Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 03:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39935053e7eaa77836d3063051d2984d.exe
Resource
win7-20240221-en
9 signatures
150 seconds
General
-
Target
39935053e7eaa77836d3063051d2984d.exe
-
Size
1.1MB
-
MD5
39935053e7eaa77836d3063051d2984d
-
SHA1
7e3262627d8f5b3324feb63b219f917bba09430c
-
SHA256
054ed8f0ce27a64eb8c1e0b9ad040ce4e90eed29e386130233d2e82d2564769a
-
SHA512
5f682d4d64ef3ba577542ca7dbe72f6ebaf19ac75e1c449bb8356d365ca6d56e5f974b758006aa052e49cf431da2f21a2f2d226a9da4cbd4b6778ca81634d1e6
-
SSDEEP
24576:8Su1S82mBVrIiudqZLmrNelXDukAktky7C:8SuU82mTVZ8
Malware Config
Extracted
Family
lokibot
C2
http://sempersim.su/d6/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81 PID 2940 wrote to memory of 824 2940 39935053e7eaa77836d3063051d2984d.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\39935053e7eaa77836d3063051d2984d.exe"C:\Users\Admin\AppData\Local\Temp\39935053e7eaa77836d3063051d2984d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\39935053e7eaa77836d3063051d2984d.exe"C:\Users\Admin\AppData\Local\Temp\39935053e7eaa77836d3063051d2984d.exe"2⤵PID:824
-