Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Document BL.exe
Resource
win7
General
-
Target
Document BL.exe
-
Size
612KB
-
MD5
27769fb4bac6f2524fc6350e6d7b1db0
-
SHA1
b5ff1e95aed725b961aebf0358e2ed80bba5a113
-
SHA256
d4908eb3e61038e0ed961eef84160c92f87d5a1b8243b7b6d9b8c76d539da7fd
-
SHA512
689962aa9aa63565394cb22a9691fb266566131f55a71d8c8c7ca3ebc358a876f54dd47abafc7af4b2ba2ea973c4257a02a3d3032b4b3d0899b059027d8c8670
Malware Config
Extracted
lokibot
http://lokvrtz.ga/ATZ/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 2694 IoCs
Processes:
Document BL.exeDocument BL.exepid process 988 Document BL.exe 988 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe 1272 Document BL.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Document BL.exedescription pid process target process PID 988 wrote to memory of 1168 988 Document BL.exe Document BL.exe PID 988 wrote to memory of 1168 988 Document BL.exe Document BL.exe PID 988 wrote to memory of 1168 988 Document BL.exe Document BL.exe PID 988 wrote to memory of 1272 988 Document BL.exe Document BL.exe PID 988 wrote to memory of 1272 988 Document BL.exe Document BL.exe PID 988 wrote to memory of 1272 988 Document BL.exe Document BL.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Document BL.exepid process 988 Document BL.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Document BL.exedescription pid process target process PID 988 set thread context of 1168 988 Document BL.exe Document BL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Document BL.exedescription pid process Token: SeDebugPrivilege 1168 Document BL.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Document BL.exepid process 1168 Document BL.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document BL.exe"C:\Users\Admin\AppData\Local\Temp\Document BL.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Document BL.exe"C:\Users\Admin\AppData\Local\Temp\Document BL.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Document BL.exe"C:\Users\Admin\AppData\Local\Temp\Document BL.exe" 2 1168 1221562⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272