Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 17:39
Static task
static1
Behavioral task
behavioral1
Sample
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe
Resource
win7-20220414-en
General
-
Target
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe
-
Size
564KB
-
MD5
b95724c316ffbab837bc0449557aca7a
-
SHA1
60bdf46e1a4949b30593737a263b31dd9b0cbcb5
-
SHA256
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac
-
SHA512
6b08f3120807d35315db5833bb91cabfb91c495236665a041155db05be3bd185247f3b1123d4291bbbbd2f6b6ee9987c647c89cd8499ddb776c0aa4982c07890
Malware Config
Extracted
lokibot
http://matbin.com/wp-includes/colors/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription pid process target process PID 1668 set thread context of 1824 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 set thread context of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Drops file in Windows directory 2 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription ioc process File opened for modification C:\Windows\win.ini 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe File opened for modification C:\Windows\win.ini 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exepid process 1328 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription pid process Token: SeDebugPrivilege 1328 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exepid process 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription pid process target process PID 1668 wrote to memory of 1824 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1668 wrote to memory of 1824 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1668 wrote to memory of 1824 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1668 wrote to memory of 1824 1668 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe PID 1824 wrote to memory of 1328 1824 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
outlook_office_path 1 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe -
outlook_win_path 1 IoCs
Processes:
72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"C:\Users\Admin\AppData\Local\Temp\72bc6c78b71fb0a8b5a668c369e115df3eed9d8d74f19fc3eed683e19fc9c0ac.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\win.iniFilesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
memory/1328-63-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1328-97-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1328-65-0x00000000004139DE-mapping.dmp
-
memory/1328-96-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1328-70-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1668-88-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-82-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-64-0x0000000077890000-0x0000000077A39000-memory.dmpFilesize
1.7MB
-
memory/1668-95-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-62-0x0000000000280000-0x000000000028C000-memory.dmpFilesize
48KB
-
memory/1668-94-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-72-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-74-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-75-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-76-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-77-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-78-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-79-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-80-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-81-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-66-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-83-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-84-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-85-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-86-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-87-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-56-0x00000000762C1000-0x00000000762C3000-memory.dmpFilesize
8KB
-
memory/1668-89-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-90-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-91-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-92-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1668-93-0x0000000077A70000-0x0000000077BF0000-memory.dmpFilesize
1.5MB
-
memory/1824-71-0x0000000077A80000-0x0000000077B56000-memory.dmpFilesize
856KB
-
memory/1824-69-0x0000000077890000-0x0000000077A39000-memory.dmpFilesize
1.7MB
-
memory/1824-67-0x00000000003F0000-0x00000000003FC000-memory.dmpFilesize
48KB
-
memory/1824-57-0x0000000000000000-mapping.dmp