Threat name:
ManusCrypt, SmokeLoader, Socelars, lgoog
Alert
Classification:
troj.evad.spre.phis.bank.spyw.expl.mine
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (creates a PE file in dynamic memory)
Detected VMProtect packer
DLL reload attack detected
Drops PE files with a suspicious file extension
Found API chain indicative of debugger detection
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Chrome's extension installation force list
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites Mozilla Firefox settings
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Powershell Download and Execute IEX
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected lgoogLoader
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
742443
Sample:
file.exe
Startdate:
09/11/2022
Architecture:
WINDOWS
Score:
100
175
www.mxnzvc.xyz
2->175
177
www.grilloo.net
2->177
179
16 other IPs or domains
2->179
245
Multi AV Scanner detection
for domain / URL
2->245
247
Malicious sample detected
(through community Yara
rule)
2->247
249
Antivirus detection
for URL or domain
2->249
251
16 other signatures
2->251
15
file.exe
1
5
2->15
started
17
msiexec.exe
2->17
started
21
rundll32.exe
2->21
started
23
3 other processes
2->23
signatures3
process4
file5
25
cmd.exe
1
15->25
started
28
TapiUnattend.exe
15->28
started
121
b92031.rbf (copy), PE32+
17->121
dropped
123
b92030.rbf (copy), PE32+
17->123
dropped
125
b9202f.rbf (copy), PE32+
17->125
dropped
127
31 other malicious files
17->127
dropped
243
Infects executable files
(exe, dll, sys, html)
17->243
30
rundll32.exe
21->30
started
signatures6
process7
signatures8
253
Obfuscated command line
found
25->253
255
Uses ping.exe to sleep
25->255
257
Drops PE files with
a suspicious file extension
25->257
259
Uses ping.exe to check
the status of other
devices and networks
25->259
32
cmd.exe
2
25->32
started
36
PING.EXE
1
25->36
started
39
conhost.exe
25->39
started
261
Writes to foreign memory
regions
30->261
263
Allocates memory in
foreign processes
30->263
265
Creates a thread in
another existing process
(thread injection)
30->265
41
svchost.exe
30->41
injected
43
svchost.exe
30->43
injected
45
svchost.exe
30->45
injected
process9
dnsIp10
113
C:\Users\user\AppData\...nsures.exe.pif, PE32
32->113
dropped
223
Obfuscated command line
found
32->223
225
Uses ping.exe to sleep
32->225
47
Ensures.exe.pif
1
32->47
started
51
tasklist.exe
1
32->51
started
53
tasklist.exe
1
32->53
started
58
4 other processes
32->58
181
192.168.11.1
unknown
unknown
36->181
227
Sets debug register
(to hijack the execution
of another thread)
41->227
229
Modifies the context
of a thread in another
process (thread injection)
41->229
55
svchost.exe
41->55
started
file11
signatures12
process13
dnsIp14
161
C:\Users\user\AppData\...\IPIAoDyRvEJcn.dll, PE32
47->161
dropped
207
DLL reload attack detected
47->207
209
Detected unpacking (creates
a PE file in dynamic
memory)
47->209
211
Found stalling execution
ending in API Sleep
call
47->211
219
6 other signatures
47->219
60
Ensures.exe.pif
49
47->60
started
183
208.95.112.1
TUT-ASUS
United States
55->183
185
104.21.34.132
CLOUDFLARENETUS
United States
55->185
187
g.agametog.com
34.142.181.181
ATGS-MMD-ASUS
United States
55->187
163
C:\Users\user\AppData\...\cookies.sqlite.db, SQLite
55->163
dropped
165
C:\Users\user\AppData\Local\...\Login Data.db, SQLite
55->165
dropped
167
C:\Users\user\AppData\Local\...\Login Data.db, SQLite
55->167
dropped
169
C:\Users\user\AppData\Local\...\Cookies.db, SQLite
55->169
dropped
213
Query firmware table
information (likely
to detect VMs)
55->213
215
Installs new ROOT certificates
55->215
217
Sets a auto configuration
URL for Internet Explorer
(IE settings are enforced
automatically)
55->217
221
2 other signatures
55->221
file15
signatures16
process17
dnsIp18
201
grilloo.net
159.8.122.140, 443, 49852, 49855
SOFTLAYERUS
United States
60->201
203
23.160.193.16
NETINF-PRIMARY-ASUS
United States
60->203
205
7 other IPs or domains
60->205
151
C:\Users\user\AppData\Local\Temp\...\JsiaVb, PE32
60->151
dropped
153
C:\Users\user\AppData\Local\Temp\...\iteRKR, PE32
60->153
dropped
155
C:\Users\user\AppData\Local\Temp\...\BsEPNb, PE32
60->155
dropped
157
12 other malicious files
60->157
dropped
64
MdwUGO
60->64
started
68
JsiaVb
60->68
started
70
TZFRzG
60->70
started
72
3 other processes
60->72
file19
process20
dnsIp21
115
C:\Users\user\AppData\Local\...\MdwUGO.tmp, PE32
64->115
dropped
231
Multi AV Scanner detection
for dropped file
64->231
233
Obfuscated command line
found
64->233
75
MdwUGO.tmp
64->75
started
235
Machine Learning detection
for dropped file
68->235
237
Injects a PE file into
a foreign processes
68->237
79
JsiaVb
68->79
started
117
C:\Users\user\AppData\Local\...\TZFRzG.tmp, PE32
70->117
dropped
82
TZFRzG.tmp
70->82
started
189
157.240.20.35
FACEBOOKUS
United States
72->189
191
star-mini.c10r.facebook.com
185.60.216.35, 443, 49866, 49867
FACEBOOKUS
Ireland
72->191
193
2 other IPs or domains
72->193
119
C:\Users\user\AppData\Local\Temp\db.dll, PE32
72->119
dropped
239
Antivirus detection
for dropped file
72->239
241
Creates processes via
WMI
72->241
84
cmd.exe
72->84
started
86
cmd.exe
72->86
started
88
conhost.exe
72->88
started
file22
signatures23
process24
dnsIp25
195
18.66.112.67
MIT-GATEWAYSUS
United States
75->195
197
d2l7sw81k13yby.cloudfront.net
18.66.248.42, 443, 49859, 49864
MIT-GATEWAYSUS
United States
75->197
199
aka.ms
23.79.165.181, 443, 49876
AKAMAI-ASUS
United States
75->199
137
C:\Users\user\...\xmrBridge.dll (copy), PE32+
75->137
dropped
139
C:\Users\user\...\unins000.exe (copy), PE32
75->139
dropped
141
C:\Users\user\...\nvrtc64_100_0.dll (copy), PE32+
75->141
dropped
149
31 other files (30 malicious)
75->149
dropped
90
vc_redist.x64.exe
75->90
started
271
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
79->271
273
Maps a DLL or memory
area into another process
79->273
275
Checks if the current
machine is a virtual
machine (disk enumeration)
79->275
277
Creates a thread in
another existing process
(thread injection)
79->277
93
explorer.exe
5
1
79->93
injected
143
C:\Windows\unins000.exe (copy), PE32
82->143
dropped
145
C:\Windows\is-OIIJ3.tmp, PE32
82->145
dropped
147
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
82->147
dropped
279
Modifies Chrome's
extension installation
force list
82->279
96
PING.EXE
84->96
started
99
conhost.exe
84->99
started
101
powershell.exe
86->101
started
103
conhost.exe
86->103
started
file26
signatures27
process28
dnsIp29
133
C:\Windows\Temp\...\vc_redist.x64.exe, PE32
90->133
dropped
105
vc_redist.x64.exe
90->105
started
135
C:\Users\user\AppData\Roaming\criebdu, PE32
93->135
dropped
267
Benign windows process
drops PE files
93->267
269
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
93->269
171
127.0.0.1
unknown
unknown
96->171
108
Conhost.exe
96->108
started
173
62.233.57.51, 49858, 80
DivisionWRSBE
unknown
101->173
file30
signatures31
process32
file33
129
C:\Windows\Temp\...\VC_redist.x64.exe, PE32
105->129
dropped
131
C:\Windows\Temp\...\wixstdba.dll, PE32
105->131
dropped
110
VC_redist.x64.exe
105->110
started
process34
file35
159
C:\ProgramData\...\VC_redist.x64.exe, PE32
110->159
dropped
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.