Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2023 09:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
561KB
-
MD5
651230dae2c0dc316d24bcf5d999c001
-
SHA1
7e76383fa315e43e54e1f25ae4d72d550e208127
-
SHA256
fb5e26fb2c6209e4ec7ff82659fbdb03e68fe1adf088166cea4dc479af5ba151
-
SHA512
02c1f4bff17d72fccf04e3f21be9a5a387d43715780b985922032f3a656cc5ff233d40be9ff39449604cf47e41d33e273a4bd21b3042e1513b971339d1c11a62
-
SSDEEP
12288:41CCeUe/mB0Km1Tqy/y7R2upCFmg58ROh9YG2m7PHY:47eHmB0Km1Jy7RF8yRS9z2g/Y
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 2 IoCs
resource yara_rule behavioral2/memory/1212-146-0x0000000000980000-0x000000000098D000-memory.dmp family_lgoogloader behavioral2/memory/1212-147-0x0000000000980000-0x000000000098D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 980 set thread context of 1212 980 file.exe 102 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe 980 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 980 file.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 980 wrote to memory of 1180 980 file.exe 87 PID 980 wrote to memory of 1180 980 file.exe 87 PID 980 wrote to memory of 3892 980 file.exe 88 PID 980 wrote to memory of 3892 980 file.exe 88 PID 980 wrote to memory of 1984 980 file.exe 90 PID 980 wrote to memory of 1984 980 file.exe 90 PID 980 wrote to memory of 3752 980 file.exe 91 PID 980 wrote to memory of 3752 980 file.exe 91 PID 980 wrote to memory of 3880 980 file.exe 92 PID 980 wrote to memory of 3880 980 file.exe 92 PID 980 wrote to memory of 2968 980 file.exe 93 PID 980 wrote to memory of 2968 980 file.exe 93 PID 980 wrote to memory of 4732 980 file.exe 95 PID 980 wrote to memory of 4732 980 file.exe 95 PID 980 wrote to memory of 3696 980 file.exe 94 PID 980 wrote to memory of 3696 980 file.exe 94 PID 980 wrote to memory of 2984 980 file.exe 96 PID 980 wrote to memory of 2984 980 file.exe 96 PID 980 wrote to memory of 1252 980 file.exe 97 PID 980 wrote to memory of 1252 980 file.exe 97 PID 980 wrote to memory of 4280 980 file.exe 98 PID 980 wrote to memory of 4280 980 file.exe 98 PID 980 wrote to memory of 1520 980 file.exe 99 PID 980 wrote to memory of 1520 980 file.exe 99 PID 980 wrote to memory of 4148 980 file.exe 100 PID 980 wrote to memory of 4148 980 file.exe 100 PID 980 wrote to memory of 1828 980 file.exe 101 PID 980 wrote to memory of 1828 980 file.exe 101 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102 PID 980 wrote to memory of 1212 980 file.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:3892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:3752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:3880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:2968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:3696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:4732
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:4280
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:1520
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:4148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:1828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:1212
-