Analysis
-
max time kernel
94s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
lghub_installer (3).exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
lghub_installer (3).exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
lghub_installer (3).exe
Resource
android-x64-arm64-20240624-en
General
-
Target
lghub_installer (3).exe
-
Size
39.9MB
-
MD5
592c2e2ef75e77f72e634e75214db9bf
-
SHA1
6b3323e8706234e367c610b01be86db13feeca17
-
SHA256
4cacd85d2ac2e97cab665cfa961c5ee655fd762a2baae04314143da03ec76f6d
-
SHA512
1d07301d02d68bc269b12fd10ed353190e72d2fb645b3cc6f90bec87c11339bf4bb8b989e7fcbe136d73da1e96f8dedd55615ea5bfad3b17b17fb8dc12c1fc5f
-
SSDEEP
786432:y02gcbEpttD7yBG/4M3OW+upttD7yBG/PcXU9g5C:y02rEpttD7y0/pnpttD7y0/0XUm5C
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation lghub_installer (3).exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 4 IoCs
pid Process 208 vc_redist.x64.exe 4404 vc_redist.x64.exe 2444 vc_redist.x86.exe 5000 vc_redist.x86.exe -
Loads dropped DLL 4 IoCs
pid Process 4404 vc_redist.x64.exe 5000 vc_redist.x86.exe 5024 lghub_installer (3).exe 5024 lghub_installer (3).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x64.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 lghub_installer (3).exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5024 lghub_installer (3).exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5024 wrote to memory of 208 5024 lghub_installer (3).exe 84 PID 5024 wrote to memory of 208 5024 lghub_installer (3).exe 84 PID 5024 wrote to memory of 208 5024 lghub_installer (3).exe 84 PID 208 wrote to memory of 4404 208 vc_redist.x64.exe 85 PID 208 wrote to memory of 4404 208 vc_redist.x64.exe 85 PID 208 wrote to memory of 4404 208 vc_redist.x64.exe 85 PID 5024 wrote to memory of 2444 5024 lghub_installer (3).exe 86 PID 5024 wrote to memory of 2444 5024 lghub_installer (3).exe 86 PID 5024 wrote to memory of 2444 5024 lghub_installer (3).exe 86 PID 2444 wrote to memory of 5000 2444 vc_redist.x86.exe 87 PID 2444 wrote to memory of 5000 2444 vc_redist.x86.exe 87 PID 2444 wrote to memory of 5000 2444 vc_redist.x86.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\lghub_installer (3).exe"C:\Users\Admin\AppData\Local\Temp\lghub_installer (3).exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x64.exe" /install /quiet /norestart2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\Temp\{125483ED-78FE-4FEA-9DF3-8D50669FD7B1}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{125483ED-78FE-4FEA-9DF3-8D50669FD7B1}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x64.exe" -burn.filehandle.attached=532 -burn.filehandle.self=540 /install /quiet /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x86.exe" /install /quiet /norestart2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Temp\{D737EF14-ADCD-4E99-8892-A320713EA4B5}\.cr\vc_redist.x86.exe"C:\Windows\Temp\{D737EF14-ADCD-4E99-8892-A320713EA4B5}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\ghub-oq2cljob.udr\vc_redist.x86.exe" -burn.filehandle.attached=540 -burn.filehandle.self=648 /install /quiet /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD52a2a3384bdd0cf45d5acbec9fdcd0451
SHA146f4b432c68952062127bd248c2b1213cb0990f8
SHA256483538f2667a5ad17f8c91e34b6ce4fecb0e95bd98135a389d0c765ffffc1b47
SHA512c9ffe84bdf04117b5b151c06c754e0311cdff0d3e411bed591002e808746a79bbcd4e4df42348ecbdf2db6cfdf9845573312955796433f654d1f7f18d5ff5c2e
-
Filesize
5.7MB
MD580fc22ce65ca9aaaa38ee421b34218ba
SHA15c154147797f5c97106f24a0b04df89347f6678a
SHA2569e43c77a8b4fee488a89f3f9f801196731f09784916edd82433a3594f5e82516
SHA5122eee06f72adb5dbca411a9069fdc6d589028e869772502c8fc1d75127dd088fef7d8221b938e8900ca80b70217c095935166ca51dfc7b8c869d493a45b682b9e
-
Filesize
14.4MB
MD5be433764fa9bbe0f2f9c654f6512c9e0
SHA1b87c38d093872d7be7e191f01107b39c87888a5a
SHA25640ea2955391c9eae3e35619c4c24b5aaf3d17aeaa6d09424ee9672aa9372aeed
SHA5128a050ebd392654ce5981af3d0bf99107bfa576529bce8325a7ccc46f92917515744026a2d0ea49afb72bbc4e4278638a0677c6596ad96b7019e47c250e438191
-
Filesize
13.7MB
MD524e8177b25c072f4fb0d37496ccdbb34
SHA1afa5badce64ee67290add24e0dc3d8210954ac6c
SHA256e59ae3e886bd4571a811fe31a47959ae5c40d87c583f786816c60440252cd7ec
SHA5122fda8abc77b6ed9e98a2b120628e4e3b9458f2b18998c836eec1de82642244fe55234c7e52d6036d8b75c4b707a24f12fa639cc92d4234e94ed604a259d651e4
-
Filesize
632KB
MD594970fc3a8ed7b9de44f4117419ce829
SHA1aa1292f049c4173e2ab60b59b62f267fd884d21a
SHA256de1acbb1df68a39a5b966303ac1b609dde2688b28ebf3eba8d2adeeb3d90bf5e
SHA512b17bd215b83bfa46512b73c3d9f430806ca3bea13bebde971e8edd972614e54a7ba3d6fc3439078cdfdaa7eeb1f3f9054bf03ed5c45b622b691b968d4ec0566f
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
632KB
MD5c9d95472a5627c6c455e74c8b8fef5be
SHA134cb7f8f8b8dede7be6fd99e2b4bddaa37e5db82
SHA2564b1bf90a0e4e3a628613c2fe42ddba589ee6303e37ccc70cf99ddc92dde03b0b
SHA512989caff542f310972c15364925af542984ca73c1c1eec82fcbd1ea4bf9186487fd8349989afc95db4e761ebcbb8b14ce49482bc61d51b3259d134c571f4fab31