Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 05:32
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20220414-en
General
-
Target
New Order.exe
-
Size
238KB
-
MD5
0e3d09ecb4359b1ed85d8239b65fb5b4
-
SHA1
e41e74634e37c260857cd4d003056475c87e2f46
-
SHA256
34c4934114c4dcdac5a0affe7ac3d2f37c5856579a9ede253c9e02cd12f76e87
-
SHA512
a2393ff366d07c4259f638da935bcf78a27233115771e51fd61ef1a73bd4fc0a0f2f3abb845812ef651c92798a4179c42ef361d4d1564df00f259b3f703a1a63
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=8655983264725314
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
cvtres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
New Order.exedescription pid process target process PID 4168 set thread context of 4448 4168 New Order.exe cvtres.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
New Order.exepid process 4168 New Order.exe 4168 New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New Order.execvtres.exedescription pid process Token: SeDebugPrivilege 4168 New Order.exe Token: SeDebugPrivilege 4448 cvtres.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New Order.exedescription pid process target process PID 4168 wrote to memory of 3772 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 3772 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 3772 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe PID 4168 wrote to memory of 4448 4168 New Order.exe cvtres.exe -
outlook_office_path 1 IoCs
Processes:
cvtres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cvtres.exe -
outlook_win_path 1 IoCs
Processes:
cvtres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵PID:3772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4448
-