Analysis

  • max time kernel
    85s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2022, 07:50

General

  • Target

    SecuriteInfo.com.Mal.Generic-S.31559.exe

  • Size

    405KB

  • MD5

    ec9b172ab41e8140d3f4410d391a5cf2

  • SHA1

    3f233527ae66b9f8ba1541b6111ec740fb64894a

  • SHA256

    19b6b6474d7c1f9b4dceac97c5e04973c2c6a9f0fa5db557aac4c2822251ffe8

  • SHA512

    44fc91192aa9bb6f007bb68beb1555c40c7014683c7992fb74ec095be0bc5232fa19904f7bd500dbe3a7b16c218e9ebd7eaafea3dfaaf1699dc086796a8ff3b0

  • SSDEEP

    6144:EEh9vQptxn/AcN4nSVzhYCk1QNvy+guHJsw/KhCd8bA6+JEo9TWMrGg:ERfTiSzM+5pEAKbA6IE0/p

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.Generic-S.31559.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.Generic-S.31559.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.Generic-S.31559.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.Generic-S.31559.exe"
      2⤵
      • Checks QEMU agent file
      • Accesses Microsoft Outlook profiles
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nst3A06.tmp\Math.dll

    Filesize

    171KB

    MD5

    6842d53e7b4e7d3f0cd2e45fe4616320

    SHA1

    f7b8d00938d81c1dd93e40c2c19fe3512bf3bf0c

    SHA256

    03a6d1477f124fd0c01b605a5ba14049a9b6ab33f8f0c467c1391ded90679de5

    SHA512

    c2cb00eaf298a44cffd38843e88310f1f73cff1ae1d41a6a66a0c304adabbfffd1c66d545ee01a0630edb3c267e94020d254a0b9d698b8b0f39d4dfe7ad59f48

  • \Users\Admin\AppData\Local\Temp\nst3A06.tmp\System.dll

    Filesize

    12KB

    MD5

    637e1fa13012a78922b6e98efc0b12e2

    SHA1

    8012d44e42cd6d813ea63d5ccbf190fe72e3c778

    SHA256

    703e17d30a91775f8ddc2648b537fc846fad6415589a503a4529c36f60a17439

    SHA512

    932ed6a52e89c4fa587a7c0c3903d69cf89a32dbd46ed8dcb251abb6c15192d92b1f624c31f0e4bd3e9bf95fc1a55fdb7cee9dd668e1b4f22ddb95786c063e96

  • memory/1044-64-0x0000000077940000-0x0000000077AC0000-memory.dmp

    Filesize

    1.5MB

  • memory/1044-70-0x0000000003A00000-0x0000000003B3B000-memory.dmp

    Filesize

    1.2MB

  • memory/1044-58-0x0000000003A00000-0x0000000003B3B000-memory.dmp

    Filesize

    1.2MB

  • memory/1044-59-0x0000000077760000-0x0000000077909000-memory.dmp

    Filesize

    1.7MB

  • memory/1044-57-0x0000000003A00000-0x0000000003B3B000-memory.dmp

    Filesize

    1.2MB

  • memory/1044-71-0x0000000077940000-0x0000000077AC0000-memory.dmp

    Filesize

    1.5MB

  • memory/1044-54-0x00000000756A1000-0x00000000756A3000-memory.dmp

    Filesize

    8KB

  • memory/1972-66-0x0000000077760000-0x0000000077909000-memory.dmp

    Filesize

    1.7MB

  • memory/1972-69-0x0000000077940000-0x0000000077AC0000-memory.dmp

    Filesize

    1.5MB

  • memory/1972-65-0x00000000001C0000-0x00000000002C0000-memory.dmp

    Filesize

    1024KB

  • memory/1972-63-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1972-72-0x0000000077940000-0x0000000077AC0000-memory.dmp

    Filesize

    1.5MB

  • memory/1972-73-0x0000000077940000-0x0000000077AC0000-memory.dmp

    Filesize

    1.5MB

  • memory/1972-74-0x00000000001C0000-0x00000000002C0000-memory.dmp

    Filesize

    1024KB