Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7 -
submitted
07-07-2020 10:04
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7
General
-
Target
Payment Copy.exe
-
Size
675KB
-
MD5
f6e19104e5ed3c54df87b72849134b60
-
SHA1
83089ca9e22e9f451e17104a46bcf3d73c945a31
-
SHA256
52d1f56b7ba9fdf92db971eebca08483ce300c9c76751c3f88ba687fc1355e05
-
SHA512
b43d21f8e3d150e3cb5d8d3cef51ed13d577d197f5da4a7ca658ebc9df84eb71f60e83c697472f8a0dc10c002c705ee7c39cfd524f910e10d5cafe65d0341b33
Malware Config
Extracted
lokibot
http://acpanode-sg.com/stanz/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Payment Copy.exepid process 616 Payment Copy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Payment Copy.exedescription pid process target process PID 616 wrote to memory of 1324 616 Payment Copy.exe Payment Copy.exe PID 616 wrote to memory of 1324 616 Payment Copy.exe Payment Copy.exe PID 616 wrote to memory of 1324 616 Payment Copy.exe Payment Copy.exe PID 616 wrote to memory of 1324 616 Payment Copy.exe Payment Copy.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Payment Copy.exepid process 616 Payment Copy.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Copy.exedescription pid process target process PID 616 set thread context of 1324 616 Payment Copy.exe Payment Copy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Payment Copy.exedescription pid process Token: SeDebugPrivilege 1324 Payment Copy.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Payment Copy.exepid process 1324 Payment Copy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1324