Analysis
-
max time kernel
128s -
max time network
61s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
14-07-2020 13:47
Static task
static1
Behavioral task
behavioral1
Sample
Customers Requirment_pdf .scr.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Customers Requirment_pdf .scr.exe
Resource
win10v200430
General
-
Target
Customers Requirment_pdf .scr.exe
-
Size
425KB
-
MD5
5bf14fa31940ec3bd25065d3d51fe36d
-
SHA1
d7f52b052c34b5a3a123b9812fc296fd25e75cfd
-
SHA256
7e0b697ca060ceb919fa17715a88ffe9cf8ad66e3e95a720400f27777fbed132
-
SHA512
91dccb46548cfe993efb7bfb263698a545d47385538416bf160457ea019f8880d8fddf072a8d4594749fba7c313f1a6419cdb5d78b37e724087a5dfdbcced56c
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/XGfxkVvZa76tV
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
pid Process 736 Customers Requirment_pdf .scr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 736 set thread context of 1772 736 Customers Requirment_pdf .scr.exe 26 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 736 Customers Requirment_pdf .scr.exe 736 Customers Requirment_pdf .scr.exe 736 Customers Requirment_pdf .scr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 736 Customers Requirment_pdf .scr.exe Token: SeDebugPrivilege 1772 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26 PID 736 wrote to memory of 1772 736 Customers Requirment_pdf .scr.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Customers Requirment_pdf .scr.exe"C:\Users\Admin\AppData\Local\Temp\Customers Requirment_pdf .scr.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1772
-