Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
ccfc8289ea1ad3acab95de0c1e65eb2c.exe
Resource
win7-20240215-en
General
-
Target
ccfc8289ea1ad3acab95de0c1e65eb2c.exe
-
Size
990KB
-
MD5
ccfc8289ea1ad3acab95de0c1e65eb2c
-
SHA1
b38ece908f2ffec164f1f19619b16d6bca5d0614
-
SHA256
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804
-
SHA512
b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a
-
SSDEEP
24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW
Malware Config
Extracted
lokibot
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ccfc8289ea1ad3acab95de0c1e65eb2c.exedescription pid process target process PID 2872 set thread context of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ccfc8289ea1ad3acab95de0c1e65eb2c.exedescription pid process target process PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe PID 2872 wrote to memory of 4428 2872 ccfc8289ea1ad3acab95de0c1e65eb2c.exe ccfc8289ea1ad3acab95de0c1e65eb2c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"C:\Users\Admin\AppData\Local\Temp\ccfc8289ea1ad3acab95de0c1e65eb2c.exe"2⤵PID:4428
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2872-0-0x000000007480E000-0x000000007480F000-memory.dmpFilesize
4KB
-
memory/2872-1-0x0000000000B40000-0x0000000000C3E000-memory.dmpFilesize
1016KB
-
memory/2872-2-0x00000000055C0000-0x000000000560E000-memory.dmpFilesize
312KB
-
memory/2872-3-0x0000000005E90000-0x0000000006434000-memory.dmpFilesize
5.6MB
-
memory/2872-4-0x0000000005700000-0x0000000005792000-memory.dmpFilesize
584KB
-
memory/2872-5-0x00000000058E0000-0x000000000597C000-memory.dmpFilesize
624KB
-
memory/2872-6-0x00000000056B0000-0x00000000056B8000-memory.dmpFilesize
32KB
-
memory/2872-7-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/2872-12-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4428-9-0x0000000000700000-0x00000000007A2000-memory.dmpFilesize
648KB