Analysis
-
max time kernel
124s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 05:31
Static task
static1
Behavioral task
behavioral1
Sample
Urgent New Order.exe
Resource
win7-20220414-en
General
-
Target
Urgent New Order.exe
-
Size
533KB
-
MD5
8f738dfc3590a522f9ebef97fb7b0a06
-
SHA1
157c846283f38ca9322c2d2cdb64f2173066c71d
-
SHA256
2d1e4b59e9abe3b38c9a648d8d9d6097e6c54593c94f43e7d8005143fc422a81
-
SHA512
6466394a9ca3c333e02f3a29d951c30a3b8e7368574f67e39d4da711455765a5f229c6e222d84cf4cc6a2479450b9235f42da8b94e8f170fc45303c49ab2e4af
Malware Config
Extracted
lokibot
http://sempersim.su/gh24/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Urgent New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Urgent New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Urgent New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Urgent New Order.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Urgent New Order.exedescription pid process target process PID 3880 set thread context of 4988 3880 Urgent New Order.exe Urgent New Order.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Urgent New Order.exepid process 3880 Urgent New Order.exe 3880 Urgent New Order.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Urgent New Order.exepid process 4988 Urgent New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Urgent New Order.exeUrgent New Order.exedescription pid process Token: SeDebugPrivilege 3880 Urgent New Order.exe Token: SeDebugPrivilege 4988 Urgent New Order.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Urgent New Order.exedescription pid process target process PID 3880 wrote to memory of 5016 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 5016 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 5016 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe PID 3880 wrote to memory of 4988 3880 Urgent New Order.exe Urgent New Order.exe -
outlook_office_path 1 IoCs
Processes:
Urgent New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Urgent New Order.exe -
outlook_win_path 1 IoCs
Processes:
Urgent New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Urgent New Order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"2⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"C:\Users\Admin\AppData\Local\Temp\Urgent New Order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4988