Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-04-2021 10:04
Static task
static1
Behavioral task
behavioral1
Sample
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe
Resource
win7v20210408
General
-
Target
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe
-
Size
696KB
-
MD5
a439861734c3466577c774cf7d769e07
-
SHA1
1400c8ffb8d55af818ac13ff9a0504cebfa64da6
-
SHA256
d39e089925a20c33956c2116f41769ba0199497985922bfac15cc78403415d69
-
SHA512
881c1ccedfb75db67583810f2ea1a5f862b689335986114acc7b139e7e9b06a0a6014662d64971f8a542ac2186de275ab6e6a9ef23204f17d14e876f4daf1888
Malware Config
Extracted
lokibot
http://optimalwellengineering.com/f9wp/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exedescription pid process target process PID 1028 set thread context of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exepid process 456 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exedescription pid process Token: SeDebugPrivilege 456 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
P02021-10085Rev03-021007-020045-Lager-Yokes.e.exedescription pid process target process PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe PID 1028 wrote to memory of 456 1028 P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe"C:\Users\Admin\AppData\Local\Temp\P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\P02021-10085Rev03-021007-020045-Lager-Yokes.e.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/456-66-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/456-67-0x00000000004139DE-mapping.dmp
-
memory/456-69-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/456-68-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1028-60-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB
-
memory/1028-62-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/1028-63-0x00000000004D0000-0x00000000004DE000-memory.dmpFilesize
56KB
-
memory/1028-64-0x0000000005C90000-0x0000000005D25000-memory.dmpFilesize
596KB
-
memory/1028-65-0x0000000004D60000-0x0000000004DAD000-memory.dmpFilesize
308KB