Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 19:12
Static task
static1
Behavioral task
behavioral1
Sample
factura comercial.exe
Resource
win7-20220414-en
General
-
Target
factura comercial.exe
-
Size
1.8MB
-
MD5
95b1a3cfa2d4df2598682cbc945a0544
-
SHA1
daad0dcf697838a0d2209490d0382370248d8647
-
SHA256
67ce061bac5dd35217eebc864b76f730cdab413ed6620660b80e95dec5868d3f
-
SHA512
c5dd2da04fb99f900ebc8945028c4e0bde6f26404840d07751db98407811da3220d92c791686ab5e2eed18a68994b60becc10b3c4e84dde7ad96b7ff645f8fea
Malware Config
Extracted
lokibot
http://sempersim.su/gi7/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
finger.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook finger.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook finger.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook finger.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
factura comercial.exedescription pid process target process PID 1876 set thread context of 2324 1876 factura comercial.exe finger.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
factura comercial.exepid process 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe 1876 factura comercial.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
factura comercial.exefinger.exedescription pid process Token: SeDebugPrivilege 1876 factura comercial.exe Token: SeDebugPrivilege 2324 finger.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
factura comercial.exedescription pid process target process PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe PID 1876 wrote to memory of 2324 1876 factura comercial.exe finger.exe -
outlook_office_path 1 IoCs
Processes:
finger.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook finger.exe -
outlook_win_path 1 IoCs
Processes:
finger.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook finger.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura comercial.exe"C:\Users\Admin\AppData\Local\Temp\factura comercial.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2324
-