Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 06:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ccfc8289ea1ad3acab95de0c1e65eb2c.exe
Resource
win7-20240215-en
9 signatures
150 seconds
General
-
Target
ccfc8289ea1ad3acab95de0c1e65eb2c.exe
-
Size
990KB
-
MD5
ccfc8289ea1ad3acab95de0c1e65eb2c
-
SHA1
b38ece908f2ffec164f1f19619b16d6bca5d0614
-
SHA256
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804
-
SHA512
b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a
-
SSDEEP
24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW
Malware Config
Extracted
Family
lokibot
C2
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85 PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"2⤵PID:4428
-