Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe
Resource
win10v2004-20240419-en
General
-
Target
D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe
-
Size
726KB
-
MD5
d0ddfe864c4befa2fcc6d89f9a7a59be
-
SHA1
d1e13ca84bc0ad0b7f8c167b11b6eeac60d8cd8a
-
SHA256
3703fd0a78dd7c0c7fd95039b852f630910cdb38edf6eac223c4174603ac89d8
-
SHA512
e5b6931de75aff79a3aedf99848222b5667ef7d0aa0e7a497a86d8ac4ed2907d7a2f2d217ffc1c737e79998f41113addc3fe1019125b955452b0f80856b20c8c
-
SSDEEP
12288:38pYTbiUnI+w3363jUfPWL9gokXNuslchJh4l:spY5nILggxcml
Malware Config
Extracted
lokibot
http://tampabayllc.top/teamb/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exedescription pid process target process PID 2896 set thread context of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exedescription pid process target process PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe PID 2896 wrote to memory of 2864 2896 D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe"C:\Users\Admin\AppData\Local\Temp\D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe"C:\Users\Admin\AppData\Local\Temp\D0DDFE864C4BEFA2FCC6D89F9A7A59BE.exe"2⤵PID:2864
-