Analysis
-
max time kernel
141s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
b1aa4f227fc62318d5a720e2bddbf206.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b1aa4f227fc62318d5a720e2bddbf206.exe
Resource
win10v2004-20230220-en
General
-
Target
b1aa4f227fc62318d5a720e2bddbf206.exe
-
Size
576KB
-
MD5
b1aa4f227fc62318d5a720e2bddbf206
-
SHA1
1e362a8c3e0d84d1ba4cae8fbb33b27de6d811aa
-
SHA256
2200617356a044631447d18a7157e8e73999076a93e065c7db2d8aafdef9fcd4
-
SHA512
276aa28f29214f15211f32b00127d99266dbec02268d1914fc86cfd09e8bf115e25144bdd74ec5ffbc67524ebeada9024538922b80d7576657e9fce045314d50
-
SSDEEP
12288:alSgit9KhYn6+arRb9O48amTFCvIKmc5gQhOt+:aUeX99xmiqc5g4
Malware Config
Extracted
lokibot
http://171.22.30.164/fred1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook b1aa4f227fc62318d5a720e2bddbf206.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook b1aa4f227fc62318d5a720e2bddbf206.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook b1aa4f227fc62318d5a720e2bddbf206.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 576 b1aa4f227fc62318d5a720e2bddbf206.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 b1aa4f227fc62318d5a720e2bddbf206.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 PID 904 wrote to memory of 576 904 b1aa4f227fc62318d5a720e2bddbf206.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook b1aa4f227fc62318d5a720e2bddbf206.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook b1aa4f227fc62318d5a720e2bddbf206.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1aa4f227fc62318d5a720e2bddbf206.exe"C:\Users\Admin\AppData\Local\Temp\b1aa4f227fc62318d5a720e2bddbf206.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\b1aa4f227fc62318d5a720e2bddbf206.exe"C:\Users\Admin\AppData\Local\Temp\b1aa4f227fc62318d5a720e2bddbf206.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:576
-