Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26-08-2023 00:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe
Resource
win10-20230703-en
4 signatures
150 seconds
General
-
Target
698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe
-
Size
538KB
-
MD5
ed75cea904ef453eef6c9920ce3c93b5
-
SHA1
c4413aa90f798fef7c178790599f9d3e64d6e614
-
SHA256
698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb
-
SHA512
a18d9dec591b0643497490b1b727a7ad9c83718bfde383356151c7142dec9996c4b5ea2b67e311778c872f051cb23a30349a463978f959efc4b6e0f8be307287
-
SSDEEP
12288:NbXdzhaf9b+sDwHsI0Z/xPs0gKTD2160PKe+QZpBG:nVafZ+QQsI03Ps0XTD6rTA
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral1/memory/2736-9-0x0000000000E20000-0x0000000000E2D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 192 set thread context of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70 PID 192 wrote to memory of 2736 192 698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe"C:\Users\Admin\AppData\Local\Temp\698d902b9552dad46b248acb1c6674a53ac14d7e90764f7d0a70f02e636cebeb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2736
-