Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-01-2023 03:22
Static task
static1
Behavioral task
behavioral1
Sample
f15cf7168d5d33becc22eee77cced430.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f15cf7168d5d33becc22eee77cced430.exe
Resource
win10v2004-20220812-en
General
-
Target
f15cf7168d5d33becc22eee77cced430.exe
-
Size
888KB
-
MD5
f15cf7168d5d33becc22eee77cced430
-
SHA1
fd21eb4c9f05ecc4c29049bd11c3dc30f18ec3c7
-
SHA256
8a499e05589f930eb309f2bef2c5a920c675bb7c8675a46b6a0da0dbb3b78292
-
SHA512
e3c33cbb2677b04741dddfa16e7114d928553c6d8fe83034bb0294d0c76c42e95d9b85a45837a366969ecd25f2f329d7ff1441f8791d8f2a24414afcd2929388
-
SSDEEP
12288:mLNUQ97VQgh/f0BeGJwvioJi9u2XyDRRS8fWLRydcf8w2WRoIU1Gh:mRBbQgh/f0BWdcNy1RSwbceIU1G
Malware Config
Extracted
lokibot
http://208.67.105.148/zang/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook f15cf7168d5d33becc22eee77cced430.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook f15cf7168d5d33becc22eee77cced430.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook f15cf7168d5d33becc22eee77cced430.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription pid process target process PID 792 set thread context of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exepid process 1324 f15cf7168d5d33becc22eee77cced430.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription pid process Token: SeDebugPrivilege 1324 f15cf7168d5d33becc22eee77cced430.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription pid process target process PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe PID 792 wrote to memory of 1324 792 f15cf7168d5d33becc22eee77cced430.exe f15cf7168d5d33becc22eee77cced430.exe -
outlook_office_path 1 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook f15cf7168d5d33becc22eee77cced430.exe -
outlook_win_path 1 IoCs
Processes:
f15cf7168d5d33becc22eee77cced430.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook f15cf7168d5d33becc22eee77cced430.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f15cf7168d5d33becc22eee77cced430.exe"C:\Users\Admin\AppData\Local\Temp\f15cf7168d5d33becc22eee77cced430.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\f15cf7168d5d33becc22eee77cced430.exe"C:\Users\Admin\AppData\Local\Temp\f15cf7168d5d33becc22eee77cced430.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1324