Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2023 18:17

General

  • Target

    file.exe

  • Size

    560KB

  • MD5

    d4072e3ede949196b3955963287de576

  • SHA1

    2588144e66ac20459431518c8b024f8f369fa28f

  • SHA256

    3ef51a4e47e46448877692e81f440cce4ef1544a8f755792817d93d7574c020d

  • SHA512

    ac38b4270d335351a4791db02073af1ab89e8b898371cc61a98b9209e61e550ecf96b023e6960572b4b827c12ba9840958520627e537fbaddf7f352e440e1533

  • SSDEEP

    12288:l4y6teYFfFLrx086LgDWcZWC5u8wGro0ThpDoA6z1VecLL:kV0lYub27oHz1wuL

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
        PID:316
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
        2⤵
          PID:680
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"
          2⤵
            PID:900
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
            2⤵
              PID:916
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
              2⤵
                PID:1656
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                2⤵
                  PID:1752
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                  2⤵
                    PID:1616
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                    2⤵
                      PID:1548
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                      2⤵
                        PID:980
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                        2⤵
                          PID:688
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                          2⤵
                            PID:1952
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
                            2⤵
                              PID:1200
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                              2⤵
                                PID:600
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                                2⤵
                                  PID:1500
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                                  2⤵
                                    PID:1148

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\Cab1789.tmp

                                  Filesize

                                  61KB

                                  MD5

                                  fc4666cbca561e864e7fdf883a9e6661

                                  SHA1

                                  2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                  SHA256

                                  10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                  SHA512

                                  c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                • C:\Users\Admin\AppData\Local\Temp\Tar17AC.tmp

                                  Filesize

                                  161KB

                                  MD5

                                  73b4b714b42fc9a6aaefd0ae59adb009

                                  SHA1

                                  efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

                                  SHA256

                                  c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

                                  SHA512

                                  73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

                                • memory/1148-95-0x0000000000400000-0x0000000000443000-memory.dmp

                                  Filesize

                                  268KB

                                • memory/1148-97-0x0000000000400000-0x0000000000443000-memory.dmp

                                  Filesize

                                  268KB

                                • memory/1148-98-0x00000000000F0000-0x00000000000F9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1148-99-0x0000000000190000-0x000000000019D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1336-54-0x0000000001190000-0x000000000121E000-memory.dmp

                                  Filesize

                                  568KB

                                • memory/1336-92-0x0000000001000000-0x0000000001084000-memory.dmp

                                  Filesize

                                  528KB

                                • memory/1336-93-0x0000000000A60000-0x0000000000AE0000-memory.dmp

                                  Filesize

                                  512KB