Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
Awb# 8457108962.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Awb# 8457108962.exe
Resource
win10v2004-20220812-en
General
-
Target
Awb# 8457108962.exe
-
Size
742KB
-
MD5
611fc93313201df4eae03b7bbcbe6593
-
SHA1
69a0b64e287e6c80e34a82cccf0d7d9adec867a1
-
SHA256
d7040f6ca468fa109e07c9234f27bc800f61df2b92a81c281dc15bf977643fef
-
SHA512
48b1a2364b6c68746377d2c090393a1c2b90fe007bdb9c42f503489c9b89ae3f15c9129964b874d1fde8f996aaec66b864b3df14c162c61e079a84725c943583
-
SSDEEP
6144:UxdffI5FtqA/uAyEMLyHD5OnA1dJvTyUbjDMWBRbTDuRTU+K5j9YoKxtPfih0m+g:IffI5FEA7yPsCE/v2kjBfbXzyt
Malware Config
Extracted
lokibot
http://162.0.223.13/?hzdKYPe2NN00dbVeFPp1FT0UhH4EgLUyl7jjXxmKlmLyyGNdwdfc7f6oXa3eW
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Awb# 8457108962.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Awb# 8457108962.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Awb# 8457108962.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 2652 808 Awb# 8457108962.exe 91 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 808 Awb# 8457108962.exe 808 Awb# 8457108962.exe 808 Awb# 8457108962.exe 808 Awb# 8457108962.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 Awb# 8457108962.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 808 Awb# 8457108962.exe Token: SeDebugPrivilege 2652 Awb# 8457108962.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 808 wrote to memory of 4312 808 Awb# 8457108962.exe 89 PID 808 wrote to memory of 4312 808 Awb# 8457108962.exe 89 PID 808 wrote to memory of 4312 808 Awb# 8457108962.exe 89 PID 808 wrote to memory of 3780 808 Awb# 8457108962.exe 90 PID 808 wrote to memory of 3780 808 Awb# 8457108962.exe 90 PID 808 wrote to memory of 3780 808 Awb# 8457108962.exe 90 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 PID 808 wrote to memory of 2652 808 Awb# 8457108962.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Awb# 8457108962.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Awb# 8457108962.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"2⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"2⤵PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"C:\Users\Admin\AppData\Local\Temp\Awb# 8457108962.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2652
-