Analysis
-
max time kernel
109s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
UpMPgZPQNQnJT4w.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
UpMPgZPQNQnJT4w.exe
Resource
win10v2004-20220812-en
General
-
Target
UpMPgZPQNQnJT4w.exe
-
Size
931KB
-
MD5
a0d164361d3e6ece8e48b4d2baa3e2ec
-
SHA1
4824107b0772ca4ab5dff5691def5cd3ba4e922a
-
SHA256
fd58f9563301b5b701de88e140907b7ee6d10d020e5725075ff682105378bdac
-
SHA512
d5bc9345e268ba05a9f439575d9b934fc2d44f41ed1f0355db0569b3870f79e863f9b0c1b67e7ff12f2b1d9a4db815ed777f9e02f433ab31a1150a476459b8fe
-
SSDEEP
12288:5l2WNq2iNLvGFzqw69teJC7q6WhEbcLFOZHap0Wov3YYo4u:5MWNq105qw69wCQyYLAZ6Re33
Malware Config
Extracted
lokibot
http://ornivska.cf/Eze2/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook UpMPgZPQNQnJT4w.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook UpMPgZPQNQnJT4w.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook UpMPgZPQNQnJT4w.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4828 set thread context of 5084 4828 UpMPgZPQNQnJT4w.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4828 UpMPgZPQNQnJT4w.exe 4828 UpMPgZPQNQnJT4w.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 UpMPgZPQNQnJT4w.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4828 UpMPgZPQNQnJT4w.exe Token: SeDebugPrivilege 5084 UpMPgZPQNQnJT4w.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3756 4828 UpMPgZPQNQnJT4w.exe 91 PID 4828 wrote to memory of 3756 4828 UpMPgZPQNQnJT4w.exe 91 PID 4828 wrote to memory of 3756 4828 UpMPgZPQNQnJT4w.exe 91 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 PID 4828 wrote to memory of 5084 4828 UpMPgZPQNQnJT4w.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook UpMPgZPQNQnJT4w.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook UpMPgZPQNQnJT4w.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"2⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"C:\Users\Admin\AppData\Local\Temp\UpMPgZPQNQnJT4w.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5084
-