Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
LNGSetup.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
LNGSetup.exe
Resource
win10v2004-20231023-en
General
-
Target
LNGSetup.exe
-
Size
2.5MB
-
MD5
cbf61d0e740db2e9ee4c496d7b267b71
-
SHA1
13a76b18ba70d001f16c1e9c6b1fdcf55a9fbfd0
-
SHA256
9ddb8217a49d403cf827ce838a3771538264a2886824cbda7b1bdb464d0bc941
-
SHA512
b01fdb822ebf66222cb2d465470810cd7a13b4622e13cadb6aefa781831990ff16672f8ccce02a6aad5aa03ea4be7bd28eada2ceacc82ae01a6b533db32d792f
-
SSDEEP
49152:xgCh1LGumhuW+7KEyM+zkSGXG1FiLEt71YqHpbAQz1i9Csa985cB+XymsQA:SCPIE9hXG601YqJzxsaK5cQXBsF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 irsetup.exe -
Loads dropped DLL 4 IoCs
pid Process 884 LNGSetup.exe 884 LNGSetup.exe 884 LNGSetup.exe 884 LNGSetup.exe -
resource yara_rule behavioral1/files/0x000c000000012274-2.dat upx behavioral1/memory/884-5-0x0000000002620000-0x00000000027A1000-memory.dmp upx behavioral1/files/0x000c000000012274-6.dat upx behavioral1/files/0x000c000000012274-12.dat upx behavioral1/files/0x000c000000012274-10.dat upx behavioral1/files/0x000c000000012274-7.dat upx behavioral1/files/0x000c000000012274-14.dat upx behavioral1/memory/2984-16-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral1/files/0x000c000000012274-17.dat upx behavioral1/memory/2984-27-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral1/memory/2984-32-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\LNG - Lottery Number Generator Setup Log.txt irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 irsetup.exe 2984 irsetup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28 PID 884 wrote to memory of 2984 884 LNGSetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\LNGSetup.exe"C:\Users\Admin\AppData\Local\Temp\LNGSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:666146 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\LNGSetup.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-2085049433-1067986815-1244098655-1000"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d