Analysis
-
max time kernel
106s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation Slip Pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Confirmation Slip Pdf.exe
Resource
win10v2004-20221111-en
General
-
Target
Payment Confirmation Slip Pdf.exe
-
Size
1.6MB
-
MD5
00c9e269db13568cc703bd4273787201
-
SHA1
162915bdefde5a9a317d5d68eb92f0be67cdf356
-
SHA256
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336
-
SHA512
ca7d97c01bb31b312584ca856909f365bd529e517f72ec398051fea5b641a892d6303d482ca58cd7fe2e6c9847bbc964939fb187a434200dc74c98500a0cdb97
-
SSDEEP
12288:EmIbRtHUB7lceAvWDlwFnJCSVDKhEzkpgOim0TC+j2oHa5CiDWKGmGYqITrpmc:cy0Tv6osFqITrpH
Malware Config
Extracted
lokibot
http://hghfe.tk/Sameed/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Payment Confirmation Slip Pdf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Confirmation Slip Pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription pid process target process PID 4736 set thread context of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1652 powershell.exe 1652 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exepid process 3708 Payment Confirmation Slip Pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exePayment Confirmation Slip Pdf.exePayment Confirmation Slip Pdf.exedescription pid process Token: SeDebugPrivilege 1652 powershell.exe Token: SeDebugPrivilege 4736 Payment Confirmation Slip Pdf.exe Token: SeDebugPrivilege 3708 Payment Confirmation Slip Pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription pid process target process PID 4736 wrote to memory of 1652 4736 Payment Confirmation Slip Pdf.exe powershell.exe PID 4736 wrote to memory of 1652 4736 Payment Confirmation Slip Pdf.exe powershell.exe PID 4736 wrote to memory of 1652 4736 Payment Confirmation Slip Pdf.exe powershell.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe PID 4736 wrote to memory of 3708 4736 Payment Confirmation Slip Pdf.exe Payment Confirmation Slip Pdf.exe -
outlook_office_path 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Confirmation Slip Pdf.exe -
outlook_win_path 1 IoCs
Processes:
Payment Confirmation Slip Pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Confirmation Slip Pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA2AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Slip Pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3708