Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
9de9a50ec8399bcbea1697aed7f6b093.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9de9a50ec8399bcbea1697aed7f6b093.exe
Resource
win10v2004-20240426-en
General
-
Target
9de9a50ec8399bcbea1697aed7f6b093.exe
-
Size
990KB
-
MD5
9de9a50ec8399bcbea1697aed7f6b093
-
SHA1
71997994585f06160d84ac92555b2eadaacfaed3
-
SHA256
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0
-
SHA512
c717604050139d6d7579ae90ebaf201f4f615c75b69163c2f0720ebe23448e6c8e88e1e91c8732ce6b4a2ff569e4c43e8e6d1fd09a148607ebbb75c9244fad3c
-
SSDEEP
24576:7xlH0Rs/OSeKVTzAd9zpthYjMNuZ+FOPSKs0:NlH0Rs/OSes8NthYjMNuZ+FOPSK
Malware Config
Extracted
lokibot
http://195.123.211.210/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9de9a50ec8399bcbea1697aed7f6b093.exedescription pid process target process PID 2192 set thread context of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9de9a50ec8399bcbea1697aed7f6b093.exedescription pid process target process PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe PID 2192 wrote to memory of 1740 2192 9de9a50ec8399bcbea1697aed7f6b093.exe 9de9a50ec8399bcbea1697aed7f6b093.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9de9a50ec8399bcbea1697aed7f6b093.exe"C:\Users\Admin\AppData\Local\Temp\9de9a50ec8399bcbea1697aed7f6b093.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\9de9a50ec8399bcbea1697aed7f6b093.exe"C:\Users\Admin\AppData\Local\Temp\9de9a50ec8399bcbea1697aed7f6b093.exe"2⤵PID:1740
-