Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows7_x64 -
resource
win7 -
submitted
29-07-2020 05:34
Static task
static1
Behavioral task
behavioral1
Sample
IVHQ2201800000512.exe
Resource
win7
Behavioral task
behavioral2
Sample
IVHQ2201800000512.exe
Resource
win10
General
-
Target
IVHQ2201800000512.exe
-
Size
448KB
-
MD5
a7be56c01293b4a4290e0a035fb93dd7
-
SHA1
3d022658785a9cbb79985eb3c6982b0c495139b7
-
SHA256
8288d5fdb5a00ad36980616a12f75316753339bb553353008a526545ee21b5f9
-
SHA512
fa6b71f271678ad804d65d7b24a8e11cc817ab8320d7d88d5e3104efd076e0eaaf2bfe6f6858eaee259db1fcb559c0ff451aebbc02d80ed822b58c9da4e8e258
Malware Config
Extracted
lokibot
http://beckhoff-th.com/kon/kon2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 IVHQ2201800000512.exe 1768 IVHQ2201800000512.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 PID 1768 wrote to memory of 1880 1768 IVHQ2201800000512.exe 24 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1880 1768 IVHQ2201800000512.exe 24 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1880 IVHQ2201800000512.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1768 IVHQ2201800000512.exe Token: SeDebugPrivilege 1880 IVHQ2201800000512.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IVHQ2201800000512.exe"C:\Users\Admin\AppData\Local\Temp\IVHQ2201800000512.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IVHQ2201800000512.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1880
-