Analysis
-
max time kernel
112s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 10:52
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile.exe
Resource
win7-20220414-en
General
-
Target
Company Profile.exe
-
Size
726KB
-
MD5
337ec19a59c4dc76e7edeac2beebadc5
-
SHA1
6eb66f45d920d97cb189abe93e703055f182c311
-
SHA256
4b76a74852fe730433ccd52b13750fd292efb735891f1797ed5c8bdbe62a0385
-
SHA512
2fdddd7c1b3c3237147afd6520b34c1276fb24d4526a0eda42cb089c31b7cb135e45a523ec130cd9858c9f9a5b31096e1031f42cb003749dd72c339251d7d737
Malware Config
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Company Profile.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Company Profile.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Company Profile.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Company Profile.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Company Profile.exedescription pid process target process PID 740 set thread context of 1020 740 Company Profile.exe Company Profile.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Company Profile.exepid process 740 Company Profile.exe 740 Company Profile.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Company Profile.exepid process 740 Company Profile.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Company Profile.exepid process 1020 Company Profile.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Company Profile.exedescription pid process Token: SeDebugPrivilege 1020 Company Profile.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Company Profile.exedescription pid process target process PID 740 wrote to memory of 1020 740 Company Profile.exe Company Profile.exe PID 740 wrote to memory of 1020 740 Company Profile.exe Company Profile.exe PID 740 wrote to memory of 1020 740 Company Profile.exe Company Profile.exe -
outlook_office_path 1 IoCs
Processes:
Company Profile.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Company Profile.exe -
outlook_win_path 1 IoCs
Processes:
Company Profile.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Company Profile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1020
-