Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 10:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
566KB
-
MD5
1fb683c2cb13d0160e37f9d0eefda008
-
SHA1
2ffc6cba8b6b53a4887f2025f6e0fed1a11498c3
-
SHA256
6527532bbe4765f402505e48290b20b7a4b450be6b6cc8aa7ddfeabd72f27ae5
-
SHA512
0410ffb98098d79fca09efcdc8a6a2620436d75d99396d90b304005c8d4db8d4c273d5c0e767609e4112ba53a9fde6be2ef71498c240738170901fa5adae6767
-
SSDEEP
12288:JXA9Z69M3k42ibcovVNBLMTyBkLYqz5OKzhILblfTV:XvTyBk0qzQKzcb1x
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral1/memory/2072-65-0x0000000000110000-0x000000000011D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2072 2204 file.exe 42 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe 2204 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 file.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2592 2204 file.exe 30 PID 2204 wrote to memory of 2592 2204 file.exe 30 PID 2204 wrote to memory of 2592 2204 file.exe 30 PID 2204 wrote to memory of 1928 2204 file.exe 31 PID 2204 wrote to memory of 1928 2204 file.exe 31 PID 2204 wrote to memory of 1928 2204 file.exe 31 PID 2204 wrote to memory of 1460 2204 file.exe 32 PID 2204 wrote to memory of 1460 2204 file.exe 32 PID 2204 wrote to memory of 1460 2204 file.exe 32 PID 2204 wrote to memory of 1540 2204 file.exe 33 PID 2204 wrote to memory of 1540 2204 file.exe 33 PID 2204 wrote to memory of 1540 2204 file.exe 33 PID 2204 wrote to memory of 2264 2204 file.exe 34 PID 2204 wrote to memory of 2264 2204 file.exe 34 PID 2204 wrote to memory of 2264 2204 file.exe 34 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2348 2204 file.exe 35 PID 2204 wrote to memory of 2096 2204 file.exe 36 PID 2204 wrote to memory of 2096 2204 file.exe 36 PID 2204 wrote to memory of 2096 2204 file.exe 36 PID 2204 wrote to memory of 1104 2204 file.exe 37 PID 2204 wrote to memory of 1104 2204 file.exe 37 PID 2204 wrote to memory of 1104 2204 file.exe 37 PID 2204 wrote to memory of 2312 2204 file.exe 38 PID 2204 wrote to memory of 2312 2204 file.exe 38 PID 2204 wrote to memory of 2312 2204 file.exe 38 PID 2204 wrote to memory of 2512 2204 file.exe 39 PID 2204 wrote to memory of 2512 2204 file.exe 39 PID 2204 wrote to memory of 2512 2204 file.exe 39 PID 2204 wrote to memory of 2436 2204 file.exe 40 PID 2204 wrote to memory of 2436 2204 file.exe 40 PID 2204 wrote to memory of 2436 2204 file.exe 40 PID 2204 wrote to memory of 1200 2204 file.exe 41 PID 2204 wrote to memory of 1200 2204 file.exe 41 PID 2204 wrote to memory of 1200 2204 file.exe 41 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42 PID 2204 wrote to memory of 2072 2204 file.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:2592
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:1928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:1460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:1540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"2⤵PID:2348
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:2096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:1104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:2312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:2512
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2436
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:1200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:2072
-