Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 12:48

General

  • Target

    tmp.exe

  • Size

    192KB

  • MD5

    6e7dc3a0c62291a2c49ceba66cdbd0fe

  • SHA1

    24f186b1ce2f12d6ccdf799eeeea082e8e66cc9d

  • SHA256

    fa9e1f5ee3d97f9ca641bfee616450dc924eaebf016c928f905d71897f92dbca

  • SHA512

    609ee9f7cd73151e2e0affaf2e536178e63beaaf954617577ecb5a2bb6d1a6297d29c82da6bd812b402584a750919778f163e35a4651499fc5697d7cf9905e2f

  • SSDEEP

    3072:+aY0LwJoqkCPyIrxC55WRx1PYhQnepnoXHgfi8qEzzAh0ISgF8Yd9eg+m45uOjN:+7jvxeQioXHT8qCzA5KYdAg+Drx

Score
10/10

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
      PID:1324

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1324-54-0x0000000000250000-0x0000000000259000-memory.dmp

      Filesize

      36KB

    • memory/1324-55-0x00000000003F0000-0x00000000003FD000-memory.dmp

      Filesize

      52KB