Analysis
-
max time kernel
132s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/09/2022, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
DRAFT FCR.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DRAFT FCR.exe
Resource
win10v2004-20220812-en
General
-
Target
DRAFT FCR.exe
-
Size
931KB
-
MD5
62c8dbcd33abd9350c3a260bc739440c
-
SHA1
1afeb4b6e349eac8c3d47b317d8ac754690c4961
-
SHA256
2d298cd1f78a6a239b173d32a4e9cf6a6e62ff06858c10a97ed947519c4fd666
-
SHA512
b7611d20f0d12f2b99b2103ff341028ac8050df1ad732e164619bdf3d49cf4fab2cdaabccd3763cac4e6487910b563f5d25b154e94e21ee64129935b08200616
-
SSDEEP
24576:Wq8eSoMZRuicOeJwFiJcUItBVqKYKgxcjSuqwCBOrn:CDoaRP1aJcUislTs
Malware Config
Extracted
lokibot
http://sempersim.su/gk17/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DRAFT FCR.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook DRAFT FCR.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DRAFT FCR.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 1640 1720 DRAFT FCR.exe 31 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1720 DRAFT FCR.exe 1720 DRAFT FCR.exe 1720 DRAFT FCR.exe 1720 DRAFT FCR.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1640 DRAFT FCR.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1720 DRAFT FCR.exe Token: SeDebugPrivilege 1640 DRAFT FCR.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1720 wrote to memory of 760 1720 DRAFT FCR.exe 27 PID 1720 wrote to memory of 760 1720 DRAFT FCR.exe 27 PID 1720 wrote to memory of 760 1720 DRAFT FCR.exe 27 PID 1720 wrote to memory of 760 1720 DRAFT FCR.exe 27 PID 1720 wrote to memory of 1100 1720 DRAFT FCR.exe 28 PID 1720 wrote to memory of 1100 1720 DRAFT FCR.exe 28 PID 1720 wrote to memory of 1100 1720 DRAFT FCR.exe 28 PID 1720 wrote to memory of 1100 1720 DRAFT FCR.exe 28 PID 1720 wrote to memory of 1092 1720 DRAFT FCR.exe 29 PID 1720 wrote to memory of 1092 1720 DRAFT FCR.exe 29 PID 1720 wrote to memory of 1092 1720 DRAFT FCR.exe 29 PID 1720 wrote to memory of 1092 1720 DRAFT FCR.exe 29 PID 1720 wrote to memory of 1648 1720 DRAFT FCR.exe 30 PID 1720 wrote to memory of 1648 1720 DRAFT FCR.exe 30 PID 1720 wrote to memory of 1648 1720 DRAFT FCR.exe 30 PID 1720 wrote to memory of 1648 1720 DRAFT FCR.exe 30 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 PID 1720 wrote to memory of 1640 1720 DRAFT FCR.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DRAFT FCR.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DRAFT FCR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"2⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"2⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"2⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT FCR.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1640
-