Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 15:30
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
183KB
-
MD5
2ee13ecd998734cd7fc80b882c7c3eab
-
SHA1
93b675eeaf1da0de08d0ab9390baaf8d32967a3c
-
SHA256
5ac52f3fe1e191e4f6c6e8f4ab8c5137dae75af22fe37a858e6b09add80b2dea
-
SHA512
42e9924c1f28bee87d550a81e1628a74da30de05ea3b047627c6cb505ef99b9dc96ff5adb5679677249a4f038db3f8f5bf1ad80ae3bb9b48eedef5b5debb9791
-
SSDEEP
3072:XfY/TU9fE9PEtufbLiHGXEXWKo+Gov1DANq78+ZzhPKfl/Ih3nU0ewEIcqEFYdUm:PYa6BeHJGoe478+ZzJKd6XU90hEF80No
Malware Config
Extracted
lokibot
https://sempersim.su/ha4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
valpmjsf.exevalpmjsf.exepid process 1788 valpmjsf.exe 2016 valpmjsf.exe -
Loads dropped DLL 2 IoCs
Processes:
tmp.exevalpmjsf.exepid process 1184 tmp.exe 1788 valpmjsf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
TTPs:
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook valpmjsf.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook valpmjsf.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook valpmjsf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
valpmjsf.exedescription pid process target process PID 1788 set thread context of 2016 1788 valpmjsf.exe valpmjsf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
valpmjsf.exepid process 1788 valpmjsf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
valpmjsf.exedescription pid process Token: SeDebugPrivilege 2016 valpmjsf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exevalpmjsf.exedescription pid process target process PID 1184 wrote to memory of 1788 1184 tmp.exe valpmjsf.exe PID 1184 wrote to memory of 1788 1184 tmp.exe valpmjsf.exe PID 1184 wrote to memory of 1788 1184 tmp.exe valpmjsf.exe PID 1184 wrote to memory of 1788 1184 tmp.exe valpmjsf.exe PID 1788 wrote to memory of 2016 1788 valpmjsf.exe valpmjsf.exe PID 1788 wrote to memory of 2016 1788 valpmjsf.exe valpmjsf.exe PID 1788 wrote to memory of 2016 1788 valpmjsf.exe valpmjsf.exe PID 1788 wrote to memory of 2016 1788 valpmjsf.exe valpmjsf.exe PID 1788 wrote to memory of 2016 1788 valpmjsf.exe valpmjsf.exe -
outlook_office_path 1 IoCs
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook valpmjsf.exe -
outlook_win_path 1 IoCs
Processes:
valpmjsf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook valpmjsf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"Loads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe" C:\Users\Admin\AppData\Local\Temp\eelrufaz.iwExecutes dropped EXELoads dropped DLLSuspicious use of SetThreadContextSuspicious behavior: MapViewOfSectionSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"C:\Users\Admin\AppData\Local\Temp\valpmjsf.exe"Executes dropped EXEAccesses Microsoft Outlook profilesSuspicious use of AdjustPrivilegeTokenoutlook_office_pathoutlook_win_path
Network
MITRE ATT&CK Matrix
Command and Control
Credential Access
Credentials in Files
1Defense Evasion
Discovery
System Information Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Temp\eelrufaz.iwFilesize
5KB
MD5b3c157df42774b424e05912b228604b9
SHA18bda0c34b9ad0784fa0e22fa4fa3f221862a631f
SHA2564d25db346ea833135a321f66e952dbdbfef4af39bb85342394ef987d6ac2e9da
SHA512fc5bbedf5775142639943ed1e7080ad4aad8a51282507e99d1f34d34f0f05da6574f0c260898487a52d3a5a64e00fb393d898c0405cf9c09bbe3c2c87a71ef34
-
C:\Users\Admin\AppData\Local\Temp\nmrbgn.wFilesize
124KB
MD549120b91d1949489808b276b04f25d89
SHA12bdf0e5af786efc803f43e57e9dd4c0ac156bfb7
SHA2566258bb119bf0ee4ee54bb72ada4218fa6cab22de877e4e338f492e5378b3a222
SHA5122321f5a16af653c7ceba9310bb35f4946d485c85a3b3b48734adddc5b5a87c2840dcd98944fc8cf6fd65e35493cb5624c2bd02126c3704f77099258ea46e8fe6
-
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exeFilesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exeFilesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
C:\Users\Admin\AppData\Local\Temp\valpmjsf.exeFilesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
\Users\Admin\AppData\Local\Temp\valpmjsf.exeFilesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
\Users\Admin\AppData\Local\Temp\valpmjsf.exeFilesize
79KB
MD5df3bb50ae86d689f172077c15c541b02
SHA10da84c3fda81ed2036a7fe609a97ea7721234ac9
SHA25667581d80dfd7a5d871391f8d406c57721f0bd4823eda59adacb4c1b8faf8cada
SHA5120199328ddf8e7367cd6b88bb53b3996299ed60df200478d22faf38336a46a79f9cfbd4e63902220be0f79003ee6b19fd4aba397c163dc02c046839c2650576dd
-
memory/1184-54-0x00000000767F1000-0x00000000767F3000-memory.dmpFilesize
8KB
-
memory/1788-56-0x0000000000000000-mapping.dmp
-
memory/2016-63-0x00000000004139DE-mapping.dmp
-
memory/2016-66-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/2016-67-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB