Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
audiodg.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
audiodg.exe
Resource
win10v2004-20221111-en
General
-
Target
audiodg.exe
-
Size
807KB
-
MD5
93a0c7df80d71587e83013e78ff90885
-
SHA1
6007777abc335dbc37c1fdb45d59480ee6d006e2
-
SHA256
6b6405b7d1f150e3883916aa3f64125fd499b3a4d579480992d9b3fe4398acf9
-
SHA512
cfad006ee3890907deaa0aea77b949116e826f87f11b00ab56109c365d628b5e782009abd8887f1973f90247a1853ef0ec29199f0a71de2bc56a0b3b3cbec158
-
SSDEEP
24576:d0Gs5nyyxDqEZV/NWC91FS/gg4iPULgh/Wgfz:d0Gs5nyCDqEZVr18/gg4ixh/Wgf
Malware Config
Extracted
lokibot
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook audiodg.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook audiodg.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook audiodg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 588 2008 audiodg.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 588 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 588 audiodg.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 PID 2008 wrote to memory of 588 2008 audiodg.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook audiodg.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook audiodg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"C:\Users\Admin\AppData\Local\Temp\audiodg.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"C:\Users\Admin\AppData\Local\Temp\audiodg.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:588
-