Analysis
-
max time kernel
44s -
max time network
45s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 00:04
Static task
static1
Behavioral task
behavioral1
Sample
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe
Resource
win7v20201028
General
-
Target
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe
-
Size
1.3MB
-
MD5
66f1cf3848c36e8111dc5f5a5784c2ad
-
SHA1
ad817b424694418345401fd28073dcaf4a24b22d
-
SHA256
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38
-
SHA512
03b8b77555909c114b380f5a4dab50e817c5edf4e23fc5eddc92c61c758ca98cdb6fadfe8f8eea3162f3831cba1cccf7a969e28bc106c775205e630fc4404e33
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/dUQz9bwGRLNK7
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exedescription pid process target process PID 744 set thread context of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exepid process 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exepid process 568 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exedescription pid process Token: SeDebugPrivilege 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe Token: SeDebugPrivilege 568 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exedescription pid process target process PID 744 wrote to memory of 792 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe schtasks.exe PID 744 wrote to memory of 792 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe schtasks.exe PID 744 wrote to memory of 792 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe schtasks.exe PID 744 wrote to memory of 792 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe schtasks.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe PID 744 wrote to memory of 568 744 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe 897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe"C:\Users\Admin\AppData\Local\Temp\897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNNTPHTOG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp"2⤵
- Creates scheduled task(s)
PID:792 -
C:\Users\Admin\AppData\Local\Temp\897b0c3202ce39cf2929bc681b8dfe7344101bb9856b796e49cfe494e5f8ce38.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmpMD5
90b5765fe1c7e340c1670881964e8ca1
SHA1849ef2a7a6a648cd5d30c859bbe1726b6e8167ab
SHA256be5395540b5cebb80919444f5e9328bfaecf16ad273d002b11fb84df9c8e2928
SHA512be82d438f0a2e019ebb7bb6ff4a3c73a58325ac08cf5e6d600301d120bfa1db1c6a56b0cfcac547dbcd8d7bec37e74efd04fc0d0f5300974a6ce42ca82679eb5
-
memory/568-15-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/568-13-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/568-12-0x00000000004139DE-mapping.dmp
-
memory/568-11-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/744-6-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/744-8-0x0000000004C30000-0x0000000004C75000-memory.dmpFilesize
276KB
-
memory/744-7-0x00000000004A0000-0x00000000004AE000-memory.dmpFilesize
56KB
-
memory/744-2-0x0000000073FF0000-0x00000000746DE000-memory.dmpFilesize
6.9MB
-
memory/744-5-0x0000000000500000-0x0000000000562000-memory.dmpFilesize
392KB
-
memory/744-3-0x00000000012E0000-0x00000000012E1000-memory.dmpFilesize
4KB
-
memory/792-9-0x0000000000000000-mapping.dmp
-
memory/968-14-0x000007FEF7590000-0x000007FEF780A000-memory.dmpFilesize
2.5MB