Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/10/2022, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
4a0c373241cad8aa84c9018b7f50f660.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a0c373241cad8aa84c9018b7f50f660.exe
Resource
win10v2004-20220812-en
General
-
Target
4a0c373241cad8aa84c9018b7f50f660.exe
-
Size
747KB
-
MD5
4a0c373241cad8aa84c9018b7f50f660
-
SHA1
fc5713001d2cde484e59ae988fb66b2409c235e8
-
SHA256
408df2ad8c4ca7daca906870171422b9cef7d7416a5e7fbc67990cd04d5e91b2
-
SHA512
122709f73eee1855c5abf9992e8790eba321650044883eb013916d37e6ebc37cf87e50f09b8983f003672a156180f5d2d8df5d3f95a1b0a3ba43119eb0a067de
-
SSDEEP
12288:qFZFKDir+IVP6RAliAJWCJw98Nnma71tOEuXmUKXc1aCosDifYub26:qOk+IpcvCq2cUtLlqaCoZfYuB
Malware Config
Extracted
lokibot
http://208.67.105.161/donstan/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4a0c373241cad8aa84c9018b7f50f660.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 4a0c373241cad8aa84c9018b7f50f660.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 4a0c373241cad8aa84c9018b7f50f660.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3140 set thread context of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4680 4a0c373241cad8aa84c9018b7f50f660.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4680 4a0c373241cad8aa84c9018b7f50f660.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 PID 3140 wrote to memory of 4680 3140 4a0c373241cad8aa84c9018b7f50f660.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 4a0c373241cad8aa84c9018b7f50f660.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4a0c373241cad8aa84c9018b7f50f660.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a0c373241cad8aa84c9018b7f50f660.exe"C:\Users\Admin\AppData\Local\Temp\4a0c373241cad8aa84c9018b7f50f660.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\4a0c373241cad8aa84c9018b7f50f660.exe"C:\Users\Admin\AppData\Local\Temp\4a0c373241cad8aa84c9018b7f50f660.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4680
-