Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 05:42

General

  • Target

    3fe6797c92800c21d60ebecb385eec82b782b9b3f71b8241e62754348349c883.exe

  • Size

    180KB

  • MD5

    cc8ee768ddc01e354c72af59c403bf34

  • SHA1

    995beef4affc4d57431c33ac96b2ae186e67b1da

  • SHA256

    3fe6797c92800c21d60ebecb385eec82b782b9b3f71b8241e62754348349c883

  • SHA512

    a83d5ce15843a6bc31bff9c99605125ce8be18d359cdf367b3c81bcefb417ef69e8b49f8e759e3d773d1a7de273837acdcda7487b2436904676c7895cf3bf3d1

  • SSDEEP

    768:lo/HdO9VWJvXe04H7cHPHYmug6UXQm1dIZE2ocOT77e:lVoWHyj6S3T77

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fe6797c92800c21d60ebecb385eec82b782b9b3f71b8241e62754348349c883.exe
    "C:\Users\Admin\AppData\Local\Temp\3fe6797c92800c21d60ebecb385eec82b782b9b3f71b8241e62754348349c883.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\lgqig.exe
      "C:\Users\Admin\lgqig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lgqig.exe

    Filesize

    180KB

    MD5

    b97608f91b774b7bbbd66bba6113af96

    SHA1

    864bcaec4fdcf4482ed4de9c396a670d56a160ad

    SHA256

    4aa1d50c358281bf41d297781e9dfe4a7baf1604b86a0b312306ab08f68ca2bd

    SHA512

    194fe8b39c00208d8857944eadaeacf6a23299200173d68feff8b2d997f18c073cfefb62eee9d29d404bcf81eda67853b8347faecdc151b4f4f65caf2df41ee7

  • memory/2172-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2172-14-0x0000000003940000-0x000000000396D000-memory.dmp

    Filesize

    180KB

  • memory/2636-16-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB