Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win10v2004-20240412-en
General
-
Target
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
-
Size
490KB
-
MD5
a8f86e43a86f3e0047342917a3b4d823
-
SHA1
90e606c3aa0f2e7e438ad0eb4e43a391adf7af6a
-
SHA256
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743
-
SHA512
794f30895e43498d59449f680f6298b09a947003ff7f09a33ed2241a16cf5bfcaf06968511bf95e2d4ecb2554a19ca936396e21128b0a32bc9e6ce636ce6c6d5
-
SSDEEP
12288:Yes3/5HnQc1x6qDCRSMXZrT12L1fRFen:zwBHN3FDF0TMRfR8
Malware Config
Extracted
lokibot
https://sempersim.su/c16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription pid process target process PID 3040 set thread context of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exepowershell.exepowershell.exepid process 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 2648 powershell.exe 2548 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exepid process 1768 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exepowershell.exepowershell.exe454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription pid process Token: SeDebugPrivilege 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 1768 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription pid process target process PID 3040 wrote to memory of 2548 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2548 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2548 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2548 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2648 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2648 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2648 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2648 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe powershell.exe PID 3040 wrote to memory of 2436 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe schtasks.exe PID 3040 wrote to memory of 2436 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe schtasks.exe PID 3040 wrote to memory of 2436 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe schtasks.exe PID 3040 wrote to memory of 2436 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe schtasks.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe PID 3040 wrote to memory of 1768 3040 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
outlook_office_path 1 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe -
outlook_win_path 1 IoCs
Processes:
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe"C:\Users\Admin\AppData\Local\Temp\454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gmLDcEXOxYt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gmLDcEXOxYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9E90.tmp"2⤵
- Creates scheduled task(s)
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe"C:\Users\Admin\AppData\Local\Temp\454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f3a4f604925aab2657b9ddbd1f11441f
SHA156d9fd6b95a07a1f0db49e13892bba06f1ae4089
SHA2562a47b9f379bf9ae0205da9f633483aa709c896033226be01b08f078bf26e12f3
SHA5123d3d6959ad3b363f56ffe4d30fcb4916133d27106ca3bb8b3b0951cfc780d08999b1698f3e8e0bd8614e324873a7df2ce294bd2f6126efc91808f58ab4318209
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-406356229-2805545415-1236085040-1000\0f5007522459c86e95ffcc62f32308f1_4c23b8b8-1f37-4b25-86d9-da21829a4de6
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5125e79bf5fa0776019a434c3dfc65935
SHA17ad544c7b97ec37a831ebabba51676ebca695fb1
SHA2564afd84fb26479e5ceb66dc9d09b585fc24eee2cfaab09f81a222cfe86275de65
SHA5126ab9b37fde123309ce3c6b8535591b597c1a9cd81719ed184923a4489de9d7f6583ec39131092dcfcf93f955f64868162eb8a72da5f19cc0e972c72fe8e9444d