Analysis
-
max time kernel
99s -
max time network
117s -
platform
windows10_x64 -
resource
win10 -
submitted
08-07-2020 06:19
Static task
static1
Behavioral task
behavioral1
Sample
0070620200012-pdf.exe
Resource
win7
General
-
Target
0070620200012-pdf.exe
-
Size
661KB
-
MD5
096a791524b9ff0ee657822bc7c4636b
-
SHA1
fa3c732f69b3cd83e35a3edda7109df021b74e91
-
SHA256
1864cfb59340419df0dda66c8a9a5912878bef414773e0569d52cde18fdff85c
-
SHA512
950f53cd4210cebeaf7a353a7d4966a5ca25b7f5494548f04aa8287e298753d27250d1b416ad5cda08d68cb60f902d1d4fdd95be7f33fbe9617beeefb7614f03
Malware Config
Extracted
lokibot
http://mygreencity.in/scripts/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3612 set thread context of 2612 3612 0070620200012-pdf.exe 69 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 0070620200012-pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2612 0070620200012-pdf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3832 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3832 3612 0070620200012-pdf.exe 67 PID 3612 wrote to memory of 3832 3612 0070620200012-pdf.exe 67 PID 3612 wrote to memory of 3832 3612 0070620200012-pdf.exe 67 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69 PID 3612 wrote to memory of 2612 3612 0070620200012-pdf.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\0070620200012-pdf.exe"C:\Users\Admin\AppData\Local\Temp\0070620200012-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kbrTtfneFIkmUj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp76C1.tmp"2⤵
- Creates scheduled task(s)
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\0070620200012-pdf.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:2612
-