Analysis
-
max time kernel
135s -
max time network
97s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe
Resource
win7v200430
General
-
Target
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe
-
Size
165KB
-
MD5
a1634ded3ebadcf1060f89368cf5db71
-
SHA1
e34469a707b5464cea799400080ae57770856007
-
SHA256
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32
-
SHA512
86ca28fa11684246a05e54ab9ba47dc59a4a2b8b7583fe26b541d719760ec78fd458d20526e8cb2808224b481a84186ac60eb5f6a02d32a8c89677e028ddc697
Malware Config
Extracted
lokibot
niskioglasi.rs/test2/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 PID 1520 wrote to memory of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 1816 1520 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1816 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1816
-