Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 04:00
Static task
static1
Behavioral task
behavioral1
Sample
8a86ecf19e44fdb01bebd049066ae5ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8a86ecf19e44fdb01bebd049066ae5ec.exe
Resource
win10v2004-20220812-en
General
-
Target
8a86ecf19e44fdb01bebd049066ae5ec.exe
-
Size
726KB
-
MD5
8a86ecf19e44fdb01bebd049066ae5ec
-
SHA1
7be3fa1a92526cce784e8ba0f06f0183448dd5a7
-
SHA256
3c74c849a09e708972e0dd3b46cd9f583059f8f5cd9d3f2db5bd3a9b8a788c41
-
SHA512
eed9861b59a46e4bafe3931dc0ffbe3e95bd30b7208755544c7e721579e1f38aaf5c9d3dceb8868cd3a0010bff851630cef1a9ef2d7c02a5a7a51e8d4ea7941d
-
SSDEEP
12288:31MPA3bSkmtgIXHDiwOtUeQ9B7Nusv3ZV+hliQdRIOrx7p58lCrd4gyQapWMsN:6A3b++FQrV3ZwliQdrxN5IC54TWMa
Malware Config
Extracted
lokibot
https://sempersim.su/ha4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8a86ecf19e44fdb01bebd049066ae5ec.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 8a86ecf19e44fdb01bebd049066ae5ec.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 8a86ecf19e44fdb01bebd049066ae5ec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription pid process target process PID 1500 set thread context of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exepid process 1688 8a86ecf19e44fdb01bebd049066ae5ec.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription pid process Token: SeDebugPrivilege 1688 8a86ecf19e44fdb01bebd049066ae5ec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription pid process target process PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe PID 1500 wrote to memory of 1688 1500 8a86ecf19e44fdb01bebd049066ae5ec.exe 8a86ecf19e44fdb01bebd049066ae5ec.exe -
outlook_office_path 1 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 8a86ecf19e44fdb01bebd049066ae5ec.exe -
outlook_win_path 1 IoCs
Processes:
8a86ecf19e44fdb01bebd049066ae5ec.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8a86ecf19e44fdb01bebd049066ae5ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a86ecf19e44fdb01bebd049066ae5ec.exe"C:\Users\Admin\AppData\Local\Temp\8a86ecf19e44fdb01bebd049066ae5ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\8a86ecf19e44fdb01bebd049066ae5ec.exe"C:\Users\Admin\AppData\Local\Temp\8a86ecf19e44fdb01bebd049066ae5ec.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1688