Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
Quotataion Request.exe
Resource
win7-20220414-en
General
-
Target
Quotataion Request.exe
-
Size
587KB
-
MD5
040e497c26b9609145715352da4e76d1
-
SHA1
901893e827a35fddca1563c35514c69d86899993
-
SHA256
b7a17727462906ac85e4082ac63a7a3884e67c222e36e9696e445b3ff882bf28
-
SHA512
be1d41b502417f17fffacc5359cf2a4c4c09815543d0288d87e7834429ea797edb8fde7f7bcf64b67e5932329b20743c9766632bd6b90247c61b00e88e6bbc87
Malware Config
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Quotataion Request.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Quotataion Request.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Quotataion Request.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Quotataion Request.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Quotataion Request.exedescription pid process target process PID 1784 set thread context of 2012 1784 Quotataion Request.exe Quotataion Request.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Quotataion Request.exepid process 1784 Quotataion Request.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Quotataion Request.exepid process 1784 Quotataion Request.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Quotataion Request.exepid process 2012 Quotataion Request.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Quotataion Request.exedescription pid process Token: SeDebugPrivilege 2012 Quotataion Request.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Quotataion Request.exedescription pid process target process PID 1784 wrote to memory of 2012 1784 Quotataion Request.exe Quotataion Request.exe PID 1784 wrote to memory of 2012 1784 Quotataion Request.exe Quotataion Request.exe PID 1784 wrote to memory of 2012 1784 Quotataion Request.exe Quotataion Request.exe PID 1784 wrote to memory of 2012 1784 Quotataion Request.exe Quotataion Request.exe -
outlook_office_path 1 IoCs
Processes:
Quotataion Request.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Quotataion Request.exe -
outlook_win_path 1 IoCs
Processes:
Quotataion Request.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Quotataion Request.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotataion Request.exe"C:\Users\Admin\AppData\Local\Temp\Quotataion Request.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Quotataion Request.exe"C:\Users\Admin\AppData\Local\Temp\Quotataion Request.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2012
-