 file.exe AppLaunch.exe PID 940 wrote to memory of 2044 940 file.exe aspnet_regsql.exe PID 940 wrote to memory of 2044 940 file.exe aspnet_regsql.exe PID 940 wrote to memory of 2044 940 file.exe aspnet_regsql.exe PID 940 wrote to memory of 2008 940 file.exe regtlibv12.exe PID 940 wrote to memory of 2008 940 file.exe regtlibv12.exe PID 940 wrote to memory of 2008 940 file.exe regtlibv12.exe PID 940 wrote to memory of 1176 940 file.exe RegAsm.exe PID 940 wrote to memory of 1176 940 file.exe RegAsm.exe PID 940 wrote to memory of 1176 940 file.exe RegAsm.exe PID 940 wrote to memory of 1852 940 file.exe DataSvcUtil.exe PID 940 wrote to memory of 1852 940 file.exe DataSvcUtil.exe PID 940 wrote to memory of 1852 940 file.exe DataSvcUtil.exe PID 940 wrote to memory of 728 940 file.exe WsatConfig.exe PID 940 wrote to memory of 728 940 file.exe WsatConfig.exe PID 940 wrote to memory of 728 940 file.exe WsatConfig.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe PID 940 wrote to memory of 268 940 file.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:844
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:1816
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:2044
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"2⤵PID:2008
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:1176
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1852
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:728
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:268