Analysis
-
max time kernel
108s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 04:41
Static task
static1
Behavioral task
behavioral1
Sample
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe
Resource
win10v2004-20220414-en
General
-
Target
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe
-
Size
1.7MB
-
MD5
2a3c99efdf911432be4a154eba65d280
-
SHA1
283f7b1db8ca593fcd3a34795e6ab3adcb7d01c5
-
SHA256
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073
-
SHA512
2688a925c2e70116683e6b19c8865d858c74e93f9b47f95f11d5587fab62592eb693831e8bc1b969fc3423cd3f379c4c0daa64b7f819a28247c60bbf3c15abc1
Malware Config
Extracted
lokibot
http://jalango.co.ke/js/loki/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
iheuche009.hopto.org:1199
-
activex_autorun
true
-
activex_key
{4QIS0Y00-K788-3BRR-G510-L26XY452725R}
-
copy_executable
true
-
delete_original
false
-
host_id
Bushbush
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
RjCRIvgp
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Avast
-
use_mutex
true
Signatures
-
NetWire RAT payload 9 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Roaming\Install\Host.exe netwire \Users\Admin\AppData\Roaming\Install\Host.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire -
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Executes dropped EXE 3 IoCs
Processes:
build.exeHost.exeHost.exepid process 1464 build.exe 608 Host.exe 304 Host.exe -
Modifies Installed Components in the registry 2 TTPs
-
Loads dropped DLL 10 IoCs
Processes:
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exeHost.exepid process 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 608 Host.exe 608 Host.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook build.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook build.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook build.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Avast = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exedescription pid process target process PID 1280 set thread context of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
build.exedescription pid process Token: SeDebugPrivilege 1464 build.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exeHost.exedescription pid process target process PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1280 wrote to memory of 1828 1280 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe PID 1828 wrote to memory of 1464 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe build.exe PID 1828 wrote to memory of 1464 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe build.exe PID 1828 wrote to memory of 1464 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe build.exe PID 1828 wrote to memory of 1464 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe build.exe PID 1828 wrote to memory of 608 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe Host.exe PID 1828 wrote to memory of 608 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe Host.exe PID 1828 wrote to memory of 608 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe Host.exe PID 1828 wrote to memory of 608 1828 06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe Host.exe PID 608 wrote to memory of 304 608 Host.exe Host.exe PID 608 wrote to memory of 304 608 Host.exe Host.exe PID 608 wrote to memory of 304 608 Host.exe Host.exe PID 608 wrote to memory of 304 608 Host.exe Host.exe -
outlook_office_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook build.exe -
outlook_win_path 1 IoCs
Processes:
build.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe"C:\Users\Admin\AppData\Local\Temp\06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe"C:\Users\Admin\AppData\Local\Temp\06c2c1fc8390057ac84187992ac08c05a66ca2e1d75ca2b9a6c386c8ce7b5073.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:304
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
104KB
MD531ea420cf590a09f3639ed320d8de2fc
SHA1319f73ee5cc10659d861c40fabb74d9b6aca805d
SHA2567bedfd941d0a8d44fed08f9d2b9c8c5fcf1964815f15f5b6678d20450186c775
SHA5126d4ab4e287bba9c98c03dba43dc8b8ef12cacb4c719bc510e8fe927c0eaea1cfb0f1f47fc94cbed3820c23797128eaca0a123dd17eb62eafd4c1adf5be921724
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14
-
Filesize
132KB
MD5530bb6565f24112710a4a51adb1fa1d7
SHA1ad9ad907407f95b7c08e578fd3b8b64288caaf8c
SHA256063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573
SHA512a86e818c7bf383c2a73ce8f3c7e629efb35d92b42755f888f579c7505d8781b6cde7acd497fe35758a28950f5093495028984bba051a6ad44950f22ad3f2dd14