Analysis
-
max time kernel
104s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2023 08:58
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe
Resource
win10v2004-20221111-en
General
-
Target
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe
-
Size
722KB
-
MD5
50b57b84d880c8181a67fec0bbd0c5aa
-
SHA1
9e9292ee75fd35a098619461430b1492f4aec52b
-
SHA256
f482fea1f48a2c590f2b554dd2bf961234ccff52cc60bac18cbaa84457183afc
-
SHA512
e4020ae88c1197c84a9d59e7161deb7a1f594e4ec5c192da9e0765b230a9b936b84e6102fd356d5a5ee94c3e76b318e1cd83a00df96c93f8b6b8de9836cbb119
-
SSDEEP
12288:2yzaxCiF3/KJYOu2DhpV4DHfPr6s3ELF3sgouVnJV4ilzP:2yzaYi5KJbu2DDVYXJ3E9sL4z4OP
Malware Config
Extracted
lokibot
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription pid process target process PID 840 set thread context of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exepid process 4648 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription pid process Token: SeDebugPrivilege 4648 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription pid process target process PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe PID 840 wrote to memory of 4648 840 STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
outlook_office_path 1 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe -
outlook_win_path 1 IoCs
Processes:
STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT ZHEJIANG ASIATOP SLIP.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4648