Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 13:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
183KB
-
MD5
2ee13ecd998734cd7fc80b882c7c3eab
-
SHA1
93b675eeaf1da0de08d0ab9390baaf8d32967a3c
-
SHA256
5ac52f3fe1e191e4f6c6e8f4ab8c5137dae75af22fe37a858e6b09add80b2dea
-
SHA512
42e9924c1f28bee87d550a81e1628a74da30de05ea3b047627c6cb505ef99b9dc96ff5adb5679677249a4f038db3f8f5bf1ad80ae3bb9b48eedef5b5debb9791
-
SSDEEP
3072:XfY/TU9fE9PEtufbLiHGXEXWKo+Gov1DANq78+ZzhPKfl/Ih3nU0ewEIcqEFYdUm:PYa6BeHJGoe478+ZzJKd6XU90hEF80No
Malware Config
Extracted
lokibot
https://sempersim.su/ha4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
valpmjsf.exevalpmjsf.exepid process 1620 valpmjsf.exe 612 valpmjsf.exe -
Loads dropped DLL 2 IoCs
Processes:
file.exevalpmjsf.exepid process 968 file.exe 1620 valpmjsf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook valpmjsf.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook valpmjsf.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook valpmjsf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
valpmjsf.exedescription pid process target process PID 1620 set thread context of 612 1620 valpmjsf.exe valpmjsf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
valpmjsf.exepid process 1620 valpmjsf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
valpmjsf.exedescription pid process Token: SeDebugPrivilege 612 valpmjsf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
file.exevalpmjsf.exedescription pid process target process PID 968 wrote to memory of 1620 968 file.exe valpmjsf.exe PID 968 wrote to memory of 1620 968 file.exe valpmjsf.exe PID 968 wrote to memory of 1620 968 file.exe valpmjsf.exe PID 968 wrote to memory of 1620 968 file.exe valpmjsf.exe PID 1620 wrote to memory of 612 1620 valpmjsf.exe valpmjsf.exe PID 1620 wrote to memory of 612 1620 valpmjsf.exe valpmjsf.exe PID 1620 wrote to memory of 612 1620 valpmjsf.exe valpmjsf.exe PID 1620 wrote to memory of 612 1620 valpmjsf.exe valpmjsf.exe PID 1620 wrote to memory of 612 1620 valpmjsf.exe valpmjsf.exe -
outlook_office_path 1 IoCs
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook valpmjsf.exe -
outlook_win_path 1 IoCs
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook valpmjsf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe" C:\Users\Admin\AppData\Local\Temp\eelrufaz.iw2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b3c157df42774b424e05912b228604b9
SHA18bda0c34b9ad0784fa0e22fa4fa3f221862a631f
SHA2564d25db346ea833135a321f66e952dbdbfef4af39bb85342394ef987d6ac2e9da
SHA512fc5bbedf5775142639943ed1e7080ad4aad8a51282507e99d1f34d34f0f05da6574f0c260898487a52d3a5a64e00fb393d898c0405cf9c09bbe3c2c87a71ef34
-
Filesize
124KB
MD549120b91d1949489808b276b04f25d89
SHA12bdf0e5af786efc803f43e57e9dd4c0ac156bfb7
SHA2566258bb119bf0ee4ee54bb72ada4218fa6cab22de877e4e338f492e5378b3a222
SHA5122321f5a16af653c7ceba9310bb35f4946d485c85a3b3b48734adddc5b5a87c2840dcd98944fc8cf6fd65e35493cb5624c2bd02126c3704f77099258ea46e8fe6
-
Filesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
Filesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
Filesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
Filesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
Filesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd