Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-07-2020 11:56
Static task
static1
Behavioral task
behavioral1
Sample
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Resource
win10
General
-
Target
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
-
Size
705KB
-
MD5
af2d2ebeda11b5047b44ce8d0210de9e
-
SHA1
627160e80c9ea31f013ebbf9755f9b97e8493efc
-
SHA256
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5
-
SHA512
1dcf7d6f3ff6981b2a13a091c451135b0af2c8c2fc12d33b0dfd4eaeb2a14ec88259a5201fcad80985c97d5fb664183ea8f14978cbc037133368aba304f4a0dc
Malware Config
Extracted
lokibot
http://boeschboddenspies.com/bless/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exedescription pid process target process PID 676 set thread context of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exedescription pid process Token: SeDebugPrivilege 1716 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exepid process 1716 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exedescription pid process target process PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe PID 676 wrote to memory of 1716 676 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1716