Analysis
-
max time kernel
82s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 11:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
50KB
-
MD5
9d846bb9fbd2e4ce0a2344b02d535e9c
-
SHA1
91bb1d20302d740b733d155bd42556038b900380
-
SHA256
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07
-
SHA512
bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596
-
SSDEEP
768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/5028-142-0x0000000001440000-0x000000000144D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1416 set thread context of 5028 1416 file.exe 94 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe 1416 file.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1416 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1416 file.exe Token: SeDebugPrivilege 1416 file.exe Token: SeLoadDriverPrivilege 1416 file.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1444 1416 file.exe 82 PID 1416 wrote to memory of 1444 1416 file.exe 82 PID 1416 wrote to memory of 3132 1416 file.exe 83 PID 1416 wrote to memory of 3132 1416 file.exe 83 PID 1416 wrote to memory of 3980 1416 file.exe 84 PID 1416 wrote to memory of 3980 1416 file.exe 84 PID 1416 wrote to memory of 3980 1416 file.exe 84 PID 1416 wrote to memory of 3252 1416 file.exe 85 PID 1416 wrote to memory of 3252 1416 file.exe 85 PID 1416 wrote to memory of 3208 1416 file.exe 86 PID 1416 wrote to memory of 3208 1416 file.exe 86 PID 1416 wrote to memory of 1420 1416 file.exe 87 PID 1416 wrote to memory of 1420 1416 file.exe 87 PID 1416 wrote to memory of 4888 1416 file.exe 88 PID 1416 wrote to memory of 4888 1416 file.exe 88 PID 1416 wrote to memory of 4960 1416 file.exe 89 PID 1416 wrote to memory of 4960 1416 file.exe 89 PID 1416 wrote to memory of 5052 1416 file.exe 90 PID 1416 wrote to memory of 5052 1416 file.exe 90 PID 1416 wrote to memory of 1220 1416 file.exe 91 PID 1416 wrote to memory of 1220 1416 file.exe 91 PID 1416 wrote to memory of 3848 1416 file.exe 92 PID 1416 wrote to memory of 3848 1416 file.exe 92 PID 1416 wrote to memory of 3844 1416 file.exe 93 PID 1416 wrote to memory of 3844 1416 file.exe 93 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94 PID 1416 wrote to memory of 5028 1416 file.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:1444
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:3132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:3980
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:3252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:3208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:1420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:4888
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:4960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:5052
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:1220
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:3844
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:5028
-