Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07/07/2020, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe
Resource
win10
General
-
Target
4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe
-
Size
238KB
-
MD5
e857a0b6a93f6247362ade805dfc27b8
-
SHA1
8fe80b60dc811856cbd64f56d326bb485343e4e5
-
SHA256
4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef
-
SHA512
72f42436f0fd131e8ca97ab04abfbae62d3f52c816e2dbc96dd735d1ff4eeb9bb6e70649ccd8dd7fe599db376ba4114e94acf86d53ee5cbe16219159a5d7006a
Malware Config
Extracted
lokibot
www.rightkeyslogs.xyz/num/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 PID 1356 wrote to memory of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 1816 1356 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1816 4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe"C:\Users\Admin\AppData\Local\Temp\4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\4eb7a7353a49eb38c15ab6bbd8226493daa643ebedbca960bd94f05c33201bef.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1816
-