Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2023 03:10
Static task
static1
Behavioral task
behavioral1
Sample
be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe
Resource
win10v2004-20221111-en
General
-
Target
be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe
-
Size
410KB
-
MD5
8e3f5686982c6fb28ca05be8afa2945c
-
SHA1
a07552b36fb3446c1bf933839aac0c5c2ac85413
-
SHA256
be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7
-
SHA512
9618d5fba1fe3923d4b9bdc18fd54fd9f2b41db43b9b9b2829eb70f7dee889e33d3844cb9517bcba85d5105571fcf46dfcab1a9872f965cfdedd7250498daaaf
-
SSDEEP
12288:aYHhXUJtDHuZ53MFG0bS+vzw7Ob5GlLtieM+YzwIP:aYHhXMucF5SwzwQ+t+p
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
nkdvifms.exenkdvifms.exepid process 2360 nkdvifms.exe 1512 nkdvifms.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
nkdvifms.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook nkdvifms.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook nkdvifms.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook nkdvifms.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
nkdvifms.exedescription pid process target process PID 2360 set thread context of 1512 2360 nkdvifms.exe nkdvifms.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
nkdvifms.exepid process 2360 nkdvifms.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nkdvifms.exedescription pid process Token: SeDebugPrivilege 1512 nkdvifms.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exenkdvifms.exedescription pid process target process PID 3740 wrote to memory of 2360 3740 be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe nkdvifms.exe PID 3740 wrote to memory of 2360 3740 be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe nkdvifms.exe PID 3740 wrote to memory of 2360 3740 be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe nkdvifms.exe PID 2360 wrote to memory of 1512 2360 nkdvifms.exe nkdvifms.exe PID 2360 wrote to memory of 1512 2360 nkdvifms.exe nkdvifms.exe PID 2360 wrote to memory of 1512 2360 nkdvifms.exe nkdvifms.exe PID 2360 wrote to memory of 1512 2360 nkdvifms.exe nkdvifms.exe -
outlook_office_path 1 IoCs
Processes:
nkdvifms.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook nkdvifms.exe -
outlook_win_path 1 IoCs
Processes:
nkdvifms.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook nkdvifms.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe"C:\Users\Admin\AppData\Local\Temp\be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe"C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe" C:\Users\Admin\AppData\Local\Temp\hmedw.p2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe"C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fd51be72426c39dc00f2b205f6833842
SHA157b2789688d6f661560a04ade85b93da51157d27
SHA256b896a8708e886a084f33b9121ba0c706d8c49fe20ea5ee9a12d3d8607d891506
SHA51255d20776296db0fdd81df8ea70f601ec249cfc3ec87f69151c51ab2934c426a02b1acc66a2a8f0d9281e074c13a919ee4f9ad89d0070786c6747523d540b3baf
-
Filesize
100KB
MD57a42faf6b143e8fdb37b2a5b81e6c12e
SHA16387197a404e96da47dd4aa6d288fed647146514
SHA256aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f
SHA5120d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637
-
Filesize
100KB
MD57a42faf6b143e8fdb37b2a5b81e6c12e
SHA16387197a404e96da47dd4aa6d288fed647146514
SHA256aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f
SHA5120d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637
-
Filesize
100KB
MD57a42faf6b143e8fdb37b2a5b81e6c12e
SHA16387197a404e96da47dd4aa6d288fed647146514
SHA256aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f
SHA5120d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637
-
Filesize
124KB
MD5ace55a7b52c7d502500c8c47650dd135
SHA1aa370c3828ae5aa80e78fe6ed0bd8cebf22f68f3
SHA2565ad2b3d31c912c02a656c49b681fe8d6d5b49eb77d19a07858392c88a61bd1bf
SHA51284ac3071e813cc1acdb27b0e90984e16774f89239c7d1389385a2c1eab4b86531e357fb1b82fe6677a5a82234cec73426f1e94fff619b2bdac2c2255ab8c082d