Analysis
-
max time kernel
100s -
max time network
130s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 21:00
Static task
static1
Behavioral task
behavioral1
Sample
iZdmfQkBlqMmmbz.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
iZdmfQkBlqMmmbz.exe
-
Size
536KB
-
MD5
2402f165befaa33e3700592cb7defe4c
-
SHA1
e1c0b072bf018dc8af85ff4972a7e0718a4c7bf7
-
SHA256
cd71cf303bb183ffcf34487f8db9b3c05f517e0659b972153d5739422da9fbf3
-
SHA512
ff5f1dac40696ba5875abd8baad70b6b5c2fad8485530c6a09217c5d1ce9cd57b761861aa4d07998b13f12f85353336332649b3b6fa036489cd95d8a5a89e322
Malware Config
Extracted
Family
lokibot
C2
https://luoslasco.xyz/to/ya/vd.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
iZdmfQkBlqMmmbz.exedescription pid process target process PID 1340 set thread context of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
iZdmfQkBlqMmmbz.exepid process 1556 iZdmfQkBlqMmmbz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iZdmfQkBlqMmmbz.exedescription pid process Token: SeDebugPrivilege 1556 iZdmfQkBlqMmmbz.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
iZdmfQkBlqMmmbz.exedescription pid process target process PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe PID 1340 wrote to memory of 1556 1340 iZdmfQkBlqMmmbz.exe iZdmfQkBlqMmmbz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\iZdmfQkBlqMmmbz.exe"C:\Users\Admin\AppData\Local\Temp\iZdmfQkBlqMmmbz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\iZdmfQkBlqMmmbz.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1340-59-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/1340-61-0x0000000004F90000-0x0000000004F91000-memory.dmpFilesize
4KB
-
memory/1340-62-0x00000000004A0000-0x00000000004A2000-memory.dmpFilesize
8KB
-
memory/1340-63-0x0000000004E10000-0x0000000004E7B000-memory.dmpFilesize
428KB
-
memory/1340-64-0x0000000000680000-0x00000000006A2000-memory.dmpFilesize
136KB
-
memory/1556-65-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1556-66-0x00000000004139DE-mapping.dmp
-
memory/1556-67-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/1556-68-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB