Analysis
-
max time kernel
145s -
max time network
167s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
20-05-2020 00:23
Static task
static1
Behavioral task
behavioral1
Sample
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe
Resource
win10v200430
General
-
Target
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe
-
Size
253KB
-
MD5
489a833e8b95b22d0e0fe116f9f415f3
-
SHA1
ef6de7f3433f62378497df12f47fc3b718751f13
-
SHA256
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6
-
SHA512
7c0f54cff7cda0b74e2e5d542fcc82ac821c56f723ecbc7a3870802dceb471163bb3a90f3f5d92e7f9c7c77af0dd1aeea6db159a3112f6e3f3d5c837a3c1b551
Malware Config
Extracted
lokibot
http://beheshtsoft.com/help/mentor/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exedescription pid process target process PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe PID 1632 wrote to memory of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exedescription pid process target process PID 1632 set thread context of 1256 1632 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exedescription pid process Token: SeDebugPrivilege 1256 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exepid process 1256 d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe"C:\Users\Admin\AppData\Local\Temp\d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself