Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 20:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
9 signatures
150 seconds
General
-
Target
file.exe
-
Size
30KB
-
MD5
2cec8b52f960c604e0d2abe39e984de3
-
SHA1
296052155e7adab51195943bded45fce3a49a5e5
-
SHA256
dcffc23486ddb6873a0b9149092ddf77c737a018e06ff7638b60e06c06e57b59
-
SHA512
e27a82f73042a175245f00544dfc7dd358999b3bf66db42de67bdbf8ed8dbda09cd123a90e9b503e87667f9efed11d2109bd478370a37b19b1431f18992aa819
-
SSDEEP
384:tP8qP946MVd4/ezNZUG9bxcz6MQ6B7LMQD6X4Fi1EU96B2Jq29N6a2QG3KUzVGlh:mq2VmA6BnOX4O968vXMGlBCjfUN3eYeU
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/5048-142-0x0000000001440000-0x000000000144D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 5048 2372 file.exe 111 -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe 2372 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2372 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2372 file.exe Token: SeDebugPrivilege 2372 file.exe Token: SeLoadDriverPrivilege 2372 file.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 332 2372 file.exe 83 PID 2372 wrote to memory of 332 2372 file.exe 83 PID 2372 wrote to memory of 1884 2372 file.exe 84 PID 2372 wrote to memory of 1884 2372 file.exe 84 PID 2372 wrote to memory of 3304 2372 file.exe 85 PID 2372 wrote to memory of 3304 2372 file.exe 85 PID 2372 wrote to memory of 2388 2372 file.exe 86 PID 2372 wrote to memory of 2388 2372 file.exe 86 PID 2372 wrote to memory of 2848 2372 file.exe 87 PID 2372 wrote to memory of 2848 2372 file.exe 87 PID 2372 wrote to memory of 896 2372 file.exe 88 PID 2372 wrote to memory of 896 2372 file.exe 88 PID 2372 wrote to memory of 400 2372 file.exe 89 PID 2372 wrote to memory of 400 2372 file.exe 89 PID 2372 wrote to memory of 2648 2372 file.exe 90 PID 2372 wrote to memory of 2648 2372 file.exe 90 PID 2372 wrote to memory of 2624 2372 file.exe 91 PID 2372 wrote to memory of 2624 2372 file.exe 91 PID 2372 wrote to memory of 2960 2372 file.exe 92 PID 2372 wrote to memory of 2960 2372 file.exe 92 PID 2372 wrote to memory of 4428 2372 file.exe 93 PID 2372 wrote to memory of 4428 2372 file.exe 93 PID 2372 wrote to memory of 1916 2372 file.exe 94 PID 2372 wrote to memory of 1916 2372 file.exe 94 PID 2372 wrote to memory of 2004 2372 file.exe 95 PID 2372 wrote to memory of 2004 2372 file.exe 95 PID 2372 wrote to memory of 3040 2372 file.exe 96 PID 2372 wrote to memory of 3040 2372 file.exe 96 PID 2372 wrote to memory of 4668 2372 file.exe 97 PID 2372 wrote to memory of 4668 2372 file.exe 97 PID 2372 wrote to memory of 1564 2372 file.exe 98 PID 2372 wrote to memory of 1564 2372 file.exe 98 PID 2372 wrote to memory of 1288 2372 file.exe 99 PID 2372 wrote to memory of 1288 2372 file.exe 99 PID 2372 wrote to memory of 4520 2372 file.exe 100 PID 2372 wrote to memory of 4520 2372 file.exe 100 PID 2372 wrote to memory of 3300 2372 file.exe 101 PID 2372 wrote to memory of 3300 2372 file.exe 101 PID 2372 wrote to memory of 3920 2372 file.exe 102 PID 2372 wrote to memory of 3920 2372 file.exe 102 PID 2372 wrote to memory of 3904 2372 file.exe 103 PID 2372 wrote to memory of 3904 2372 file.exe 103 PID 2372 wrote to memory of 4036 2372 file.exe 104 PID 2372 wrote to memory of 4036 2372 file.exe 104 PID 2372 wrote to memory of 3924 2372 file.exe 105 PID 2372 wrote to memory of 3924 2372 file.exe 105 PID 2372 wrote to memory of 3152 2372 file.exe 106 PID 2372 wrote to memory of 3152 2372 file.exe 106 PID 2372 wrote to memory of 3372 2372 file.exe 107 PID 2372 wrote to memory of 3372 2372 file.exe 107 PID 2372 wrote to memory of 3216 2372 file.exe 108 PID 2372 wrote to memory of 3216 2372 file.exe 108 PID 2372 wrote to memory of 3284 2372 file.exe 109 PID 2372 wrote to memory of 3284 2372 file.exe 109 PID 2372 wrote to memory of 3260 2372 file.exe 110 PID 2372 wrote to memory of 3260 2372 file.exe 110 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111 PID 2372 wrote to memory of 5048 2372 file.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:1884
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:3304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:2388
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:2848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:400
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2648
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:2960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:4428
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2004
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:1564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:1288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:4520
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:3920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:3904
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:4036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:3924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:3152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:3372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:3216
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:3284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:3260
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:5048
-