Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 08:21
Static task
static1
Behavioral task
behavioral1
Sample
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe
Resource
win10v2004-20220812-en
General
-
Target
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe
-
Size
182KB
-
MD5
3c201fc4355b967aefaae295cc6fa701
-
SHA1
4ad41361158e353f97245fab6cc4a428ecb3412b
-
SHA256
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6
-
SHA512
074ee95baf1ac1f655c3cdfa05f01d484f09db33c3b833b286607ef4190ed5af654f124e150a10c3a4a26f198ee7da06b2d991b6112b55c37c10554e6526bea1
-
SSDEEP
3072:HfY/TU9fE9PEtuVbaQ0J5VhItJ/g30rXufhkiz1mWGf3VIYydK0QPWWBT3QAU49p:/Ya6r10JJOY0Lu1mWipy0PLHFp
Malware Config
Extracted
lokibot
https://sempersim.su/ha3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
hfmvin.exehfmvin.exepid process 936 hfmvin.exe 1128 hfmvin.exe -
Loads dropped DLL 2 IoCs
Processes:
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exehfmvin.exepid process 1744 82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe 936 hfmvin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
hfmvin.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook hfmvin.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook hfmvin.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook hfmvin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hfmvin.exedescription pid process target process PID 936 set thread context of 1128 936 hfmvin.exe hfmvin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
hfmvin.exepid process 936 hfmvin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hfmvin.exedescription pid process Token: SeDebugPrivilege 1128 hfmvin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exehfmvin.exedescription pid process target process PID 1744 wrote to memory of 936 1744 82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe hfmvin.exe PID 1744 wrote to memory of 936 1744 82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe hfmvin.exe PID 1744 wrote to memory of 936 1744 82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe hfmvin.exe PID 1744 wrote to memory of 936 1744 82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe hfmvin.exe PID 936 wrote to memory of 1128 936 hfmvin.exe hfmvin.exe PID 936 wrote to memory of 1128 936 hfmvin.exe hfmvin.exe PID 936 wrote to memory of 1128 936 hfmvin.exe hfmvin.exe PID 936 wrote to memory of 1128 936 hfmvin.exe hfmvin.exe PID 936 wrote to memory of 1128 936 hfmvin.exe hfmvin.exe -
outlook_office_path 1 IoCs
Processes:
hfmvin.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook hfmvin.exe -
outlook_win_path 1 IoCs
Processes:
hfmvin.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook hfmvin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe"C:\Users\Admin\AppData\Local\Temp\82539bbc4b89e4cb63f920ac8d2a59f48237688830da77c2aa3da81b58fe5dc6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\hfmvin.exe"C:\Users\Admin\AppData\Local\Temp\hfmvin.exe" C:\Users\Admin\AppData\Local\Temp\zdyquvojou.slv2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\hfmvin.exe"C:\Users\Admin\AppData\Local\Temp\hfmvin.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD51569e2caf69f69a661e4014b56bd41f2
SHA1502bbadd27b4adac65b1d2f89a6bd66243d8355d
SHA256e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04
SHA5121c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9
-
Filesize
79KB
MD51569e2caf69f69a661e4014b56bd41f2
SHA1502bbadd27b4adac65b1d2f89a6bd66243d8355d
SHA256e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04
SHA5121c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9
-
Filesize
79KB
MD51569e2caf69f69a661e4014b56bd41f2
SHA1502bbadd27b4adac65b1d2f89a6bd66243d8355d
SHA256e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04
SHA5121c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9
-
Filesize
124KB
MD5dece2960f5f43f6bb2708f5477de37b2
SHA183eda7f8e8add4d690014d8d39f0cac6113c941d
SHA2561c8a98b4d2b5fac5c844cf9de4b5c083d5699ebf7e1fd50b0c63562076c461db
SHA5123d63f4c711b0d56e460c9a85c5c300a20dd66c69f88e0ec0fe378f13b582eb8efeadaf57f9fc396be3886468ba1ce48e25e6381432138ffb0638d5f622352e47
-
Filesize
5KB
MD5ca798aba91e0b1a9b2940c395562a34c
SHA114bd11f6f57efb1b417608f43b1d7d4a9397dbcc
SHA2567d01de0741445c8caccff77a58c667298d2e291f391dfbda2931f265f08e7a83
SHA5120018b934f0fc36cc52556d1254512fc3b345ebcd4eb66964850eea76d0e676e4d87bdb53bbcf90d04c9bf5b4c9c586e6fd012ebe3f9f8c3821738fdaa6ed9732
-
Filesize
79KB
MD51569e2caf69f69a661e4014b56bd41f2
SHA1502bbadd27b4adac65b1d2f89a6bd66243d8355d
SHA256e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04
SHA5121c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9
-
Filesize
79KB
MD51569e2caf69f69a661e4014b56bd41f2
SHA1502bbadd27b4adac65b1d2f89a6bd66243d8355d
SHA256e5b821c028ae135e40ec3e9d7400ef514131b8fff75767fb619896d3acef8f04
SHA5121c23c1c7e288b9046ec3fc342f81c5cdb54bdfac34b70ce30a9cef27472d11f6cc1886f0033fc954da174651365100c6a17c7aca9e69fdc8e4de778ded6da6e9