Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Had.exe
Resource
win7-20230621-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Had.exe
Resource
win10v2004-20230621-en
2 signatures
150 seconds
General
-
Target
Had.exe
-
Size
227KB
-
MD5
7e6a47fccc9516742ad7d6c6ef93ad1b
-
SHA1
08f58f51120d9a4ff9d28c479589c39ceac7dfe8
-
SHA256
e083a7c668754d455af09758334519bdff408dec3215a223b2b4f8d5e2344452
-
SHA512
f2c23cfce6e77a2e3be9b2b5de54241f0d8dcf67f7dd5a2a92850170ec4679d710582cc2f65130e119e7111b61b07d097fafaff2eca6634234e70403a805e6a7
-
SSDEEP
3072:Ns5HQet/vgLewZUFYdmJ4s6puer4V/HYl0N0CueDkbqfs4VawbmA7gucI97Q5jjV:C4UYkys+rm/HYcueYmThbHXrZuCNEn
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/3288-137-0x00000000024A0000-0x00000000024AD000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.