COVID-19 TRANSFER RECEIPT FORM_pdf.exe
1MB
21-05-2022 18:38
behavioral2
1678a6372c11592d92876749482fd18e
e7001067022152bc76445369c9c14f59e0097fdc
2a3c60d816836bf1cecb31f34d4eaf5b93976c123364538d5b8e22e9272e1269
fa2bc8977f0c929fd6baafaf863b809a38eb6704f05199ec6073cda40116ffc169c6ea33079cbd367f21084ad6a581dabd989e5f4163fa2f4648406c35fc778b
Extracted
Family | lokibot |
C2 |
http://attlogistics-vn.com/first/chief2/fre.php http://kbfvzoboss.bid/alien/fre.php http://alphastand.trade/alien/fre.php http://alphastand.win/alien/fre.php http://alphastand.top/alien/fre.php |
Filter: none
-
Lokibot
Description
Lokibot is a Password and CryptoCoin Wallet Stealer.
Tags
-
Accesses Microsoft Outlook profilesdllhost.exe
Tags
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
Suspicious use of SetThreadContextCOVID-19 TRANSFER RECEIPT FORM_pdf.exe
Reported IOCs
description pid process target process PID 3588 set thread context of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe -
Suspicious use of AdjustPrivilegeTokendllhost.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 4968 dllhost.exe -
Suspicious use of FindShellTrayWindowCOVID-19 TRANSFER RECEIPT FORM_pdf.exe
Reported IOCs
pid process 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe -
Suspicious use of SendNotifyMessageCOVID-19 TRANSFER RECEIPT FORM_pdf.exe
Reported IOCs
pid process 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe -
Suspicious use of WriteProcessMemoryCOVID-19 TRANSFER RECEIPT FORM_pdf.exe
Reported IOCs
description pid process target process PID 3588 wrote to memory of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe PID 3588 wrote to memory of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe PID 3588 wrote to memory of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe PID 3588 wrote to memory of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe PID 3588 wrote to memory of 4968 3588 COVID-19 TRANSFER RECEIPT FORM_pdf.exe dllhost.exe -
outlook_office_pathdllhost.exe
Reported IOCs
description ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_pathdllhost.exe
Reported IOCs
description ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
-
C:\Users\Admin\AppData\Local\Temp\COVID-19 TRANSFER RECEIPT FORM_pdf.exe"C:\Users\Admin\AppData\Local\Temp\COVID-19 TRANSFER RECEIPT FORM_pdf.exe"Suspicious use of SetThreadContextSuspicious use of FindShellTrayWindowSuspicious use of SendNotifyMessageSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"Accesses Microsoft Outlook profilesSuspicious use of AdjustPrivilegeTokenoutlook_office_pathoutlook_win_path
-
memory/3588-138-0x0000000000F20000-0x0000000000F55000-memory.dmp
-
memory/3588-139-0x0000000003300000-0x0000000003335000-memory.dmp
-
memory/4968-130-0x0000000000000000-mapping.dmp
-
memory/4968-131-0x0000000000400000-0x00000000004A2000-memory.dmp
-
memory/4968-137-0x0000000000400000-0x00000000004A2000-memory.dmp
-
memory/4968-140-0x0000000000400000-0x00000000004A2000-memory.dmp