Analysis
-
max time kernel
63s -
max time network
117s -
platform
windows10_x64 -
resource
win10 -
submitted
07-07-2020 12:10
Static task
static1
Behavioral task
behavioral1
Sample
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
Resource
win7
General
-
Target
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
-
Size
603KB
-
MD5
537b024fe163c326ed10f7fbc3f38146
-
SHA1
57191d4a826280a11aadc5fd894542a6926fc702
-
SHA256
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518
-
SHA512
0bd8fd0e77244becfe22302fbb3f06b6be797b26b66b9b89cb466ebb066892609884b8222dd377f155246b87b1a1acdabbb036f0fe72ebed65f3fef2a5cd5f89
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/Gi4uJRts3jTJM
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exedescription pid process target process PID 3692 set thread context of 3868 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exedescription pid process Token: SeDebugPrivilege 3868 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exepid process 3868 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exepid process 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exedescription pid process target process PID 3692 wrote to memory of 3868 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe PID 3692 wrote to memory of 3868 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe PID 3692 wrote to memory of 3868 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exepid process 3692 b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe"C:\Users\Admin\AppData\Local\Temp\b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe"C:\Users\Admin\AppData\Local\Temp\b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:3868