Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
scan00465.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan00465.pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
scan00465.pdf.exe
-
Size
256KB
-
MD5
5c23fa7ba9d5437af31e65a25e02ebeb
-
SHA1
c4fe673e802437070e42e717166128770db035d8
-
SHA256
6ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
-
SHA512
6f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
Malware Config
Extracted
lokibot
http://20gharch.ir/catalog/mike/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
scan00465.pdf.exescan00465.pdf.exescan00465.pdf.exepid process 1728 scan00465.pdf.exe 916 scan00465.pdf.exe 1764 scan00465.pdf.exe -
Loads dropped DLL 3 IoCs
Processes:
scan00465.pdf.exepid process 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
scan00465.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook scan00465.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook scan00465.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook scan00465.pdf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
scan00465.pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\B = "\"C:\\Users\\Admin\\B.exe\"" scan00465.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
scan00465.pdf.exedescription pid process target process PID 1652 set thread context of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
scan00465.pdf.exepid process 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe 1652 scan00465.pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
scan00465.pdf.exepid process 1764 scan00465.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
scan00465.pdf.exescan00465.pdf.exedescription pid process Token: SeDebugPrivilege 1652 scan00465.pdf.exe Token: SeDebugPrivilege 1764 scan00465.pdf.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
scan00465.pdf.exedescription pid process target process PID 1652 wrote to memory of 1728 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1728 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1728 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1728 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 916 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 916 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 916 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 916 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe PID 1652 wrote to memory of 1764 1652 scan00465.pdf.exe scan00465.pdf.exe -
outlook_office_path 1 IoCs
Processes:
scan00465.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook scan00465.pdf.exe -
outlook_win_path 1 IoCs
Processes:
scan00465.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook scan00465.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
\Users\Admin\AppData\Local\Temp\scan00465.pdf.exeFilesize
256KB
MD55c23fa7ba9d5437af31e65a25e02ebeb
SHA1c4fe673e802437070e42e717166128770db035d8
SHA2566ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
SHA5126f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
-
memory/1652-59-0x0000000000610000-0x0000000000626000-memory.dmpFilesize
88KB
-
memory/1652-60-0x0000000001F50000-0x0000000001F62000-memory.dmpFilesize
72KB
-
memory/1652-54-0x0000000000B00000-0x0000000000B46000-memory.dmpFilesize
280KB
-
memory/1652-58-0x0000000000500000-0x0000000000516000-memory.dmpFilesize
88KB
-
memory/1652-57-0x0000000000AC0000-0x0000000000AEE000-memory.dmpFilesize
184KB
-
memory/1652-56-0x00000000003D0000-0x00000000003D8000-memory.dmpFilesize
32KB
-
memory/1652-55-0x0000000076721000-0x0000000076723000-memory.dmpFilesize
8KB
-
memory/1764-67-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-69-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-72-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-71-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-74-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-75-0x00000000004139DE-mapping.dmp
-
memory/1764-66-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-78-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1764-80-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB