Analysis
-
max time kernel
127s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2023 12:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
8cc5e4b790ca6dbd8042b00ef47343b8
-
SHA1
977960d16c18c0e2944d7ac6e9641f9a85ff5fe4
-
SHA256
53af5fe3b8955c9975a05b1607e5dd7fafdc4eb5b23c44b04e40e073f9ac7f99
-
SHA512
e7d3ef3fd25721e966e800ab618cfe224e4edbb2d9f0103da45709097d41879692791705aa6c457ed3e30381686b8b302862ef17074f6a3ee7ea6ddb13de8570
-
SSDEEP
12288:U8nE71zd/89j+/UgZZMzuab9HO4rdpWz67pc8TO3/iCO8hsiS0vOUw0ZT9avvqpt:I1dLuua5BLzDgqYLqoa9wascTwwTb3mD
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4664-140-0x0000000001210000-0x000000000121D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 5020 set thread context of 4664 5020 file.exe jsc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
file.exepid process 5020 file.exe 5020 file.exe 5020 file.exe 5020 file.exe 5020 file.exe 5020 file.exe 5020 file.exe 5020 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
file.exepid process 5020 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 5020 file.exe Token: SeLoadDriverPrivilege 5020 file.exe Token: SeDebugPrivilege 5020 file.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
file.exedescription pid process target process PID 5020 wrote to memory of 4244 5020 file.exe WsatConfig.exe PID 5020 wrote to memory of 4244 5020 file.exe WsatConfig.exe PID 5020 wrote to memory of 444 5020 file.exe aspnet_wp.exe PID 5020 wrote to memory of 444 5020 file.exe aspnet_wp.exe PID 5020 wrote to memory of 3896 5020 file.exe AppLaunch.exe PID 5020 wrote to memory of 3896 5020 file.exe AppLaunch.exe PID 5020 wrote to memory of 4112 5020 file.exe ComSvcConfig.exe PID 5020 wrote to memory of 4112 5020 file.exe ComSvcConfig.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe PID 5020 wrote to memory of 4664 5020 file.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:4244
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:444
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3896
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:4112
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:4664