Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 09:11
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
682KB
-
MD5
6f2ad08514a304c31b1a7ad3cd6b8892
-
SHA1
56ed290d454a364c74c64dec541bd180abfc9cde
-
SHA256
0d3e3b77f530d1d4ae4abc3ac74283ea6e6ff41784a14447e925ee88e6d057c5
-
SHA512
7f9daa48a2ea651aafa94c2ae77d232f0cf0162cebb08c3c97d37bae1adfc862b2dea4b47f02ded57a824fb0615505dd0c8ea1b33cc7b0ba72dde114b876dcba
-
SSDEEP
6144:meTovsajJASxSm08OGO9XgQlGlNo6w8PGA3dkhxRcDXsto5tq:zeMGOGO9dclNoN8Pr3Sr4s
Malware Config
Extracted
lokibot
http://208.67.105.161/jungleone/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1944 set thread context of 4568 1944 tmp.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 tmp.exe 1944 tmp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4568 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1944 tmp.exe Token: SeDebugPrivilege 4568 tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1088 1944 tmp.exe 89 PID 1944 wrote to memory of 1088 1944 tmp.exe 89 PID 1944 wrote to memory of 1088 1944 tmp.exe 89 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 PID 1944 wrote to memory of 4568 1944 tmp.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4568
-