Analysis
-
max time kernel
184s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 17:03
Static task
static1
Behavioral task
behavioral1
Sample
factura comercial.exe
Resource
win7-20220414-en
General
-
Target
factura comercial.exe
-
Size
1.8MB
-
MD5
95b1a3cfa2d4df2598682cbc945a0544
-
SHA1
daad0dcf697838a0d2209490d0382370248d8647
-
SHA256
67ce061bac5dd35217eebc864b76f730cdab413ed6620660b80e95dec5868d3f
-
SHA512
c5dd2da04fb99f900ebc8945028c4e0bde6f26404840d07751db98407811da3220d92c791686ab5e2eed18a68994b60becc10b3c4e84dde7ad96b7ff645f8fea
Malware Config
Extracted
lokibot
http://sempersim.su/gi7/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
logman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook logman.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook logman.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook logman.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
factura comercial.exedescription pid process target process PID 2280 set thread context of 5036 2280 factura comercial.exe logman.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
factura comercial.exepid process 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe 2280 factura comercial.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
factura comercial.exelogman.exedescription pid process Token: SeDebugPrivilege 2280 factura comercial.exe Token: SeDebugPrivilege 5036 logman.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
factura comercial.exedescription pid process target process PID 2280 wrote to memory of 2720 2280 factura comercial.exe finger.exe PID 2280 wrote to memory of 2720 2280 factura comercial.exe finger.exe PID 2280 wrote to memory of 2720 2280 factura comercial.exe finger.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe PID 2280 wrote to memory of 5036 2280 factura comercial.exe logman.exe -
outlook_office_path 1 IoCs
Processes:
logman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook logman.exe -
outlook_win_path 1 IoCs
Processes:
logman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook logman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura comercial.exe"C:\Users\Admin\AppData\Local\Temp\factura comercial.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵PID:2720
-
C:\Windows\SysWOW64\logman.exe"C:\Windows\SysWOW64\logman.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5036