Analysis
-
max time kernel
136s -
max time network
108s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 11:56
Static task
static1
Behavioral task
behavioral1
Sample
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe
Resource
win7
General
-
Target
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe
-
Size
725KB
-
MD5
92b35678cd23f6631f7e91e38a467000
-
SHA1
dae2070da41597240398120a20ec21115006a974
-
SHA256
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341
-
SHA512
6ee5c10a6622662470bcf9fe9bcbc4892cba0ab1022da9f6a75ae53a3393f775dc6ca42edf7b7603ea51f0d93c9b209dc7ebe52e310027558e76b553ad8af3c0
Malware Config
Extracted
lokibot
niskioglasi.rs/test1/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exedescription pid process target process PID 992 wrote to memory of 2852 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe schtasks.exe PID 992 wrote to memory of 2852 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe schtasks.exe PID 992 wrote to memory of 2852 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe schtasks.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe PID 992 wrote to memory of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exedescription pid process target process PID 992 set thread context of 2256 992 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exedescription pid process Token: SeDebugPrivilege 2256 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exepid process 2256 cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe"C:\Users\Admin\AppData\Local\Temp\cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rHwNrIfXERo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp67F7.tmp"2⤵
- Creates scheduled task(s)
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\cacb7a0f02dc33257d647f0eedd40831b7feee5a0a40625a72ed50ee4682f341.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:2256