Analysis

  • max time kernel
    137s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 12:07

General

  • Target

    Had.exe

  • Size

    227KB

  • MD5

    7e6a47fccc9516742ad7d6c6ef93ad1b

  • SHA1

    08f58f51120d9a4ff9d28c479589c39ceac7dfe8

  • SHA256

    e083a7c668754d455af09758334519bdff408dec3215a223b2b4f8d5e2344452

  • SHA512

    f2c23cfce6e77a2e3be9b2b5de54241f0d8dcf67f7dd5a2a92850170ec4679d710582cc2f65130e119e7111b61b07d097fafaff2eca6634234e70403a805e6a7

  • SSDEEP

    3072:Ns5HQet/vgLewZUFYdmJ4s6puer4V/HYl0N0CueDkbqfs4VawbmA7gucI97Q5jjV:C4UYkys+rm/HYcueYmThbHXrZuCNEn

Score
10/10

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Had.exe
    "C:\Users\Admin\AppData\Local\Temp\Had.exe"
    1⤵
      PID:3288

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3288-136-0x0000000002460000-0x0000000002469000-memory.dmp

      Filesize

      36KB

    • memory/3288-137-0x00000000024A0000-0x00000000024AD000-memory.dmp

      Filesize

      52KB