Analysis
-
max time kernel
138s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2023, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
FedEx Shipping Documents.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FedEx Shipping Documents.exe
Resource
win10v2004-20230220-en
General
-
Target
FedEx Shipping Documents.exe
-
Size
617KB
-
MD5
1c57a9e41ca9b9e64fb33470facd087e
-
SHA1
1929dc10880f028c83ffaef8693b54fe383f0fb0
-
SHA256
00cf6e9a873007d1f11859d3e30c85bda6f137cfbc53cd0bc9a4ac77a6ad5b04
-
SHA512
bc0fd39be1fe839be06618e5bda37bbea55556768279d6d918209a104b932024d63a38dcfdedcd23fa80f4e609ef494f7d2dca18b1262fa1d38f7746218c4520
-
SSDEEP
12288:taWIm6lVvtzZBEP85VdbHPWF07ViMLRZOYKWnId5a/VAV9Cai2b:MTmIt9BEP8TdtUMLRZnKWnIdSQ
Malware Config
Extracted
lokibot
http://161.35.102.56/~nikol/?p=143606594
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FedEx Shipping Documents.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook FedEx Shipping Documents.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook FedEx Shipping Documents.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1236 2032 FedEx Shipping Documents.exe 27 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1236 FedEx Shipping Documents.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 FedEx Shipping Documents.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 PID 2032 wrote to memory of 1236 2032 FedEx Shipping Documents.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook FedEx Shipping Documents.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FedEx Shipping Documents.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedEx Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Shipping Documents.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\FedEx Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Shipping Documents.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1236
-