Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 16:08
Static task
static1
Behavioral task
behavioral1
Sample
2b0b22566bf88c5d90484de67f5dd2fd.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
2b0b22566bf88c5d90484de67f5dd2fd.exe
-
Size
640KB
-
MD5
2b0b22566bf88c5d90484de67f5dd2fd
-
SHA1
97e4f71da6fc0a56a4b4a384618096274646df12
-
SHA256
a4496233ba3b2c6ec5f8f1d591cf45839d3be94ae0517c5a83aab9586de103c9
-
SHA512
d296b90da14ac51c118d57491efc847ca4ebe73e55ce8ae7e1cce4fe64f0144759dce9348e7a5ffe655fe88db9230edcf63de686c0d181c2fae1082b0abebe56
Malware Config
Extracted
Family
lokibot
C2
http://manvim.co/fd3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1308-63-0x0000000000420000-0x000000000042B000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process target process PID 1308 set thread context of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exepid process 732 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process Token: SeDebugPrivilege 732 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process target process PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 1308 wrote to memory of 732 1308 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:732
-