Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 08:39
Static task
static1
Behavioral task
behavioral1
Sample
61fc044a34211_Thu167fb182622.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
61fc044a34211_Thu167fb182622.exe
Resource
win10v2004-20230703-en
General
-
Target
61fc044a34211_Thu167fb182622.exe
-
Size
879KB
-
MD5
cc722fd0bd387cf472350dc2dd7ddd1e
-
SHA1
49d288ddbb09265a586dd8d6629c130be7063afa
-
SHA256
588a87d450987dfb3a72361c012b36285a5b3087cc8c282b6f2de46ae95291f2
-
SHA512
893375a8816bc333a9521b50d26b4018d1a3181b502dac73cef3357755651d833744a42bfd7f2daeb6e15d420600b91cdb910a0a1fb1a28d5012697a1f92733b
-
SSDEEP
24576:S88Sk1iPd8yvsuKbzMBpyZELPSqEZU9g+Aua:xlWiFxEuKbooZyPSqEZU9g7
Malware Config
Signatures
-
Detects LgoogLoader payload 2 IoCs
resource yara_rule behavioral2/memory/1436-24-0x0000000002580000-0x000000000258D000-memory.dmp family_lgoogloader behavioral2/memory/1436-25-0x0000000002580000-0x000000000258D000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Executes dropped EXE 3 IoCs
pid Process 468 Sul.exe.pif 4484 Sul.exe.pif 1436 Sul.exe.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QWE00000.gol\\\"" 61fc044a34211_Thu167fb182622.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4484 set thread context of 1436 4484 Sul.exe.pif 100 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1804 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 468 Sul.exe.pif 468 Sul.exe.pif 468 Sul.exe.pif 4484 Sul.exe.pif 4484 Sul.exe.pif 4484 Sul.exe.pif -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 468 Sul.exe.pif 468 Sul.exe.pif 468 Sul.exe.pif 4484 Sul.exe.pif 4484 Sul.exe.pif 4484 Sul.exe.pif -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3772 4748 61fc044a34211_Thu167fb182622.exe 81 PID 4748 wrote to memory of 3772 4748 61fc044a34211_Thu167fb182622.exe 81 PID 4748 wrote to memory of 3772 4748 61fc044a34211_Thu167fb182622.exe 81 PID 3772 wrote to memory of 2616 3772 cmd.exe 83 PID 3772 wrote to memory of 2616 3772 cmd.exe 83 PID 3772 wrote to memory of 2616 3772 cmd.exe 83 PID 2616 wrote to memory of 1804 2616 cmd.exe 84 PID 2616 wrote to memory of 1804 2616 cmd.exe 84 PID 2616 wrote to memory of 1804 2616 cmd.exe 84 PID 2616 wrote to memory of 4620 2616 cmd.exe 85 PID 2616 wrote to memory of 4620 2616 cmd.exe 85 PID 2616 wrote to memory of 4620 2616 cmd.exe 85 PID 2616 wrote to memory of 3640 2616 cmd.exe 87 PID 2616 wrote to memory of 3640 2616 cmd.exe 87 PID 2616 wrote to memory of 3640 2616 cmd.exe 87 PID 2616 wrote to memory of 468 2616 cmd.exe 89 PID 2616 wrote to memory of 468 2616 cmd.exe 89 PID 2616 wrote to memory of 468 2616 cmd.exe 89 PID 2616 wrote to memory of 3620 2616 cmd.exe 90 PID 2616 wrote to memory of 3620 2616 cmd.exe 90 PID 2616 wrote to memory of 3620 2616 cmd.exe 90 PID 468 wrote to memory of 4484 468 Sul.exe.pif 91 PID 468 wrote to memory of 4484 468 Sul.exe.pif 91 PID 468 wrote to memory of 4484 468 Sul.exe.pif 91 PID 4748 wrote to memory of 2868 4748 61fc044a34211_Thu167fb182622.exe 98 PID 4748 wrote to memory of 2868 4748 61fc044a34211_Thu167fb182622.exe 98 PID 4748 wrote to memory of 2868 4748 61fc044a34211_Thu167fb182622.exe 98 PID 4484 wrote to memory of 1436 4484 Sul.exe.pif 100 PID 4484 wrote to memory of 1436 4484 Sul.exe.pif 100 PID 4484 wrote to memory of 1436 4484 Sul.exe.pif 100 PID 4484 wrote to memory of 1436 4484 Sul.exe.pif 100 PID 4484 wrote to memory of 1436 4484 Sul.exe.pif 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\61fc044a34211_Thu167fb182622.exe"C:\Users\Admin\AppData\Local\Temp\61fc044a34211_Thu167fb182622.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.execmd /c cmd < Esistenza.wbk2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"4⤵PID:4620
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^tDPdzRbUMNXkpbEMSMKZXPerlnGmckXJGXqJvnomwNbPoElbkyeDIDcfALyUkXmAQhFkvUdzDkXpshUFgogfpxwrCLpKzhhtgXYVZZwdO$" Impaziente.wbk4⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pifSul.exe.pif J4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pifC:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif J5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pifC:\Users\Admin\AppData\Local\Temp\QWE00000.gol\Sul.exe.pif6⤵
- Executes dropped EXE
PID:1436
-
-
-
-
C:\Windows\SysWOW64\waitfor.exewaitfor /t 10 citDNEKXehVmhlzMlgdNbKGouCJxkZjiUQRiy4⤵PID:3620
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll322⤵PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620B
MD5b2a2f85b4201446b23a250f68051b4dc
SHA18fc39fbfb341e55a6fda1ef3e0cfd25b2b8fdba5
SHA256910165a85877eca36cb0e43aac5a42b643627aa7de90676cbdefcbf32fba4ade
SHA512188b1ec9f2be6994de6e74f2385b3e0849968324cca1787b237d4eef381c9ffadc2c34c3f3131026d0ec1f89da6563455fe3f3d315d7d4673d303c38b2d0d32c
-
Filesize
872KB
MD5662676b6ae749090c43a0c5507b16131
SHA10aec9044c592c79aa2a44f66b73ed0c5cb62fd68
SHA2564dd868c3015b92c1b8b520c0459c952090e08b4ba8d81d259e1b0630156dada4
SHA512ec363e232c544f904286831f19bcc20ec0180da0e28bb2480eeccfaac7b4722e9ae5f050fec4fb7de18f6b35092e1296fd8e62022daa0b583eaba8fc4ea253f4
-
Filesize
855KB
MD54008d7f17a08efd3fbd18e4e1ba29e00
SHA153e25946589981cb36b0e9fb5b26fc334d4f9424
SHA256752cf7d34bc7433f590cdf45e0bb3922ca7ba2220a7ec09df7f1f6c9644dee3b
SHA51239e2bfad68403808924cece9c6ab43b0dc4aada62850a8c70b8e9481d825bcc90fa8a91688e3b559d4e5a517bc21931cef8037d585063885d5c948809d961978
-
Filesize
855KB
MD54008d7f17a08efd3fbd18e4e1ba29e00
SHA153e25946589981cb36b0e9fb5b26fc334d4f9424
SHA256752cf7d34bc7433f590cdf45e0bb3922ca7ba2220a7ec09df7f1f6c9644dee3b
SHA51239e2bfad68403808924cece9c6ab43b0dc4aada62850a8c70b8e9481d825bcc90fa8a91688e3b559d4e5a517bc21931cef8037d585063885d5c948809d961978
-
Filesize
872KB
MD5ce2797f5c8d43d08a41645d706569d22
SHA1f8b412bc15829da6e4f16b89112bd67076481424
SHA256fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075
SHA512ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9
-
Filesize
872KB
MD5ce2797f5c8d43d08a41645d706569d22
SHA1f8b412bc15829da6e4f16b89112bd67076481424
SHA256fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075
SHA512ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9
-
Filesize
872KB
MD5ce2797f5c8d43d08a41645d706569d22
SHA1f8b412bc15829da6e4f16b89112bd67076481424
SHA256fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075
SHA512ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9
-
Filesize
872KB
MD5ce2797f5c8d43d08a41645d706569d22
SHA1f8b412bc15829da6e4f16b89112bd67076481424
SHA256fa1a71dfe8956425fba11e24423abd6761340a0663a819ada76b854af432b075
SHA512ff2ffcacbcacfb970182ed667fc65f319a555e6cac20ffcbe28ba5fe15fca0b4f8896b46ced5e27ae4d0c2ef569d4b54c103f65c2c5e4def748bb5da71899de9