Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
1ffe7beaec86f3e15436d8ee1247840e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ffe7beaec86f3e15436d8ee1247840e.exe
Resource
win10v2004-20220812-en
General
-
Target
1ffe7beaec86f3e15436d8ee1247840e.exe
-
Size
499KB
-
MD5
1ffe7beaec86f3e15436d8ee1247840e
-
SHA1
3981847b1b9e6a73754e55e2814c434f37adeed9
-
SHA256
320cd864f1bcd59e122d933cb6cb19cdb1b679bb4e04d48ae81be09803c1cf29
-
SHA512
049dceedf52d61fc9052e02d079db707d9c0e1c337ce425998e40abdd151a5a84535579abf1fa5837d756ffefac8469ac47a40a9a30f00e4097cb3888ae3989f
-
SSDEEP
12288:VWO+JpbKbf6uMR+mioFhHXhmb84vVEaHgUFC:VWbbKpm73cosV18
Malware Config
Extracted
lokibot
http://208.67.105.148/osburn/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1ffe7beaec86f3e15436d8ee1247840e.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 1ffe7beaec86f3e15436d8ee1247840e.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 1ffe7beaec86f3e15436d8ee1247840e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 1964 1ffe7beaec86f3e15436d8ee1247840e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4516 1ffe7beaec86f3e15436d8ee1247840e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1964 1ffe7beaec86f3e15436d8ee1247840e.exe Token: SeDebugPrivilege 4516 1ffe7beaec86f3e15436d8ee1247840e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2360 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 84 PID 1964 wrote to memory of 2360 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 84 PID 1964 wrote to memory of 2360 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 84 PID 1964 wrote to memory of 3780 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 85 PID 1964 wrote to memory of 3780 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 85 PID 1964 wrote to memory of 3780 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 85 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 PID 1964 wrote to memory of 4516 1964 1ffe7beaec86f3e15436d8ee1247840e.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 1ffe7beaec86f3e15436d8ee1247840e.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1ffe7beaec86f3e15436d8ee1247840e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"2⤵PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"C:\Users\Admin\AppData\Local\Temp\1ffe7beaec86f3e15436d8ee1247840e.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4516
-