Analysis
-
max time kernel
132s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
Resource
win10v2004-20220414-en
General
-
Target
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe
-
Size
42KB
-
MD5
f0f88a07d09f67166c66928fba2acec7
-
SHA1
df73292977606a0a5d5b53bcdf638dd042b8dbc5
-
SHA256
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77
-
SHA512
27e10e7658543dd1ee9c8abdd999e1849beef0d9ef23447902c7b845901670b9d03fb5129d7815af0865f81e2749f8bde873cac30bde026a9a08a4ca7c65c238
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=7706107617708711
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Awfwz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Xbiuxlyfb\\Awfwz.exe\"" da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exedescription pid process target process PID 4780 set thread context of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1712 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeda6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exepid process 1180 powershell.exe 1180 powershell.exe 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeda6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe Token: SeDebugPrivilege 1876 InstallUtil.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.execmd.exedescription pid process target process PID 4780 wrote to memory of 1180 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 4780 wrote to memory of 1180 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 4780 wrote to memory of 1180 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe powershell.exe PID 4780 wrote to memory of 956 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 4780 wrote to memory of 956 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 4780 wrote to memory of 956 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe cmd.exe PID 956 wrote to memory of 1712 956 cmd.exe timeout.exe PID 956 wrote to memory of 1712 956 cmd.exe timeout.exe PID 956 wrote to memory of 1712 956 cmd.exe timeout.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe PID 4780 wrote to memory of 1876 4780 da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe"C:\Users\Admin\AppData\Local\Temp\da6abf1cf5f714cb5ce1529f5e2ef93201325fb9eb45af81fd22d82fb3857d77.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1712
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1876
-