Analysis
-
max time kernel
113s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24-06-2021 06:07
Static task
static1
Behavioral task
behavioral1
Sample
ORDER.exe
Resource
win7v20210410
General
-
Target
ORDER.exe
-
Size
789KB
-
MD5
b954b768fcdca7acd4a9e43715139650
-
SHA1
343bd24a325dfd24f7ccb0ece3052175c7187002
-
SHA256
f35a2268af460c9d1dd472608376c7877aca3b037e030ee6366d2e41a1f25818
-
SHA512
31994bbcfe804827574c2f9148768ceb8c120afbd0c0275b62448b83044c270982f11e813b83c65243782203279540a12eeba84fb67904e8a6b2c73ac7fa2001
Malware Config
Extracted
lokibot
http://192.119.111.43/smack/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ORDER.exedescription pid process target process PID 1072 set thread context of 892 1072 ORDER.exe ORDER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ORDER.exepid process 892 ORDER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ORDER.exeORDER.exedescription pid process Token: SeDebugPrivilege 1072 ORDER.exe Token: SeDebugPrivilege 892 ORDER.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ORDER.exedescription pid process target process PID 1072 wrote to memory of 320 1072 ORDER.exe schtasks.exe PID 1072 wrote to memory of 320 1072 ORDER.exe schtasks.exe PID 1072 wrote to memory of 320 1072 ORDER.exe schtasks.exe PID 1072 wrote to memory of 320 1072 ORDER.exe schtasks.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe PID 1072 wrote to memory of 892 1072 ORDER.exe ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XAOlwfcRy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmpMD5
5d30b2d72d2113930cf4e7b95146e580
SHA1a330b5a41ddff10c6b12891ff2331cd47ce54e51
SHA256cabf3d57503e9ef5dcdf98b6b91644bf3bb21c01171df61cf25b0488b96610fe
SHA512d9c5515b8982288bac3b1907c2539e53265ab3c1cdd4998fd285090cbd40ea98939f3ebe497bb10bb5332b1acf1278f592a34c7a584bc7dc0db6ac2150835e56
-
memory/320-65-0x0000000000000000-mapping.dmp
-
memory/892-67-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/892-68-0x00000000004139DE-mapping.dmp
-
memory/892-69-0x00000000752F1000-0x00000000752F3000-memory.dmpFilesize
8KB
-
memory/892-70-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1072-59-0x0000000000BA0000-0x0000000000BA1000-memory.dmpFilesize
4KB
-
memory/1072-61-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/1072-62-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1072-63-0x0000000007760000-0x00000000077E0000-memory.dmpFilesize
512KB
-
memory/1072-64-0x00000000004D0000-0x000000000051D000-memory.dmpFilesize
308KB