Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:14
Static task
static1
Behavioral task
behavioral1
Sample
cde0068a94bf72aac7d9249e6c551662.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
cde0068a94bf72aac7d9249e6c551662.exe
-
Size
969KB
-
MD5
cde0068a94bf72aac7d9249e6c551662
-
SHA1
51343688f77fe3d2a24a88f0539634cb66dadd18
-
SHA256
1b514f5e6484c97155dda3e6ee1073f41f19318af2d00d0bec33c6dc7844c3f6
-
SHA512
f2e48ff085f9824aceb8938ec42750b480704923ede42f035624c3221c5e4a8cac4213fa1af03574c21526950490ade141f4fd8a70a65b9be6012083c6ec6b40
Malware Config
Extracted
Family
lokibot
C2
http://azme-contractors.com/chief/boss/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
cde0068a94bf72aac7d9249e6c551662.exedescription pid process target process PID 4800 set thread context of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cde0068a94bf72aac7d9249e6c551662.exepid process 584 cde0068a94bf72aac7d9249e6c551662.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cde0068a94bf72aac7d9249e6c551662.exedescription pid process Token: SeDebugPrivilege 584 cde0068a94bf72aac7d9249e6c551662.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cde0068a94bf72aac7d9249e6c551662.exedescription pid process target process PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe PID 4800 wrote to memory of 584 4800 cde0068a94bf72aac7d9249e6c551662.exe cde0068a94bf72aac7d9249e6c551662.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde0068a94bf72aac7d9249e6c551662.exe"C:\Users\Admin\AppData\Local\Temp\cde0068a94bf72aac7d9249e6c551662.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\cde0068a94bf72aac7d9249e6c551662.exe"C:\Users\Admin\AppData\Local\Temp\cde0068a94bf72aac7d9249e6c551662.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:584
-