Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2023 11:31

General

  • Target

    dcffc23486ddb6873a0b9149092ddf77c737a018e06ff7638b60e06c06e57b59.exe

  • Size

    30KB

  • MD5

    2cec8b52f960c604e0d2abe39e984de3

  • SHA1

    296052155e7adab51195943bded45fce3a49a5e5

  • SHA256

    dcffc23486ddb6873a0b9149092ddf77c737a018e06ff7638b60e06c06e57b59

  • SHA512

    e27a82f73042a175245f00544dfc7dd358999b3bf66db42de67bdbf8ed8dbda09cd123a90e9b503e87667f9efed11d2109bd478370a37b19b1431f18992aa819

  • SSDEEP

    384:tP8qP946MVd4/ezNZUG9bxcz6MQ6B7LMQD6X4Fi1EU96B2Jq29N6a2QG3KUzVGlh:mq2VmA6BnOX4O968vXMGlBCjfUN3eYeU

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcffc23486ddb6873a0b9149092ddf77c737a018e06ff7638b60e06c06e57b59.exe
    "C:\Users\Admin\AppData\Local\Temp\dcffc23486ddb6873a0b9149092ddf77c737a018e06ff7638b60e06c06e57b59.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
      2⤵
        PID:1300
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
        2⤵
          PID:544
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
          2⤵
            PID:568
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
            2⤵
              PID:452
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"
              2⤵
                PID:628
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                2⤵
                  PID:4284
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                  2⤵
                    PID:1692
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                    2⤵
                      PID:1456
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                      2⤵
                        PID:1460
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                        2⤵
                          PID:1432
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
                          2⤵
                            PID:1448

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/1432-137-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1432-139-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1432-140-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/1432-142-0x0000000000A20000-0x0000000000A2D000-memory.dmp

                          Filesize

                          52KB

                        • memory/1432-141-0x0000000000A00000-0x0000000000A09000-memory.dmp

                          Filesize

                          36KB

                        • memory/2752-133-0x0000016C0A940000-0x0000016C0A94C000-memory.dmp

                          Filesize

                          48KB

                        • memory/2752-134-0x0000016C25500000-0x0000016C25A28000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/2752-135-0x0000016C24FC0000-0x0000016C24FD0000-memory.dmp

                          Filesize

                          64KB