Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2023 18:17

General

  • Target

    file.exe

  • Size

    560KB

  • MD5

    d4072e3ede949196b3955963287de576

  • SHA1

    2588144e66ac20459431518c8b024f8f369fa28f

  • SHA256

    3ef51a4e47e46448877692e81f440cce4ef1544a8f755792817d93d7574c020d

  • SHA512

    ac38b4270d335351a4791db02073af1ab89e8b898371cc61a98b9209e61e550ecf96b023e6960572b4b827c12ba9840958520627e537fbaddf7f352e440e1533

  • SSDEEP

    12288:l4y6teYFfFLrx086LgDWcZWC5u8wGro0ThpDoA6z1VecLL:kV0lYub27oHz1wuL

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
      2⤵
        PID:612
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
        2⤵
          PID:1056
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
          2⤵
            PID:3228
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"
            2⤵
              PID:1048
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
              2⤵
                PID:3872
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                2⤵
                  PID:556
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                  2⤵
                    PID:2172
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
                    2⤵
                      PID:3828
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                      2⤵
                        PID:3460

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1740-133-0x000002037C8E0000-0x000002037C96E000-memory.dmp

                      Filesize

                      568KB

                    • memory/1740-136-0x0000020318480000-0x0000020318490000-memory.dmp

                      Filesize

                      64KB

                    • memory/3460-138-0x0000000000400000-0x0000000000443000-memory.dmp

                      Filesize

                      268KB

                    • memory/3460-140-0x0000000000400000-0x0000000000443000-memory.dmp

                      Filesize

                      268KB

                    • memory/3460-141-0x0000000000400000-0x0000000000443000-memory.dmp

                      Filesize

                      268KB

                    • memory/3460-142-0x0000000000F00000-0x0000000000F09000-memory.dmp

                      Filesize

                      36KB

                    • memory/3460-143-0x0000000001060000-0x000000000106D000-memory.dmp

                      Filesize

                      52KB