Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2023 11:19
Static task
static1
Behavioral task
behavioral1
Sample
194e670dffccd5785da26231d032e808.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
194e670dffccd5785da26231d032e808.exe
Resource
win10v2004-20230220-en
General
-
Target
194e670dffccd5785da26231d032e808.exe
-
Size
403KB
-
MD5
194e670dffccd5785da26231d032e808
-
SHA1
0a6ce468233b96041edc69330a0efa4b90194b4f
-
SHA256
e8483e9918697dc2fd3b4fc0fde38795851312dd38c1a6c83acdcaba47f8de7b
-
SHA512
935183ef75fd7acf057773d96b9e41ea419a2705afa21193b13b763655d8659db5be141aad210e0afa241036b0d0610444de40b68168ccf711059be14ad8c890
-
SSDEEP
3072:eZSUo1eprSwrXx0ooARRMkAHFIxobrvZkJv6SjaFvVmuLyRpPS68urGh3Lzs/vqq:enpNmooARiXCFT2Fp6SQaofZAC
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4112-142-0x0000000001650000-0x000000000165D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" 194e670dffccd5785da26231d032e808.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe 1176 194e670dffccd5785da26231d032e808.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1176 194e670dffccd5785da26231d032e808.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1176 194e670dffccd5785da26231d032e808.exe Token: SeDebugPrivilege 1176 194e670dffccd5785da26231d032e808.exe Token: SeLoadDriverPrivilege 1176 194e670dffccd5785da26231d032e808.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4456 1176 194e670dffccd5785da26231d032e808.exe 78 PID 1176 wrote to memory of 4456 1176 194e670dffccd5785da26231d032e808.exe 78 PID 1176 wrote to memory of 3148 1176 194e670dffccd5785da26231d032e808.exe 79 PID 1176 wrote to memory of 3148 1176 194e670dffccd5785da26231d032e808.exe 79 PID 1176 wrote to memory of 3300 1176 194e670dffccd5785da26231d032e808.exe 80 PID 1176 wrote to memory of 3300 1176 194e670dffccd5785da26231d032e808.exe 80 PID 1176 wrote to memory of 3896 1176 194e670dffccd5785da26231d032e808.exe 81 PID 1176 wrote to memory of 3896 1176 194e670dffccd5785da26231d032e808.exe 81 PID 1176 wrote to memory of 3892 1176 194e670dffccd5785da26231d032e808.exe 82 PID 1176 wrote to memory of 3892 1176 194e670dffccd5785da26231d032e808.exe 82 PID 1176 wrote to memory of 3364 1176 194e670dffccd5785da26231d032e808.exe 83 PID 1176 wrote to memory of 3364 1176 194e670dffccd5785da26231d032e808.exe 83 PID 1176 wrote to memory of 3840 1176 194e670dffccd5785da26231d032e808.exe 84 PID 1176 wrote to memory of 3840 1176 194e670dffccd5785da26231d032e808.exe 84 PID 1176 wrote to memory of 3996 1176 194e670dffccd5785da26231d032e808.exe 85 PID 1176 wrote to memory of 3996 1176 194e670dffccd5785da26231d032e808.exe 85 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86 PID 1176 wrote to memory of 4112 1176 194e670dffccd5785da26231d032e808.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\194e670dffccd5785da26231d032e808.exe"C:\Users\Admin\AppData\Local\Temp\194e670dffccd5785da26231d032e808.exe"1⤵
- Sets service image path in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:4456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:3148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:3896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:3892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:3364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3840
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:3996
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:4112
-