Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/05/2023, 06:52

General

  • Target

    10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08.exe

  • Size

    554KB

  • MD5

    4f4f3e19a67c65345953ccc6fe8da506

  • SHA1

    c12367e37f7ff5a4b5ac93f05a0f4df05fce084e

  • SHA256

    10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08

  • SHA512

    69eae07116e254fcc90a649fb25e803f0ae01befbc4f603b812c98d3e201b713a5e629bf43e53f22d6d83eb313a8657f4a7e679068da0f92ea8974a9e0f25f3c

  • SSDEEP

    12288:MotPplTY6RhKunCyMqbPstLeLzyN02OtTqBJKAJY8OOopcaXskvWaH:MoJTDE4CyMqbPstLKo0xtTOKA+GoHXH

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08.exe
    "C:\Users\Admin\AppData\Local\Temp\10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08.exe
      "C:\Users\Admin\AppData\Local\Temp\10945bdcab778a9240bd105c2bbbfdeaa97ae8fe7fa6dcc2ae10b23a189bea08.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2352-127-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2352-136-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2352-131-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2352-130-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4124-122-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4124-121-0x0000000004BC0000-0x0000000004BCE000-memory.dmp

    Filesize

    56KB

  • memory/4124-116-0x0000000000170000-0x0000000000200000-memory.dmp

    Filesize

    576KB

  • memory/4124-123-0x0000000004CB0000-0x0000000004CBA000-memory.dmp

    Filesize

    40KB

  • memory/4124-124-0x0000000006520000-0x000000000657A000-memory.dmp

    Filesize

    360KB

  • memory/4124-125-0x0000000006620000-0x00000000066BC000-memory.dmp

    Filesize

    624KB

  • memory/4124-126-0x0000000006600000-0x0000000006624000-memory.dmp

    Filesize

    144KB

  • memory/4124-120-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4124-119-0x0000000004A30000-0x0000000004A3A000-memory.dmp

    Filesize

    40KB

  • memory/4124-118-0x0000000004AA0000-0x0000000004B32000-memory.dmp

    Filesize

    584KB

  • memory/4124-117-0x00000000050F0000-0x00000000055EE000-memory.dmp

    Filesize

    5.0MB