Analysis
-
max time kernel
95s -
max time network
62s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
30-06-2020 08:54
Static task
static1
Behavioral task
behavioral1
Sample
PO-USD#04072018.exe
Resource
win7v200430
General
-
Target
PO-USD#04072018.exe
-
Size
209KB
-
MD5
9d99b9aff2251ca3b2ab0658ab1ec0a6
-
SHA1
b2e8a3ced8d1a4ef15432892ed2998920d4b7cd0
-
SHA256
e59a9f5da7389d07f3649a20a9e10135b7ab42c2c9711e8990b32aa3aa79eac8
-
SHA512
0d7fbfd5d3c72cd5557afcfcf805a650dcd14af308360f2bb18220276d632647baadb3c7752fef8dea79ba6bed7a951a9dc3ec358f1bc25a2beed6c416f432d0
Malware Config
Extracted
lokibot
http://egamcorps.ga/~zadmin/lmark/pvent/mode.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
PO-USD#04072018.exerundll32.exedescription pid process target process PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1100 wrote to memory of 1296 1100 PO-USD#04072018.exe rundll32.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe PID 1296 wrote to memory of 1316 1296 rundll32.exe cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1296 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1296 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1296 rundll32.exe -
Blacklisted process makes network request 4 IoCs
Processes:
cmd.exeflow pid process 2 1316 cmd.exe 3 1316 cmd.exe 4 1316 cmd.exe 7 1316 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cmd.exedescription pid process Token: SeDebugPrivilege 1316 cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-USD#04072018.exe"C:\Users\Admin\AppData\Local\Temp\PO-USD#04072018.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe Fireside,Pretor2⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Fireside.DLL
-
C:\Users\Admin\AppData\Local\Temp\Mantel
-
\Users\Admin\AppData\Local\Temp\Fireside.dll
-
memory/1296-0-0x0000000000000000-mapping.dmp
-
memory/1316-4-0x0000000000000000-mapping.dmp
-
memory/1316-5-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB