Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 12:04
Static task
static1
Behavioral task
behavioral1
Sample
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe
Resource
win7v20201028
General
-
Target
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe
-
Size
604KB
-
MD5
d0e73d5b3842e748007e2989563777df
-
SHA1
95541e45052ff878d1f03d75c95c0167769e4654
-
SHA256
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d
-
SHA512
7ea6d9a05232af13927912ada4b1cef23d461dcfbed644d7241675768b896aa99609d0b235e09ca455611ad149a739a64887cfaecd6b0528a6dfdf0eba9c1de8
Malware Config
Extracted
lokibot
http://habibmentro.com/hybrid/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exedescription pid process target process PID 1052 set thread context of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exepid process 1412 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exedescription pid process Token: SeDebugPrivilege 1412 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exedescription pid process target process PID 1052 wrote to memory of 1780 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe schtasks.exe PID 1052 wrote to memory of 1780 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe schtasks.exe PID 1052 wrote to memory of 1780 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe schtasks.exe PID 1052 wrote to memory of 1780 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe schtasks.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe PID 1052 wrote to memory of 1412 1052 c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe"C:\Users\Admin\AppData\Local\Temp\c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BRtRZimUlc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1719.tmp"2⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\c7c001f29eb88786385f54395ecc75b780e9b54dd2eae54bcce61656a784e04d.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
225da38e443d7b87a6a8a8642595d327
SHA1f4b5ce4ef18ad7a95d9b0914476125a8edbef410
SHA256deaeeb6c49ace6a51dc55fb725da3d35e2f84873f5afcd64b1d26844ea28922b
SHA5124e8fd109ab6523463c66d506988d49d4dac8b75bf1ab4c009780edd7988616763d143a2c639a285053b518bf6b4e78ff66e5a6e71bc4d9df3e1b9dcadca7bb14