Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 12:13
Static task
static1
Behavioral task
behavioral1
Sample
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe
Resource
win7v20201028
General
-
Target
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe
-
Size
265KB
-
MD5
290f17a9e8b6647b57eb7c8b3ee85717
-
SHA1
b86cc8d553f432a507ba24ed724218da09b3d6cb
-
SHA256
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f
-
SHA512
76224f371550b9129f7329af0ea34c182be7819af3779dbf120e8e641796fb90004813cc094369c004bfae7fb5ac02cdc000aed778ba4e7ca4c091d9621e7e43
Malware Config
Extracted
lokibot
http://blueriiver-eu.com/zoro/zoro5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exedescription pid process target process PID 1316 set thread context of 3500 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exepid process 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exepid process 3500 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exedescription pid process Token: SeDebugPrivilege 3500 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exedescription pid process target process PID 1316 wrote to memory of 3500 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe PID 1316 wrote to memory of 3500 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe PID 1316 wrote to memory of 3500 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe PID 1316 wrote to memory of 3500 1316 b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe"C:\Users\Admin\AppData\Local\Temp\b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe"C:\Users\Admin\AppData\Local\Temp\b8f93d593fb0feaa265c385ab4afb8c8e1bb7908b166cf68b6efb36ed1f7fa4f.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken