Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-07-2021 16:08
Static task
static1
Behavioral task
behavioral1
Sample
2b0b22566bf88c5d90484de67f5dd2fd.exe
Resource
win7v20210408
General
-
Target
2b0b22566bf88c5d90484de67f5dd2fd.exe
-
Size
640KB
-
MD5
2b0b22566bf88c5d90484de67f5dd2fd
-
SHA1
97e4f71da6fc0a56a4b4a384618096274646df12
-
SHA256
a4496233ba3b2c6ec5f8f1d591cf45839d3be94ae0517c5a83aab9586de103c9
-
SHA512
d296b90da14ac51c118d57491efc847ca4ebe73e55ce8ae7e1cce4fe64f0144759dce9348e7a5ffe655fe88db9230edcf63de686c0d181c2fae1082b0abebe56
Malware Config
Extracted
lokibot
http://manvim.co/fd3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/4800-121-0x0000000005580000-0x000000000558B000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process target process PID 4800 set thread context of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exepid process 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exepid process 904 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exe2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process Token: SeDebugPrivilege 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe Token: SeDebugPrivilege 904 2b0b22566bf88c5d90484de67f5dd2fd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2b0b22566bf88c5d90484de67f5dd2fd.exedescription pid process target process PID 4800 wrote to memory of 800 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 800 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 800 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 852 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 852 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 852 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe PID 4800 wrote to memory of 904 4800 2b0b22566bf88c5d90484de67f5dd2fd.exe 2b0b22566bf88c5d90484de67f5dd2fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"2⤵PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"2⤵PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"C:\Users\Admin\AppData\Local\Temp\2b0b22566bf88c5d90484de67f5dd2fd.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:904
-