Analysis
-
max time kernel
62s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 20:40
Static task
static1
Behavioral task
behavioral1
Sample
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe
Resource
win7v20201028
General
-
Target
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe
-
Size
1.3MB
-
MD5
4e17636b1b64b2039bae2890d1f85b43
-
SHA1
1b15c3d1e31b255a45b9c2731f82ac71a866bddd
-
SHA256
bcba831c8adb8887ed3e7e82cb61482f5f6ff19c4b7d84478b6958999c04879c
-
SHA512
45ee408ba1958fd645ab58ff0242dacbfdba1711bfac293e8cabadf16a6bce765c3416e086cebffee6bdde91343a3e5a9da6253604a6add25969937043798d04
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/qElaNgWyezEFV
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exedescription pid process target process PID 576 set thread context of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exepid process 1340 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exedescription pid process Token: SeDebugPrivilege 1340 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exedescription pid process target process PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe PID 576 wrote to memory of 1340 576 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe 1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe"C:\Users\Admin\AppData\Local\Temp\1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe"C:\Users\Admin\AppData\Local\Temp\1b15c3d1e31b255a45b9c2731f82ac71a866bddd.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/576-2-0x0000000073190000-0x000000007387E000-memory.dmpFilesize
6.9MB
-
memory/576-3-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/576-5-0x0000000007830000-0x0000000007831000-memory.dmpFilesize
4KB
-
memory/576-6-0x0000000007DD0000-0x0000000007DD1000-memory.dmpFilesize
4KB
-
memory/576-7-0x00000000078D0000-0x00000000078D1000-memory.dmpFilesize
4KB
-
memory/576-8-0x00000000077B0000-0x00000000077B1000-memory.dmpFilesize
4KB
-
memory/576-9-0x0000000007A30000-0x0000000007A31000-memory.dmpFilesize
4KB
-
memory/576-10-0x0000000002D50000-0x0000000002D62000-memory.dmpFilesize
72KB
-
memory/576-11-0x0000000005790000-0x00000000057E8000-memory.dmpFilesize
352KB
-
memory/1340-12-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1340-13-0x00000000004139DE-mapping.dmp
-
memory/1340-14-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB