Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:15
Static task
static1
Behavioral task
behavioral1
Sample
dd56737c942385f2ab60a3e80a175ed2.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
dd56737c942385f2ab60a3e80a175ed2.exe
-
Size
985KB
-
MD5
dd56737c942385f2ab60a3e80a175ed2
-
SHA1
1a990bf3c300b119de7b9f6f16b246c6a8848855
-
SHA256
9010e5361743ddacac6baa4a585ed4d9db9ed3ce65401b012d16923afebe414f
-
SHA512
e1a5c778629068c23af7884db21f0e96a16ddb52f24934bf1b7a945632db902ad41f4bfb7749d8ed6280c0bc1e1a4fa51598d6f53f7988c0bf65a7b920dc1a1b
Malware Config
Extracted
Family
lokibot
C2
http://azzmtool.com/chief/offor/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
dd56737c942385f2ab60a3e80a175ed2.exedescription pid process target process PID 1936 set thread context of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
dd56737c942385f2ab60a3e80a175ed2.exepid process 920 dd56737c942385f2ab60a3e80a175ed2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dd56737c942385f2ab60a3e80a175ed2.exedescription pid process Token: SeDebugPrivilege 920 dd56737c942385f2ab60a3e80a175ed2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
dd56737c942385f2ab60a3e80a175ed2.exedescription pid process target process PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe PID 1936 wrote to memory of 920 1936 dd56737c942385f2ab60a3e80a175ed2.exe dd56737c942385f2ab60a3e80a175ed2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd56737c942385f2ab60a3e80a175ed2.exe"C:\Users\Admin\AppData\Local\Temp\dd56737c942385f2ab60a3e80a175ed2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\dd56737c942385f2ab60a3e80a175ed2.exe"C:\Users\Admin\AppData\Local\Temp\dd56737c942385f2ab60a3e80a175ed2.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:920
-