Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-07-2021 10:36
Static task
static1
Behavioral task
behavioral1
Sample
4f9f0d44eac8c320a004a7a7e3aa8f3f.exe
Resource
win7v20210410
General
-
Target
4f9f0d44eac8c320a004a7a7e3aa8f3f.exe
-
Size
1.1MB
-
MD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
-
SHA1
07efcd541a452923168048eea5a68752aca9c705
-
SHA256
a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
-
SHA512
4829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
Malware Config
Extracted
lokibot
http://ikloki.xyz/vf/cf/ro.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/564-122-0x0000000005870000-0x000000000587B000-memory.dmp CustAttr -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exedescription pid process target process PID 564 set thread context of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exepid process 3176 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exedescription pid process Token: SeDebugPrivilege 3176 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4f9f0d44eac8c320a004a7a7e3aa8f3f.exedescription pid process target process PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe PID 564 wrote to memory of 3176 564 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe 4f9f0d44eac8c320a004a7a7e3aa8f3f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f9f0d44eac8c320a004a7a7e3aa8f3f.exe"C:\Users\Admin\AppData\Local\Temp\4f9f0d44eac8c320a004a7a7e3aa8f3f.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\4f9f0d44eac8c320a004a7a7e3aa8f3f.exe"C:\Users\Admin\AppData\Local\Temp\4f9f0d44eac8c320a004a7a7e3aa8f3f.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:3176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/564-114-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/564-116-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/564-117-0x0000000005D20000-0x0000000005D21000-memory.dmpFilesize
4KB
-
memory/564-118-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/564-119-0x00000000057D0000-0x00000000057D1000-memory.dmpFilesize
4KB
-
memory/564-120-0x0000000005A20000-0x0000000005A21000-memory.dmpFilesize
4KB
-
memory/564-121-0x0000000005820000-0x0000000005D1E000-memory.dmpFilesize
5.0MB
-
memory/564-122-0x0000000005870000-0x000000000587B000-memory.dmpFilesize
44KB
-
memory/564-123-0x0000000006700000-0x0000000006761000-memory.dmpFilesize
388KB
-
memory/564-124-0x0000000006780000-0x000000000679D000-memory.dmpFilesize
116KB
-
memory/564-125-0x0000000006870000-0x0000000006871000-memory.dmpFilesize
4KB
-
memory/3176-126-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/3176-127-0x00000000004139DE-mapping.dmp
-
memory/3176-128-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB