Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 12:15
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
716KB
-
MD5
cfcee5ee81b5f9170fd4b673583b5f12
-
SHA1
c1783db922cbc72c28582655448804d75cd555be
-
SHA256
8325e49180840f7c62839f6dcccc78ff1236fb5262811e019c3cc41de65db0e7
-
SHA512
5b01e83b04781eb7aadc1ffbf32799273733b322a3a54e5399295874ecf44584a40896a4e0d3c4df802613ff541a704b8c3e0c9cf9a2a7534244ae059a8fefa1
-
SSDEEP
12288:Fcr2iNvsOL/GXh8L74mBfNUstzoCnsUrYKBBHnqAAezy3rUNVJNT:er18+L74mBfNUstzo9UrlBHAf3r8JN
Malware Config
Extracted
lokibot
http://171.22.30.164/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 2020 1100 tmp.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1100 tmp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2020 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 tmp.exe Token: SeDebugPrivilege 2020 tmp.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1100 wrote to memory of 860 1100 tmp.exe 28 PID 1100 wrote to memory of 860 1100 tmp.exe 28 PID 1100 wrote to memory of 860 1100 tmp.exe 28 PID 1100 wrote to memory of 860 1100 tmp.exe 28 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 PID 1100 wrote to memory of 2020 1100 tmp.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2020
-