Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 12:10
Static task
static1
Behavioral task
behavioral1
Sample
89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe
Resource
win7
Behavioral task
behavioral2
Sample
89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe
Resource
win10v200430
General
-
Target
89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe
-
Size
379KB
-
MD5
037ada41d7814605e44f86831bda870c
-
SHA1
7b366232f409bb401cb0bfd39ba9de1cb48b6384
-
SHA256
89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6
-
SHA512
52e0e997d0ada0fce57c72a62d540cf70ad208fa6f5ead2eb2e47b7a7d81db96514462628b0234bf074468ed57cae847206c9cb626c3e0c976e2f57fce33d2bd
Malware Config
Extracted
lokibot
http://beckhoff-th.com/kon/kon2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 736 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 736 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 PID 1492 wrote to memory of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 736 1492 89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe"C:\Users\Admin\AppData\Local\Temp\89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\89c43fa14d007c940ad21716efe6c4ce18b38dc94a8c457138422c93697751b6.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:736
-