Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
28-10-2021 11:40
Static task
static1
Behavioral task
behavioral1
Sample
1b4af97e5bb29267e445511854e12b87.exe
Resource
win7-en-20211014
General
-
Target
1b4af97e5bb29267e445511854e12b87.exe
-
Size
306KB
-
MD5
1b4af97e5bb29267e445511854e12b87
-
SHA1
a7926b9620dd9579843534f254625c54689b328a
-
SHA256
7ea5f5d1f96eb486c8fd9293d8bb390656e4fb60caebeae993e9a911b9378009
-
SHA512
d83419103d890d97465bd73f66031129e739f68536de31ab803cc73adf16071a38cc2cba6f859716d067d07c59b8a136f0287fa58e87359c1e39d47620cbbe3e
Malware Config
Extracted
lokibot
http://bobbyelectronics.xyz/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1b4af97e5bb29267e445511854e12b87.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 1b4af97e5bb29267e445511854e12b87.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 1b4af97e5bb29267e445511854e12b87.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription pid process target process PID 3124 set thread context of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exepid process 2864 1b4af97e5bb29267e445511854e12b87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription pid process Token: SeDebugPrivilege 2864 1b4af97e5bb29267e445511854e12b87.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription pid process target process PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe PID 3124 wrote to memory of 2864 3124 1b4af97e5bb29267e445511854e12b87.exe 1b4af97e5bb29267e445511854e12b87.exe -
outlook_office_path 1 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 1b4af97e5bb29267e445511854e12b87.exe -
outlook_win_path 1 IoCs
Processes:
1b4af97e5bb29267e445511854e12b87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1b4af97e5bb29267e445511854e12b87.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b4af97e5bb29267e445511854e12b87.exe"C:\Users\Admin\AppData\Local\Temp\1b4af97e5bb29267e445511854e12b87.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\1b4af97e5bb29267e445511854e12b87.exe"C:\Users\Admin\AppData\Local\Temp\1b4af97e5bb29267e445511854e12b87.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2864