Resubmissions

30-08-2023 08:39

230830-kkpstsdg7v 10

28-09-2022 16:23

220928-tv38msged4 8

Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2023 08:39

General

  • Target

    61fc044a34211_Thu167fb182622.exe

  • Size

    879KB

  • MD5

    cc722fd0bd387cf472350dc2dd7ddd1e

  • SHA1

    49d288ddbb09265a586dd8d6629c130be7063afa

  • SHA256

    588a87d450987dfb3a72361c012b36285a5b3087cc8c282b6f2de46ae95291f2

  • SHA512

    893375a8816bc333a9521b50d26b4018d1a3181b502dac73cef3357755651d833744a42bfd7f2daeb6e15d420600b91cdb910a0a1fb1a28d5012697a1f92733b

  • SSDEEP

    24576:S88Sk1iPd8yvsuKbzMBpyZELPSqEZU9g+Aua:xlWiFxEuKbooZyPSqEZU9g7

Malware Config

Signatures

  • Detects LgoogLoader payload 2 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61fc044a34211_Thu167fb182622.exe
    "C:\Users\Admin\AppData\Local\Temp\61fc044a34211_Thu167fb182622.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cmd < Esistenza.wbk
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "imagename eq BullGuardCore.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1804
        • C:\Windows\SysWOW64\find.exe
          find /I /N "bullguardcore.exe"
          4⤵
            PID:4620
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^tDPdzRbUMNXkpbEMSMKZXPerlnGmckXJGXqJvnomwNbPoElbkyeDIDcfALyUkXmAQhFkvUdzDkXpshUFgogfpxwrCLpKzhhtgXYVZZwdO$" Impaziente.wbk
            4⤵
              PID:3640
            • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif
              Sul.exe.pif J
              4⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:468
              • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif
                C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif J
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:4484
                • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif
                  C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif
                  6⤵
                  • Executes dropped EXE
                  PID:1436
            • C:\Windows\SysWOW64\waitfor.exe
              waitfor /t 10 citDNEKXehVmhlzMlgdNbKGouCJxkZjiUQRiy
              4⤵
                PID:3620
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32
            2⤵
              PID:2868

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Esistenza.wbk

            Filesize

            620B

            MD5

            b2a2f85b4201446b23a250f68051b4dc

            SHA1

            8fc39fbfb341e55a6fda1ef3e0cfd25b2b8fdba5

            SHA256

            910165a85877eca36cb0e43aac5a42b643627aa7de90676cbdefcbf32fba4ade

            SHA512

            188b1ec9f2be6994de6e74f2385b3e0849968324cca1787b237d4eef381c9ffadc2c34c3f3131026d0ec1f89da6563455fe3f3d315d7d4673d303c38b2d0d32c

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Impaziente.wbk

            Filesize

            872KB

            MD5

            662676b6ae749090c43a0c5507b16131

            SHA1

            0aec9044c592c79aa2a44f66b73ed0c5cb62fd68

            SHA256

            4dd868c3015b92c1b8b520c0459c952090e08b4ba8d81d259e1b0630156dada4

            SHA512

            ec363e232c544f904286831f19bcc20ec0180da0e28bb2480eeccfaac7b4722e9ae5f050fec4fb7de18f6b35092e1296fd8e62022daa0b583eaba8fc4ea253f4

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\J

            Filesize

            855KB

            MD5

            4008d7f17a08efd3fbd18e4e1ba29e00

            SHA1

            53e25946589981cb36b0e9fb5b26fc334d4f9424

            SHA256

            752cf7d34bc7433f590cdf45e0bb3922ca7ba2220a7ec09df7f1f6c9644dee3b

            SHA512

            39e2bfad68403808924cece9c6ab43b0dc4aada62850a8c70b8e9481d825bcc90fa8a91688e3b559d4e5a517bc21931cef8037d585063885d5c948809d961978

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Riflettere.wbk

            Filesize

            855KB

            MD5

            4008d7f17a08efd3fbd18e4e1ba29e00

            SHA1

            53e25946589981cb36b0e9fb5b26fc334d4f9424

            SHA256

            752cf7d34bc7433f590cdf45e0bb3922ca7ba2220a7ec09df7f1f6c9644dee3b

            SHA512

            39e2bfad68403808924cece9c6ab43b0dc4aada62850a8c70b8e9481d825bcc90fa8a91688e3b559d4e5a517bc21931cef8037d585063885d5c948809d961978

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif

            Filesize

            872KB

            MD5

            ce2797f5c8d43d08a41645d706569d22

            SHA1

            f8b412bc15829da6e4f16b89112bd67076481424

            SHA256

            fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075

            SHA512

            ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif

            Filesize

            872KB

            MD5

            ce2797f5c8d43d08a41645d706569d22

            SHA1

            f8b412bc15829da6e4f16b89112bd67076481424

            SHA256

            fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075

            SHA512

            ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif

            Filesize

            872KB

            MD5

            ce2797f5c8d43d08a41645d706569d22

            SHA1

            f8b412bc15829da6e4f16b89112bd67076481424

            SHA256

            fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075

            SHA512

            ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9

          • C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif

            Filesize

            872KB

            MD5

            ce2797f5c8d43d08a41645d706569d22

            SHA1

            f8b412bc15829da6e4f16b89112bd67076481424

            SHA256

            fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075

            SHA512

            ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9

          • memory/1436-23-0x0000000000DA0000-0x0000000000DA9000-memory.dmp

            Filesize

            36KB

          • memory/1436-24-0x0000000002580000-0x000000000258D000-memory.dmp

            Filesize

            52KB

          • memory/1436-25-0x0000000002580000-0x000000000258D000-memory.dmp

            Filesize

            52KB