Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-01-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
76f1eb1f2ab9d3b08c64c3e0ad2e5987
-
SHA1
41de28c9260f6bfe36694dbd4ff34513df76582c
-
SHA256
bc8560177aa43a687207e68c27c1c9378eb6fff83e61d279641c9256d79ea055
-
SHA512
4ed5c4623ce914afc17f998a8fa967e162e60e385dc42e776cf7fad2c5d0725b693e5b7edaf32f885ea8e392ea1d69687b91fd40ff481307de8c6bde3e811743
-
SSDEEP
12288:089OSEq88bJ4hUK30WDUj6JTHUZ5/OJ4KEnYWZqPBCAX2MiFbhhPFfXHHJvR4yJ4:TbKm80C6F07YgVW44hB1iOy
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/268-62-0x0000000000250000-0x000000000025D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 820 set thread context of 268 820 file.exe jsc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
file.exepid process 820 file.exe 820 file.exe 820 file.exe 820 file.exe 820 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
file.exepid process 820 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 820 file.exe Token: SeLoadDriverPrivilege 820 file.exe Token: SeDebugPrivilege 820 file.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
file.exedescription pid process target process PID 820 wrote to memory of 2036 820 file.exe RegAsm.exe PID 820 wrote to memory of 2036 820 file.exe RegAsm.exe PID 820 wrote to memory of 2036 820 file.exe RegAsm.exe PID 820 wrote to memory of 940 820 file.exe SMSvcHost.exe PID 820 wrote to memory of 940 820 file.exe SMSvcHost.exe PID 820 wrote to memory of 940 820 file.exe SMSvcHost.exe PID 820 wrote to memory of 1020 820 file.exe InstallUtil.exe PID 820 wrote to memory of 1020 820 file.exe InstallUtil.exe PID 820 wrote to memory of 1020 820 file.exe InstallUtil.exe PID 820 wrote to memory of 472 820 file.exe aspnet_state.exe PID 820 wrote to memory of 472 820 file.exe aspnet_state.exe PID 820 wrote to memory of 472 820 file.exe aspnet_state.exe PID 820 wrote to memory of 884 820 file.exe aspnet_wp.exe PID 820 wrote to memory of 884 820 file.exe aspnet_wp.exe PID 820 wrote to memory of 884 820 file.exe aspnet_wp.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe PID 820 wrote to memory of 268 820 file.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2036
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:940
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1020
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:472
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:884
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:268