Analysis
-
max time kernel
101s -
max time network
118s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe
Resource
win7v200430
General
-
Target
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe
-
Size
165KB
-
MD5
a1634ded3ebadcf1060f89368cf5db71
-
SHA1
e34469a707b5464cea799400080ae57770856007
-
SHA256
f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32
-
SHA512
86ca28fa11684246a05e54ab9ba47dc59a4a2b8b7583fe26b541d719760ec78fd458d20526e8cb2808224b481a84186ac60eb5f6a02d32a8c89677e028ddc697
Malware Config
Extracted
lokibot
niskioglasi.rs/test2/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3380 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3380 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 PID 3100 wrote to memory of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3100 set thread context of 3380 3100 f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\f9e2b4bbf2bd2f5e267f01e74ed12025fc3fcebfbd534a59f083db8a080e5f32.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:3380
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3936