Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe
Resource
win10v2004-20220414-en
General
-
Target
e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe
-
Size
587KB
-
MD5
7f69debea9008e63b051c8961e521406
-
SHA1
36284716a8d57767523c7b549570ad823c8739d0
-
SHA256
e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7
-
SHA512
0b7c92f9d4e2c4f350e4f7de52caa410e702bbbc9c3ca3da2c69d6811dde41132f0f83ae34db396f5940cf8c79c231f84338b8a934c162194b413247f341fca8
Malware Config
Extracted
lokibot
http://oziltestfw.ml/officem10/logs/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 828 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 PID 1700 wrote to memory of 828 1700 e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe"C:\Users\Admin\AppData\Local\Temp\e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\e274d019488590ec7724946a1e20f4d4eb50b82413c72e0c1c88ac321af126f7.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:828
-