Analysis
-
max time kernel
38s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 18:17
Static task
static1
Behavioral task
behavioral1
Sample
aviso de pago.pdf.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
aviso de pago.pdf.exe
-
Size
1.0MB
-
MD5
d308eadbac9ea8eb3b0d9ab1112419be
-
SHA1
afdbe9177f5a38d59197fac722fdd91f9c50c928
-
SHA256
d3b21861d2dbbae76b30b6c1253be0775c7ea63d183ded44f041a609cbd929c4
-
SHA512
d9cb928e8cad22286e95f57e3367cf35756588039f0fa00c5c16eecc12167b1b946bddbd09450f1b1b9da08b3c77e8bde8e0776dc120963faa97d98cbf25cde1
Malware Config
Extracted
Family
lokibot
C2
http://ccjjlogsx.com/uu/me/tc.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
aviso de pago.pdf.exedescription pid process target process PID 4044 set thread context of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aviso de pago.pdf.exepid process 4044 aviso de pago.pdf.exe 4044 aviso de pago.pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
aviso de pago.pdf.exepid process 1348 aviso de pago.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
aviso de pago.pdf.exeaviso de pago.pdf.exedescription pid process Token: SeDebugPrivilege 4044 aviso de pago.pdf.exe Token: SeDebugPrivilege 1348 aviso de pago.pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aviso de pago.pdf.exedescription pid process target process PID 4044 wrote to memory of 1920 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1920 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1920 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe PID 4044 wrote to memory of 1348 4044 aviso de pago.pdf.exe aviso de pago.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aviso de pago.pdf.exe"C:\Users\Admin\AppData\Local\Temp\aviso de pago.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\aviso de pago.pdf.exe"{path}"2⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\aviso de pago.pdf.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1348
-