Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
16/07/2020, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Global Trading SPA 04.img.com.exe
Resource
win7
Behavioral task
behavioral2
Sample
RFQ Global Trading SPA 04.img.com.exe
Resource
win10
General
-
Target
RFQ Global Trading SPA 04.img.com.exe
-
Size
701KB
-
MD5
87fb3a6d060e833e4eb6c74d229b3f03
-
SHA1
3ff4e981c4f2dfcdf014632c9f412de6d14a3a1c
-
SHA256
be64654bb507094ad7ace4a1da27dfe42dd6451d9dadb24b8310aa50e8ff5f34
-
SHA512
c4aefed653b191fc1297a1f1b2584f093619e2ffac0db402325d0ddff7b2fa7604e9e56cd3461261124c9575997868dd3778d36330d9db2724faa76c11b4693b
Malware Config
Extracted
lokibot
http://fixerrors-mail.ga/holy/five/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3804 2808 RFQ Global Trading SPA 04.img.com.exe 67 PID 2808 wrote to memory of 3804 2808 RFQ Global Trading SPA 04.img.com.exe 67 PID 2808 wrote to memory of 3804 2808 RFQ Global Trading SPA 04.img.com.exe 67 PID 2808 wrote to memory of 3804 2808 RFQ Global Trading SPA 04.img.com.exe 67 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2808 RFQ Global Trading SPA 04.img.com.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 3804 2808 RFQ Global Trading SPA 04.img.com.exe 67 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3804 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\UmugK = "C:\\GOHCSFBB\\UmugKW\\UmugKWxAa.vbs" RFQ Global Trading SPA 04.img.com.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ Global Trading SPA 04.img.com.exe"C:\Users\Admin\AppData\Local\Temp\RFQ Global Trading SPA 04.img.com.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Adds Run key to start application
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3804
-