Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 18:06
Static task
static1
Behavioral task
behavioral1
Sample
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe
Resource
win7v20210408
General
-
Target
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe
-
Size
250KB
-
MD5
07c01497b1a48bd763519c1b2561ab2d
-
SHA1
7cd72784c6a4e251068a43cba935ebc8a1531c84
-
SHA256
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829
-
SHA512
09213f2033186a671dad819e50d5740dc0b953f20fb2fddefc5798ce6bb5d1d40a3c8ed00b446104430541dd21f4bfdcee3e630215fba466f9cfe51fd9aea6b6
Malware Config
Extracted
lokibot
http://asiatrans.cf/BN1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exedescription pid process target process PID 1768 set thread context of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exepid process 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exepid process 1368 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exedescription pid process Token: SeDebugPrivilege 1368 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exedescription pid process target process PID 1768 wrote to memory of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe PID 1768 wrote to memory of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe PID 1768 wrote to memory of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe PID 1768 wrote to memory of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe PID 1768 wrote to memory of 1368 1768 a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe"C:\Users\Admin\AppData\Local\Temp\a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe"C:\Users\Admin\AppData\Local\Temp\a60e97778614ab28c9e6acf9a2a76e8f42c09372af1a9e5e6802018e3cee2829.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1368-61-0x00000000004139DE-mapping.dmp
-
memory/1368-64-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1768-60-0x0000000075D11000-0x0000000075D13000-memory.dmpFilesize
8KB
-
memory/1768-63-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB