Resubmissions
28/09/2022, 11:40
220928-ns1f3sfga3 1028/09/2022, 11:38
220928-nrwfqsgham 1020/09/2022, 18:29
220920-w4ww2aebe7 10Analysis
-
max time kernel
65s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/09/2022, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
fbfff6bcad01af250db49a1c8eae44a9-sample.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbfff6bcad01af250db49a1c8eae44a9-sample.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Product Inquiry.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Product Inquiry.exe
Resource
win10v2004-20220901-en
General
-
Target
Product Inquiry.exe
-
Size
739KB
-
MD5
e39415e5d17d41a78225c01891aa22f2
-
SHA1
8904aad72fd51eb5562d778d146fd0b103e3b38e
-
SHA256
77c100c1960321c3fa9be5157fb9f9e21d9c0ab60d1106df819e431516462ce4
-
SHA512
763c25df84b349ca9fac593adc242bb47e1daa18e87e01e986a6680acca2eec85b9de05939493842945bf9c4693d156e71fd843b4501a36eaf99929a95134cef
-
SSDEEP
12288:IfGMXIWX76Gbs4AobUmYBEmYHgYRFVNJw2Ma1ryxG:IfGbI7pq3EnxW9apyxG
Malware Config
Extracted
lokibot
http://162.0.223.13/?loop
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product Inquiry.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product Inquiry.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product Inquiry.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1576 set thread context of 1784 1576 Product Inquiry.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1576 Product Inquiry.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1784 Product Inquiry.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 Product Inquiry.exe Token: SeDebugPrivilege 1784 Product Inquiry.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1576 wrote to memory of 916 1576 Product Inquiry.exe 28 PID 1576 wrote to memory of 916 1576 Product Inquiry.exe 28 PID 1576 wrote to memory of 916 1576 Product Inquiry.exe 28 PID 1576 wrote to memory of 916 1576 Product Inquiry.exe 28 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 PID 1576 wrote to memory of 1784 1576 Product Inquiry.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product Inquiry.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product Inquiry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"2⤵PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1784
-