Analysis
-
max time kernel
66s -
max time network
107s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-07-2021 12:48
Static task
static1
Behavioral task
behavioral1
Sample
a0339a15a2f219b54b3c1a6b4afbc6be.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
a0339a15a2f219b54b3c1a6b4afbc6be.exe
-
Size
632KB
-
MD5
a0339a15a2f219b54b3c1a6b4afbc6be
-
SHA1
7df7a7515715283591582974eb47197c9369efe3
-
SHA256
eef89bbd9fcfb6e1b095b5302af5c176ed593bf9c6ce26d0be6ebeddc7fa0e6a
-
SHA512
30037c5446b79946da950d99ba0b315134d7793307f8fb25255a0db8121d70f8df201029ffd00d7cb4b1ed6201ab60795727b983296a03a0a5a2fac28d792a84
Malware Config
Extracted
Family
lokibot
C2
http://vikinproducts.com/Mrlogs/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a0339a15a2f219b54b3c1a6b4afbc6be.exedescription pid process target process PID 676 set thread context of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a0339a15a2f219b54b3c1a6b4afbc6be.exepid process 616 a0339a15a2f219b54b3c1a6b4afbc6be.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a0339a15a2f219b54b3c1a6b4afbc6be.exedescription pid process Token: SeDebugPrivilege 616 a0339a15a2f219b54b3c1a6b4afbc6be.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
a0339a15a2f219b54b3c1a6b4afbc6be.exedescription pid process target process PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe PID 676 wrote to memory of 616 676 a0339a15a2f219b54b3c1a6b4afbc6be.exe a0339a15a2f219b54b3c1a6b4afbc6be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0339a15a2f219b54b3c1a6b4afbc6be.exe"C:\Users\Admin\AppData\Local\Temp\a0339a15a2f219b54b3c1a6b4afbc6be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\a0339a15a2f219b54b3c1a6b4afbc6be.exe"C:\Users\Admin\AppData\Local\Temp\a0339a15a2f219b54b3c1a6b4afbc6be.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:616
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/616-67-0x00000000004139DE-mapping.dmp
-
memory/616-66-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/616-68-0x0000000075051000-0x0000000075053000-memory.dmpFilesize
8KB
-
memory/616-69-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/676-59-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/676-61-0x0000000000590000-0x0000000000629000-memory.dmpFilesize
612KB
-
memory/676-62-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB
-
memory/676-63-0x00000000002C0000-0x00000000002DB000-memory.dmpFilesize
108KB
-
memory/676-64-0x0000000004F60000-0x0000000004FC6000-memory.dmpFilesize
408KB
-
memory/676-65-0x00000000004E0000-0x0000000000501000-memory.dmpFilesize
132KB