Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
c31ead8d90b9c54c190ca138cd2676be.exe
Resource
win7v20201028
General
-
Target
c31ead8d90b9c54c190ca138cd2676be.exe
-
Size
811KB
-
MD5
c31ead8d90b9c54c190ca138cd2676be
-
SHA1
59ee610052c95f4ba5215cdbf0ea4bad33d28815
-
SHA256
e665d8433c9e96b567470eb29b4f2857911001759b66cafb40c1123befdaf458
-
SHA512
b1e84eaf7d03810d3adfb6814ca4a4894aa8516ab80b13d7868bd56682382b2960848aa9f8d2f1b252de2658a29be1e991b3e3642fd9ff01e695a8f1146fbd72
Malware Config
Extracted
lokibot
http://blueriiver-eu.com/chief/offor/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c31ead8d90b9c54c190ca138cd2676be.exedescription pid process target process PID 4680 set thread context of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c31ead8d90b9c54c190ca138cd2676be.exepid process 3304 c31ead8d90b9c54c190ca138cd2676be.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c31ead8d90b9c54c190ca138cd2676be.exedescription pid process Token: SeDebugPrivilege 3304 c31ead8d90b9c54c190ca138cd2676be.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c31ead8d90b9c54c190ca138cd2676be.exedescription pid process target process PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe PID 4680 wrote to memory of 3304 4680 c31ead8d90b9c54c190ca138cd2676be.exe c31ead8d90b9c54c190ca138cd2676be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31ead8d90b9c54c190ca138cd2676be.exe"C:\Users\Admin\AppData\Local\Temp\c31ead8d90b9c54c190ca138cd2676be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c31ead8d90b9c54c190ca138cd2676be.exe"C:\Users\Admin\AppData\Local\Temp\c31ead8d90b9c54c190ca138cd2676be.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3304-12-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/3304-13-0x00000000004139DE-mapping.dmp
-
memory/3304-14-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/4680-2-0x0000000073900000-0x0000000073FEE000-memory.dmpFilesize
6.9MB
-
memory/4680-3-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/4680-5-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/4680-6-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/4680-7-0x0000000004D20000-0x0000000004D21000-memory.dmpFilesize
4KB
-
memory/4680-8-0x00000000027A0000-0x00000000027A1000-memory.dmpFilesize
4KB
-
memory/4680-9-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/4680-10-0x00000000027E0000-0x00000000027F2000-memory.dmpFilesize
72KB
-
memory/4680-11-0x0000000005990000-0x00000000059E3000-memory.dmpFilesize
332KB