Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 08:44
Static task
static1
Behavioral task
behavioral1
Sample
f3a4f1cc5720b34b682d65f04bd122fe.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
f3a4f1cc5720b34b682d65f04bd122fe.exe
-
Size
602KB
-
MD5
f3a4f1cc5720b34b682d65f04bd122fe
-
SHA1
9918b2802596f7185e71b21cb9a9ff6001d93c01
-
SHA256
61fc463e85fb2fa581c8d7ba3321992bfe69d28dc8ca06660875d8b9e9701ecc
-
SHA512
4f1b4c2f24dfd559be01f2f66c29b6e225cb7a6df1fb4d398b64a10984d744e5a7ec44fd7a6fab0e39ec1d8086638f734f4679a7fb263027ff698413aa5dceb8
Malware Config
Extracted
Family
lokibot
C2
http://manvim.co/fd5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1652-63-0x00000000003C0000-0x00000000003CB000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3a4f1cc5720b34b682d65f04bd122fe.exedescription pid process target process PID 1652 set thread context of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f3a4f1cc5720b34b682d65f04bd122fe.exepid process 616 f3a4f1cc5720b34b682d65f04bd122fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f3a4f1cc5720b34b682d65f04bd122fe.exedescription pid process Token: SeDebugPrivilege 616 f3a4f1cc5720b34b682d65f04bd122fe.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
f3a4f1cc5720b34b682d65f04bd122fe.exedescription pid process target process PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe PID 1652 wrote to memory of 616 1652 f3a4f1cc5720b34b682d65f04bd122fe.exe f3a4f1cc5720b34b682d65f04bd122fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a4f1cc5720b34b682d65f04bd122fe.exe"C:\Users\Admin\AppData\Local\Temp\f3a4f1cc5720b34b682d65f04bd122fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\f3a4f1cc5720b34b682d65f04bd122fe.exe"C:\Users\Admin\AppData\Local\Temp\f3a4f1cc5720b34b682d65f04bd122fe.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:616