Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 04:25

General

  • Target

    19046ffd0a7a3365ba8e5b464bba149b.exe

  • Size

    101KB

  • MD5

    19046ffd0a7a3365ba8e5b464bba149b

  • SHA1

    66ce137113ada0844a916252f0e456d06cf906c1

  • SHA256

    9ae11d65b395971a284fc936690c5d1dfd035332321fba900dfa873c58243283

  • SHA512

    639f852a4665bb80271f10e1c60e5fd6046c556aaaa5c6e9e5cbfb43552ce2d7d4d4df03c15d51ecd28f25845e71a1ee60dc49a6fd76a6b468abfb6e153a2fed

  • SSDEEP

    3072:z2NFei6thiKp+Ag3Q5JMUXFKJUHL5typ2g4e2byJYN:uFjOg3Q511Km5omeS

Malware Config

Signatures

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • UAC bypass 3 TTPs 1 IoCs
  • Contacts a large (5241) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Uses the VBS compiler for execution 1 TTPs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19046ffd0a7a3365ba8e5b464bba149b.exe
    "C:\Users\Admin\AppData\Local\Temp\19046ffd0a7a3365ba8e5b464bba149b.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1628
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\19046ffd0a7a3365ba8e5b464bba149b.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1732
    • C:\Windows\System32\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:2764
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
        2⤵
          PID:2748
        • C:\Windows\regedit.exe
          "C:\Windows\regedit.exe"
          2⤵
          • Runs regedit.exe
          PID:2636
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
          2⤵
            PID:864
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
            2⤵
              PID:2428
            • C:\Windows\System32\calc.exe
              "C:\Windows\System32\calc.exe"
              2⤵
                PID:1716
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                2⤵
                  PID:2292
                • C:\Windows\System32\notepad.exe
                  "C:\Windows\System32\notepad.exe"
                  2⤵
                    PID:484
                  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                    2⤵
                      PID:2348
                    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                      2⤵
                        PID:2660

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      344B

                      MD5

                      695ced7b236ee277e6cee98afc88ff29

                      SHA1

                      b126a7608858aaa38f9d45dda72ae267d76e0287

                      SHA256

                      bbf27e19c66175147385003e5be8c26d1da9b0bc564299078c522eb1e6c47c84

                      SHA512

                      53798968cb1fe7d9d1246cfb4de4639247faf573e38c60aae213ca435b4dd6a59df5b776ee4fcda59ef0560933c97312720df7c73845aec3eafa635f123e5d56

                    • C:\Users\Admin\AppData\Local\Temp\Cab207E.tmp

                      Filesize

                      65KB

                      MD5

                      ac05d27423a85adc1622c714f2cb6184

                      SHA1

                      b0fe2b1abddb97837ea0195be70ab2ff14d43198

                      SHA256

                      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                      SHA512

                      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                    • C:\Users\Admin\AppData\Local\Temp\Tar21F7.tmp

                      Filesize

                      171KB

                      MD5

                      9c0c641c06238516f27941aa1166d427

                      SHA1

                      64cd549fb8cf014fcd9312aa7a5b023847b6c977

                      SHA256

                      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                      SHA512

                      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                    • memory/1628-332-0x000000001B220000-0x000000001B2A0000-memory.dmp

                      Filesize

                      512KB

                    • memory/1628-350-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1628-1-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1628-221-0x000000001BF50000-0x000000001BFE4000-memory.dmp

                      Filesize

                      592KB

                    • memory/1628-0-0x0000000000AE0000-0x0000000000AFC000-memory.dmp

                      Filesize

                      112KB

                    • memory/1628-2-0x000000001B220000-0x000000001B2A0000-memory.dmp

                      Filesize

                      512KB

                    • memory/1628-247-0x000007FEF5940000-0x000007FEF632C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1732-230-0x000000001B3E0000-0x000000001B6C2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/1732-233-0x0000000002070000-0x0000000002078000-memory.dmp

                      Filesize

                      32KB

                    • memory/1732-244-0x00000000028C4000-0x00000000028C7000-memory.dmp

                      Filesize

                      12KB

                    • memory/1732-245-0x000007FEEDBC0000-0x000007FEEE55D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/1732-243-0x00000000028C0000-0x0000000002940000-memory.dmp

                      Filesize

                      512KB

                    • memory/1732-246-0x00000000028CB000-0x0000000002932000-memory.dmp

                      Filesize

                      412KB

                    • memory/1732-242-0x000007FEEDBC0000-0x000007FEEE55D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2348-355-0x0000000000170000-0x000000000017D000-memory.dmp

                      Filesize

                      52KB

                    • memory/2348-352-0x0000000000401000-0x0000000000412000-memory.dmp

                      Filesize

                      68KB

                    • memory/2348-353-0x0000000000140000-0x0000000000149000-memory.dmp

                      Filesize

                      36KB

                    • memory/2348-354-0x0000000000170000-0x000000000017D000-memory.dmp

                      Filesize

                      52KB

                    • memory/2764-222-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-240-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-238-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-236-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-234-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-231-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2764-228-0x0000000000400000-0x000000000043F000-memory.dmp

                      Filesize

                      252KB