Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
Resource
win10v2004-20220414-en
General
-
Target
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
-
Size
42KB
-
MD5
f0f88a07d09f67166c66928fba2acec7
-
SHA1
df73292977606a0a5d5b53bcdf638dd042b8dbc5
-
SHA256
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77
-
SHA512
27e10e7658543dd1ee9c8abdd999e1849beef0d9ef23447902c7b845901670b9d03fb5129d7815af0865f81e2749f8bde873cac30bde026a9a08a4ca7c65c238
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=7706107617708711
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Awfwz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Xbiuxlyfb\\Awfwz.exe\"" da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription pid process target process PID 1580 set thread context of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1176 timeout.exe -
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exeda6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exepid process 1956 powershell.exe 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeda6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe Token: SeDebugPrivilege 608 InstallUtil.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.execmd.exedescription pid process target process PID 1580 wrote to memory of 1956 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 1580 wrote to memory of 1956 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 1580 wrote to memory of 1956 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 1580 wrote to memory of 1956 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 1580 wrote to memory of 432 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 1580 wrote to memory of 432 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 1580 wrote to memory of 432 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 1580 wrote to memory of 432 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 432 wrote to memory of 1176 432 cmd.exe timeout.exe PID 432 wrote to memory of 1176 432 cmd.exe timeout.exe PID 432 wrote to memory of 1176 432 cmd.exe timeout.exe PID 432 wrote to memory of 1176 432 cmd.exe timeout.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 1580 wrote to memory of 608 1580 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe"C:\Users\Admin\AppData\Local\Temp\da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1176
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:608
-