Analysis
-
max time kernel
126s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 03:43
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.28996.exe
Resource
win7-20220414-en
General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.28996.exe
-
Size
196KB
-
MD5
df608b1e6ca45b46e336d6b2c1459f80
-
SHA1
487d773c1c290028ef6070f4650ab9f59bea1dc5
-
SHA256
436f9c683b9e4050424953affd1d48ea9973687a89763b7f83d81cf5eb0ec7d2
-
SHA512
5a2e81fc0648cae440c9545b8a2190ea4773ede90a50e2ccfe9252ba47aa65d14f7c54cd8d12e4bbcd8be0a0e58ffc211d40cf85188674b9d322922e399fc231
Malware Config
Extracted
lokibot
http://vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.W32.AIDetectNet.01.28996.exedescription pid process target process PID 4780 set thread context of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.W32.AIDetectNet.01.28996.exepid process 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.W32.AIDetectNet.01.28996.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe Token: SeDebugPrivilege 3008 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SecuriteInfo.com.W32.AIDetectNet.01.28996.exedescription pid process target process PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe PID 4780 wrote to memory of 3008 4780 SecuriteInfo.com.W32.AIDetectNet.01.28996.exe AddInProcess32.exe -
outlook_office_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AddInProcess32.exe -
outlook_win_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.28996.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.28996.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3008