Analysis
-
max time kernel
65s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2023 05:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
b859b990ea2adae467e0080aacdfabe5
-
SHA1
7e206519519d72bf49efbc272d70a4785e282808
-
SHA256
9146cee3d387cb3d665885b95d885734541f281cbb2a4726b6a59df922a83ee7
-
SHA512
f61c6e20793461f1a2dac2bd77561518a42010537011026ff406fe03fba0c0148244eb6f5f6ffe55d1f07cd5c21f1f8a898c9302720d9513cb5f606d6022a262
-
SSDEEP
24576:MOYvJhKAX4PP/6E4OZO/1fURAGVaugrgvuy5KR4LzkKGAWO1ObUKdkES/ip:MJuAoPngIO/efaJ0LKAkYg8ES/ip
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/672-143-0x0000000001430000-0x000000000143D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
file.exedescription pid process target process PID 4796 created 2876 4796 file.exe taskhostw.exe -
Loads dropped DLL 1 IoCs
Processes:
file.exepid process 4796 file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
fontview.exepid process 1516 fontview.exe 1516 fontview.exe 1516 fontview.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 4796 set thread context of 672 4796 file.exe ngentask.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3080 4796 WerFault.exe file.exe 3884 4796 WerFault.exe file.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fontview.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 fontview.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID fontview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
file.exepid process 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe 4796 file.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fontview.exedescription pid process Token: SeShutdownPrivilege 1516 fontview.exe Token: SeCreatePagefilePrivilege 1516 fontview.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exedescription pid process target process PID 4796 wrote to memory of 4088 4796 file.exe ngentask.exe PID 4796 wrote to memory of 4088 4796 file.exe ngentask.exe PID 4796 wrote to memory of 4088 4796 file.exe ngentask.exe PID 4796 wrote to memory of 672 4796 file.exe ngentask.exe PID 4796 wrote to memory of 672 4796 file.exe ngentask.exe PID 4796 wrote to memory of 672 4796 file.exe ngentask.exe PID 4796 wrote to memory of 672 4796 file.exe ngentask.exe PID 4796 wrote to memory of 672 4796 file.exe ngentask.exe PID 4796 wrote to memory of 1516 4796 file.exe fontview.exe PID 4796 wrote to memory of 1516 4796 file.exe fontview.exe PID 4796 wrote to memory of 1516 4796 file.exe fontview.exe PID 4796 wrote to memory of 1516 4796 file.exe fontview.exe
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2876
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:4088
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 12682⤵
- Program crash
PID:3080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 12762⤵
- Program crash
PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4796 -ip 47961⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4796 -ip 47961⤵PID:4316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD5acf51213c2e0b564c28cf0db859c9e38
SHA10ec6d956dd0299a8d26bd4671af11c9c3fbe2ca0
SHA256643044a62d07c6725a73bce3ee702ad0c15f0fe332165821c5e7f73937f898b7
SHA51215f30f50afdc2838ebdc4f38199f9857c1b9bc43350588abed404dcaef039698a2533dd5c074d2bfc88448a578c2202c033073592a9c551f7a7e4d263e293eed