Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
pcF86Gq4XlV8Ret.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
pcF86Gq4XlV8Ret.exe
Resource
win10v2004-20220901-en
General
-
Target
pcF86Gq4XlV8Ret.exe
-
Size
773KB
-
MD5
a3c1e42dc5c3d02d9c9490d4d18a948f
-
SHA1
85fce73b5cbabf6d00a40de14e4ed0f9e820ad12
-
SHA256
f7244eade0a50a5930477229bdb0f48567a84d96ae1bcc6309b3712d68b3f1f2
-
SHA512
94ba403c19edccbf2c44c03632b0e5ced4433d7ea0eeb58ce724c2114baf6ad4408f80ff239f7157ca6e3fc0985fbe0c6c05ba0313dd2a4a6214520fcdfe68e1
-
SSDEEP
12288:iSx1OZv+6bQWULeSewFbFRaMFD3s77ynaC:34+6EWULeSewRRDeya
Malware Config
Extracted
lokibot
http://171.22.30.147/user/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook pcF86Gq4XlV8Ret.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook pcF86Gq4XlV8Ret.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook pcF86Gq4XlV8Ret.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 368 set thread context of 3948 368 pcF86Gq4XlV8Ret.exe 99 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3948 pcF86Gq4XlV8Ret.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3948 pcF86Gq4XlV8Ret.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 PID 368 wrote to memory of 3948 368 pcF86Gq4XlV8Ret.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook pcF86Gq4XlV8Ret.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook pcF86Gq4XlV8Ret.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pcF86Gq4XlV8Ret.exe"C:\Users\Admin\AppData\Local\Temp\pcF86Gq4XlV8Ret.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\pcF86Gq4XlV8Ret.exe"C:\Users\Admin\AppData\Local\Temp\pcF86Gq4XlV8Ret.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3948
-