Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
3386773652cab6d42e5eb77f33b414c2.exe
Resource
win7-20240221-en
General
-
Target
3386773652cab6d42e5eb77f33b414c2.exe
-
Size
617KB
-
MD5
3386773652cab6d42e5eb77f33b414c2
-
SHA1
46af3a4f285a71a1f27b67e79359d980612226b4
-
SHA256
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d
-
SHA512
cd6f3a152ae82ea19686f83d26eac06e888dfe753bb8fc863570a2a1a6db3b9c5fedf910b71e2d40886c07d650c4b35faf69c1f322560bc67539728b9aceb7c2
-
SSDEEP
12288:l2iKVaUqdJS4Vo5pLRpHiANQ6elKQI64i55oc:Y+UgSckQ61Qd4iToc
Malware Config
Extracted
lokibot
http://namex-na.com/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1972 powershell.exe 2604 powershell.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook vbc.exe Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook vbc.exe Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 2304 3386773652cab6d42e5eb77f33b414c2.exe 1972 powershell.exe 2604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2304 3386773652cab6d42e5eb77f33b414c2.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2400 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1972 2304 3386773652cab6d42e5eb77f33b414c2.exe 28 PID 2304 wrote to memory of 1972 2304 3386773652cab6d42e5eb77f33b414c2.exe 28 PID 2304 wrote to memory of 1972 2304 3386773652cab6d42e5eb77f33b414c2.exe 28 PID 2304 wrote to memory of 1972 2304 3386773652cab6d42e5eb77f33b414c2.exe 28 PID 2304 wrote to memory of 2604 2304 3386773652cab6d42e5eb77f33b414c2.exe 30 PID 2304 wrote to memory of 2604 2304 3386773652cab6d42e5eb77f33b414c2.exe 30 PID 2304 wrote to memory of 2604 2304 3386773652cab6d42e5eb77f33b414c2.exe 30 PID 2304 wrote to memory of 2604 2304 3386773652cab6d42e5eb77f33b414c2.exe 30 PID 2304 wrote to memory of 2696 2304 3386773652cab6d42e5eb77f33b414c2.exe 31 PID 2304 wrote to memory of 2696 2304 3386773652cab6d42e5eb77f33b414c2.exe 31 PID 2304 wrote to memory of 2696 2304 3386773652cab6d42e5eb77f33b414c2.exe 31 PID 2304 wrote to memory of 2696 2304 3386773652cab6d42e5eb77f33b414c2.exe 31 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 PID 2304 wrote to memory of 2400 2304 3386773652cab6d42e5eb77f33b414c2.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3386773652cab6d42e5eb77f33b414c2.exe"C:\Users\Admin\AppData\Local\Temp\3386773652cab6d42e5eb77f33b414c2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3386773652cab6d42e5eb77f33b414c2.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZFDfJPJOzHNzUJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZFDfJPJOzHNzUJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72A1.tmp"2⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51b7a2ecd5a9fd67c1c70c83331d33ab9
SHA138eb93d44cea0f1542ca569a3c354c41c9c0d183
SHA25681a9d052a9afbe4fd5e1b04bcd0402e460fa517dd0854831574fbe3c5e0aa11f
SHA512c09e6a9086f35970ff5c85cdc02b939dcaf28723346b44323bdc86686808273a63ec27b4a44f5b0103755190b42e384c5b1f9e7c46b611acd3554c2404092d61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WCQ349DYU47UVATLDUUZ.temp
Filesize7KB
MD589ebdea7c12710625e97af2715e04606
SHA1035997f3252b4e6954372671f971ca643806fc42
SHA2561cda4e13d58dfff2099689198e6c7d901d177aa5393b803c0bc53901966872b8
SHA512e09b0602e8baa33d21cb7afa6fd73de79e44cd7ec3db3644e1fccbba87bb985235a8e9e792cb4e1a61b7546ea796ca07a075b3529c7ec687c0555bcf51106e25