Analysis
-
max time kernel
129s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
Ödeme_Geçen.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Ödeme_Geçen.exe
Resource
win10v2004-20230831-en
General
-
Target
Ödeme_Geçen.exe
-
Size
1.0MB
-
MD5
8b36e207c53c0e34fce64a468d9f617b
-
SHA1
fdbc6d03a334dcee2886fc42bc9280d9f7b590fe
-
SHA256
ace4774810376e5dd8bf3131c3dad03ae2c7d1d95a2edea39de42fec95a1cb19
-
SHA512
474402a8b4ade0eb1a0e70a44dbe20136e71a0728257f7a9af2da7c78de3fcdca13d76d70cbd906fe456c118ea7a07a932577f56c277fd89a64d1d9ccf907e05
-
SSDEEP
24576:wNA3R5drXmDG6/e+vv+YG28w0LCLt6Oo4KLzsKT9+hUxAPO/:p5UB/BsFR+h6O/KfsKTgm
Malware Config
Extracted
lokibot
http://backupleads24.sytes.net/jzdgfsh/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation Ödeme_Geçen.exe -
Executes dropped EXE 2 IoCs
pid Process 2912 server1.exe 4164 server1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook server1.exe Key opened \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook server1.exe Key opened \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook server1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 4164 2912 server1.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000_Classes\Local Settings Ödeme_Geçen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2912 server1.exe Token: SeDebugPrivilege 4164 server1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1128 DllHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2912 3364 Ödeme_Geçen.exe 86 PID 3364 wrote to memory of 2912 3364 Ödeme_Geçen.exe 86 PID 3364 wrote to memory of 2912 3364 Ödeme_Geçen.exe 86 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 PID 2912 wrote to memory of 4164 2912 server1.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook server1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook server1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ödeme_Geçen.exe"C:\Users\Admin\AppData\Local\Temp\Ödeme_Geçen.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\server1.exe"C:\Users\Admin\AppData\Local\Temp\server1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\server1.exeC:\Users\Admin\AppData\Local\Temp\server1.exe3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4164
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD56b3831ca202119b0c2e9d67a20b1e5b3
SHA1a339dfcc39f87defaceee7c1ea4cea8ad201ef28
SHA2565875d3ee98bf9ccc7104fb764b38b77f237d02710ab1011908a0e0bf3dd5d78c
SHA512a2f914e6c5f83bef2232fba67f68e1bf74df81bbb54322028a59263ef7c264fa8a98088e5185d4cb48efa6ccc6ef8015caed2a3dc7bd42ecacb0b7bcd424fa0a
-
Filesize
127KB
MD56b3831ca202119b0c2e9d67a20b1e5b3
SHA1a339dfcc39f87defaceee7c1ea4cea8ad201ef28
SHA2565875d3ee98bf9ccc7104fb764b38b77f237d02710ab1011908a0e0bf3dd5d78c
SHA512a2f914e6c5f83bef2232fba67f68e1bf74df81bbb54322028a59263ef7c264fa8a98088e5185d4cb48efa6ccc6ef8015caed2a3dc7bd42ecacb0b7bcd424fa0a
-
Filesize
377KB
MD5115d69a686b0a5e14facb16b3916f626
SHA1c0130b443a5487dd57e53f318497a200e0c601e1
SHA2560d82c8f0d3da955d02ca04b2ccaeb28facf20b6a18e1f5b09f88d68be07486bb
SHA512bd25d09f6d85abb7bfa9d54bf7c0b8fc0cdc64bc660e2a58058337ea64617ec4fe3b36aa6c3c5a0a3202c48f618cd4d8e3401ee10a18b50ee8becc1c1bd629ad
-
Filesize
377KB
MD5115d69a686b0a5e14facb16b3916f626
SHA1c0130b443a5487dd57e53f318497a200e0c601e1
SHA2560d82c8f0d3da955d02ca04b2ccaeb28facf20b6a18e1f5b09f88d68be07486bb
SHA512bd25d09f6d85abb7bfa9d54bf7c0b8fc0cdc64bc660e2a58058337ea64617ec4fe3b36aa6c3c5a0a3202c48f618cd4d8e3401ee10a18b50ee8becc1c1bd629ad
-
Filesize
377KB
MD5115d69a686b0a5e14facb16b3916f626
SHA1c0130b443a5487dd57e53f318497a200e0c601e1
SHA2560d82c8f0d3da955d02ca04b2ccaeb28facf20b6a18e1f5b09f88d68be07486bb
SHA512bd25d09f6d85abb7bfa9d54bf7c0b8fc0cdc64bc660e2a58058337ea64617ec4fe3b36aa6c3c5a0a3202c48f618cd4d8e3401ee10a18b50ee8becc1c1bd629ad
-
Filesize
377KB
MD5115d69a686b0a5e14facb16b3916f626
SHA1c0130b443a5487dd57e53f318497a200e0c601e1
SHA2560d82c8f0d3da955d02ca04b2ccaeb28facf20b6a18e1f5b09f88d68be07486bb
SHA512bd25d09f6d85abb7bfa9d54bf7c0b8fc0cdc64bc660e2a58058337ea64617ec4fe3b36aa6c3c5a0a3202c48f618cd4d8e3401ee10a18b50ee8becc1c1bd629ad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4078585466-1563564224-3678410669-1000\0f5007522459c86e95ffcc62f32308f1_4c1e1553-cbb5-4b2b-99d7-05e281a749b1
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4078585466-1563564224-3678410669-1000\0f5007522459c86e95ffcc62f32308f1_4c1e1553-cbb5-4b2b-99d7-05e281a749b1
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b