Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 11:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
50KB
-
MD5
9d846bb9fbd2e4ce0a2344b02d535e9c
-
SHA1
91bb1d20302d740b733d155bd42556038b900380
-
SHA256
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07
-
SHA512
bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596
-
SSDEEP
768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral1/memory/336-62-0x0000000000270000-0x000000000027D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 336 904 file.exe 33 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe 904 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 904 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 904 file.exe Token: SeDebugPrivilege 904 file.exe Token: SeLoadDriverPrivilege 904 file.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 904 wrote to memory of 1068 904 file.exe 27 PID 904 wrote to memory of 1068 904 file.exe 27 PID 904 wrote to memory of 1068 904 file.exe 27 PID 904 wrote to memory of 1720 904 file.exe 28 PID 904 wrote to memory of 1720 904 file.exe 28 PID 904 wrote to memory of 1720 904 file.exe 28 PID 904 wrote to memory of 852 904 file.exe 29 PID 904 wrote to memory of 852 904 file.exe 29 PID 904 wrote to memory of 852 904 file.exe 29 PID 904 wrote to memory of 1392 904 file.exe 30 PID 904 wrote to memory of 1392 904 file.exe 30 PID 904 wrote to memory of 1392 904 file.exe 30 PID 904 wrote to memory of 1944 904 file.exe 31 PID 904 wrote to memory of 1944 904 file.exe 31 PID 904 wrote to memory of 1944 904 file.exe 31 PID 904 wrote to memory of 1396 904 file.exe 32 PID 904 wrote to memory of 1396 904 file.exe 32 PID 904 wrote to memory of 1396 904 file.exe 32 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33 PID 904 wrote to memory of 336 904 file.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:1720
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:1392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:1944
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:1396
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:336
-