Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 20:46
Static task
static1
Behavioral task
behavioral1
Sample
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe
Resource
win7-20220718-en
General
-
Target
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe
-
Size
478KB
-
MD5
27b5a2ae4b7829e5c4a6be8c05f0af66
-
SHA1
f0a03d7f0aff41e5458436f0241c8a1e59002e76
-
SHA256
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb
-
SHA512
7d2b5a3731f3e38118bc1d25354782e79913e79408439a74d121bef546ab21e60330d9cf73a083bdcf19d20327d5ace3b3261fbb97acbb0318556050b4d917a8
Malware Config
Extracted
lokibot
http://mclhk-net.com/hiswounds/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" AppLaunch.exe -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" AppLaunch.exe -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" AppLaunch.exe -
Processes:
resource yara_rule behavioral2/memory/2488-136-0x0000000002230000-0x00000000032EA000-memory.dmp upx behavioral2/memory/2488-139-0x0000000002230000-0x00000000032EA000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AppLaunch.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AppLaunch.exedescription ioc process File opened (read-only) \??\J: AppLaunch.exe File opened (read-only) \??\K: AppLaunch.exe File opened (read-only) \??\L: AppLaunch.exe File opened (read-only) \??\E: AppLaunch.exe File opened (read-only) \??\F: AppLaunch.exe File opened (read-only) \??\G: AppLaunch.exe File opened (read-only) \??\H: AppLaunch.exe File opened (read-only) \??\I: AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exedescription pid process target process PID 4428 set thread context of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe -
Drops file in Windows directory 4 IoCs
Processes:
AppLaunch.exe53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exedescription ioc process File created C:\Windows\e5867ae AppLaunch.exe File opened for modification C:\Windows\SYSTEM.INI AppLaunch.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AppLaunch.exepid process 2488 AppLaunch.exe 2488 AppLaunch.exe 2488 AppLaunch.exe 2488 AppLaunch.exe 2488 AppLaunch.exe 2488 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe Token: SeDebugPrivilege 2488 AppLaunch.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exeAppLaunch.exedescription pid process target process PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 4428 wrote to memory of 2488 4428 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe AppLaunch.exe PID 2488 wrote to memory of 764 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 772 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 1016 2488 AppLaunch.exe dwm.exe PID 2488 wrote to memory of 2492 2488 AppLaunch.exe sihost.exe PID 2488 wrote to memory of 2504 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 2604 2488 AppLaunch.exe taskhostw.exe PID 2488 wrote to memory of 2648 2488 AppLaunch.exe Explorer.EXE PID 2488 wrote to memory of 3104 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 3284 2488 AppLaunch.exe DllHost.exe PID 2488 wrote to memory of 3380 2488 AppLaunch.exe StartMenuExperienceHost.exe PID 2488 wrote to memory of 3444 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 3544 2488 AppLaunch.exe SearchApp.exe PID 2488 wrote to memory of 3788 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 4408 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 4428 2488 AppLaunch.exe 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe PID 2488 wrote to memory of 4428 2488 AppLaunch.exe 53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe PID 2488 wrote to memory of 764 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 772 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 1016 2488 AppLaunch.exe dwm.exe PID 2488 wrote to memory of 2492 2488 AppLaunch.exe sihost.exe PID 2488 wrote to memory of 2504 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 2604 2488 AppLaunch.exe taskhostw.exe PID 2488 wrote to memory of 2648 2488 AppLaunch.exe Explorer.EXE PID 2488 wrote to memory of 3104 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 3284 2488 AppLaunch.exe DllHost.exe PID 2488 wrote to memory of 3380 2488 AppLaunch.exe StartMenuExperienceHost.exe PID 2488 wrote to memory of 3444 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 3544 2488 AppLaunch.exe SearchApp.exe PID 2488 wrote to memory of 3788 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 4408 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 764 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 772 2488 AppLaunch.exe fontdrvhost.exe PID 2488 wrote to memory of 1016 2488 AppLaunch.exe dwm.exe PID 2488 wrote to memory of 2492 2488 AppLaunch.exe sihost.exe PID 2488 wrote to memory of 2504 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 2604 2488 AppLaunch.exe taskhostw.exe PID 2488 wrote to memory of 2648 2488 AppLaunch.exe Explorer.EXE PID 2488 wrote to memory of 3104 2488 AppLaunch.exe svchost.exe PID 2488 wrote to memory of 3284 2488 AppLaunch.exe DllHost.exe PID 2488 wrote to memory of 3380 2488 AppLaunch.exe StartMenuExperienceHost.exe PID 2488 wrote to memory of 3444 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 3544 2488 AppLaunch.exe SearchApp.exe PID 2488 wrote to memory of 3788 2488 AppLaunch.exe RuntimeBroker.exe PID 2488 wrote to memory of 4408 2488 AppLaunch.exe RuntimeBroker.exe -
outlook_office_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook AppLaunch.exe -
outlook_win_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppLaunch.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe"C:\Users\Admin\AppData\Local\Temp\53fcd7145bfb3737dc67bff3f7fe79997471c8171328dd10323da5fdb100d2eb.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2488-132-0x0000000000000000-mapping.dmp
-
memory/2488-133-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2488-135-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2488-137-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2488-136-0x0000000002230000-0x00000000032EA000-memory.dmpFilesize
16.7MB
-
memory/2488-138-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2488-139-0x0000000002230000-0x00000000032EA000-memory.dmpFilesize
16.7MB
-
memory/4428-130-0x00000000751D0000-0x0000000075781000-memory.dmpFilesize
5.7MB
-
memory/4428-131-0x00000000751D0000-0x0000000075781000-memory.dmpFilesize
5.7MB
-
memory/4428-140-0x00000000751D0000-0x0000000075781000-memory.dmpFilesize
5.7MB