Analysis
-
max time kernel
136s -
max time network
113s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-07-2020 07:15
Static task
static1
Behavioral task
behavioral1
Sample
BHO4nbXgyZS1UQe.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
BHO4nbXgyZS1UQe.exe
Resource
win10
General
-
Target
BHO4nbXgyZS1UQe.exe
-
Size
284KB
-
MD5
da6acb7434d0cba2fa56325e20c44999
-
SHA1
e6010b29631ac82bc096cb0c86f1e5e5908096c4
-
SHA256
c3bde0b72c52223cc2d82b11d0e3b50e43e9d2010b6b69fa2144b8a49fef2e7e
-
SHA512
261771220817ec9b3d33766e1918c42e93bebfb7e1d658af5ec270cc3b9ebba86ffa198205b3a052dcd2a2dd5a2a10e564b95b21a03900ee85af6ef75a58737f
Malware Config
Extracted
lokibot
http://t-mk.me/ig2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1768 BHO4nbXgyZS1UQe.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1856 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1856 1032 BHO4nbXgyZS1UQe.exe 26 PID 1032 wrote to memory of 1856 1032 BHO4nbXgyZS1UQe.exe 26 PID 1032 wrote to memory of 1856 1032 BHO4nbXgyZS1UQe.exe 26 PID 1032 wrote to memory of 1856 1032 BHO4nbXgyZS1UQe.exe 26 PID 1032 wrote to memory of 1892 1032 BHO4nbXgyZS1UQe.exe 28 PID 1032 wrote to memory of 1892 1032 BHO4nbXgyZS1UQe.exe 28 PID 1032 wrote to memory of 1892 1032 BHO4nbXgyZS1UQe.exe 28 PID 1032 wrote to memory of 1892 1032 BHO4nbXgyZS1UQe.exe 28 PID 1032 wrote to memory of 1884 1032 BHO4nbXgyZS1UQe.exe 29 PID 1032 wrote to memory of 1884 1032 BHO4nbXgyZS1UQe.exe 29 PID 1032 wrote to memory of 1884 1032 BHO4nbXgyZS1UQe.exe 29 PID 1032 wrote to memory of 1884 1032 BHO4nbXgyZS1UQe.exe 29 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 PID 1032 wrote to memory of 1768 1032 BHO4nbXgyZS1UQe.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 BHO4nbXgyZS1UQe.exe Token: SeDebugPrivilege 1768 BHO4nbXgyZS1UQe.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1032 BHO4nbXgyZS1UQe.exe 1032 BHO4nbXgyZS1UQe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 1768 1032 BHO4nbXgyZS1UQe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\BHO4nbXgyZS1UQe.exe"C:\Users\Admin\AppData\Local\Temp\BHO4nbXgyZS1UQe.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jyhCYjGGUFf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp68C0.tmp"2⤵
- Creates scheduled task(s)
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\BHO4nbXgyZS1UQe.exe"{path}"2⤵PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\BHO4nbXgyZS1UQe.exe"{path}"2⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\BHO4nbXgyZS1UQe.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1768
-