Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 07:30
Static task
static1
Behavioral task
behavioral1
Sample
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe
Resource
win7v20210410
General
-
Target
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe
-
Size
3.7MB
-
MD5
00fd3c68b44a6e82a6c516e6326dd89f
-
SHA1
a0d06dfc640fcaf4533962a11b4907c2dbbdfc8d
-
SHA256
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30
-
SHA512
92a6b9b7eda12966869d1192c5bc9abc793a1428ef8c0463c18677b03fc6c6ee9482a3559d8c20dc7284167cbecfdc77c58367cab5d9a3b0e83ae91eab3a7bfc
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/594QbwaP456AN
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exedescription pid process target process PID 2256 set thread context of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exepid process 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exede356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exedescription pid process Token: SeDebugPrivilege 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe Token: SeDebugPrivilege 968 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exedescription pid process target process PID 2256 wrote to memory of 1852 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 1852 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 1852 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe PID 2256 wrote to memory of 968 2256 de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"2⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"C:\Users\Admin\AppData\Local\Temp\de356fa5f4820cbc26b24852c1052c73dc4029e0a08f9f2a857f5a12434dca30.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:968