Resubmissions
28-09-2022 11:40
220928-ns1f3sfga3 1028-09-2022 11:38
220928-nrwfqsgham 1020-09-2022 18:29
220920-w4ww2aebe7 10Analysis
-
max time kernel
76s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 11:40
Static task
static1
Behavioral task
behavioral1
Sample
fbfff6bcad01af250db49a1c8eae44a9-sample.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbfff6bcad01af250db49a1c8eae44a9-sample.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Product Inquiry.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Product Inquiry.exe
Resource
win10v2004-20220901-en
General
-
Target
Product Inquiry.exe
-
Size
739KB
-
MD5
e39415e5d17d41a78225c01891aa22f2
-
SHA1
8904aad72fd51eb5562d778d146fd0b103e3b38e
-
SHA256
77c100c1960321c3fa9be5157fb9f9e21d9c0ab60d1106df819e431516462ce4
-
SHA512
763c25df84b349ca9fac593adc242bb47e1daa18e87e01e986a6680acca2eec85b9de05939493842945bf9c4693d156e71fd843b4501a36eaf99929a95134cef
-
SSDEEP
12288:IfGMXIWX76Gbs4AobUmYBEmYHgYRFVNJw2Ma1ryxG:IfGbI7pq3EnxW9apyxG
Malware Config
Extracted
lokibot
http://162.0.223.13/?loop
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product Inquiry.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product Inquiry.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product Inquiry.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4836 set thread context of 2296 4836 Product Inquiry.exe 99 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2296 Product Inquiry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 Product Inquiry.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 PID 4836 wrote to memory of 2296 4836 Product Inquiry.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product Inquiry.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product Inquiry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Product Inquiry.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2296
-