Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-02-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation Slip Pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Confirmation Slip Pdf.exe
Resource
win10v2004-20221111-en
General
-
Target
Payment Confirmation Slip Pdf.exe
-
Size
1.6MB
-
MD5
00c9e269db13568cc703bd4273787201
-
SHA1
162915bdefde5a9a317d5d68eb92f0be67cdf356
-
SHA256
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336
-
SHA512
ca7d97c01bb31b312584ca856909f365bd529e517f72ec398051fea5b641a892d6303d482ca58cd7fe2e6c9847bbc964939fb187a434200dc74c98500a0cdb97
-
SSDEEP
12288:EmIbRtHUB7lceAvWDlwFnJCSVDKhEzkpgOim0TC+j2oHa5CiDWKGmGYqITrpmc:cy0Tv6osFqITrpH
Malware Config
Extracted
lokibot
http://hghfe.tk/Sameed/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Confirmation Slip Pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription pid process target process PID 1728 set thread context of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exePayment Confirmation Slip Pdf.exepid process 1616 powershell.exe 1728 Payment Confirmation Slip Pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exepid process 896 Payment Confirmation Slip Pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exePayment Confirmation Slip Pdf.exePayment Confirmation Slip Pdf.exedescription pid process Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 1728 Payment Confirmation Slip Pdf.exe Token: SeDebugPrivilege 896 Payment Confirmation Slip Pdf.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription pid process target process PID 1728 wrote to memory of 1616 1728 Payment Confirmation Slip Pdf.exe powershell.exe PID 1728 wrote to memory of 1616 1728 Payment Confirmation Slip Pdf.exe powershell.exe PID 1728 wrote to memory of 1616 1728 Payment Confirmation Slip Pdf.exe powershell.exe PID 1728 wrote to memory of 1616 1728 Payment Confirmation Slip Pdf.exe powershell.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 436 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 1728 wrote to memory of 896 1728 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe -
outlook_office_path 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe -
outlook_win_path 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Confirmation Slip Pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA2AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"2⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:896