Analysis
-
max time kernel
98s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 18:05
Static task
static1
Behavioral task
behavioral1
Sample
0n4xyK1WyMB3UE2.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
0n4xyK1WyMB3UE2.exe
-
Size
1.1MB
-
MD5
825ebfccb4c9e1b2a71f8e931d751aaf
-
SHA1
9318735795acaca9794a92030492b9c2c5fc0aab
-
SHA256
c17b37bb3f9b18f160029a7d48d3beef1a15cb3fd51033e6c6ccf4c871377c12
-
SHA512
6609b39beec7a86d7994a8b3198556ede8a9654ce84d517ccdc58d5d650361a1e369faba05ca5c93ed998355c60d2c17a9031547f5df9a865e42ab644f7f2bf0
Malware Config
Extracted
Family
lokibot
C2
https://luoslasco.xyz/to/ya/vd.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0n4xyK1WyMB3UE2.exedescription pid process target process PID 4056 set thread context of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0n4xyK1WyMB3UE2.exepid process 2124 0n4xyK1WyMB3UE2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0n4xyK1WyMB3UE2.exedescription pid process Token: SeDebugPrivilege 2124 0n4xyK1WyMB3UE2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0n4xyK1WyMB3UE2.exedescription pid process target process PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe PID 4056 wrote to memory of 2124 4056 0n4xyK1WyMB3UE2.exe 0n4xyK1WyMB3UE2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0n4xyK1WyMB3UE2.exe"C:\Users\Admin\AppData\Local\Temp\0n4xyK1WyMB3UE2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\0n4xyK1WyMB3UE2.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2124
-