Overview
overview
10Static
static
33763170476...92.exe
windows10-2004-x64
10a00f993805...f5.exe
windows10-2004-x64
6a27aa292f9...96.exe
windows10-2004-x64
10a3960e88c7...c6.exe
windows10-2004-x64
8b1adee00a1...f4.exe
windows10-2004-x64
10b9c037384e...e3.exe
windows10-2004-x64
10c0592acd47...d2.exe
windows10-2004-x64
1c14987c4c6...03.exe
windows10-2004-x64
10c203192bf3...c1.exe
windows10-2004-x64
3cf2652dc2a...c4.dll
windows10-2004-x64
10d2ba18358b...17.exe
windows10-2004-x64
3d6b7cb431b...74.exe
windows10-2004-x64
8db246897a0...b0.exe
windows10-2004-x64
3df16940f38...e0.exe
windows10-2004-x64
10e39833949c...ab.exe
windows10-2004-x64
10e98170984c...66.dll
windows10-2004-x64
1ea2a2d0b59...cd.exe
windows10-2004-x64
10eaffdf51b1...f1.exe
windows10-2004-x64
10eda6bb813c...f9.exe
windows10-2004-x64
10f4f625c6ec...fc.exe
windows10-2004-x64
10f72762cd37...ac.exe
windows10-2004-x64
10fce3d69b9c...e2.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3763170476b8a4c3cb592cbea6c4471ba2ea2463db9f7839fda502ef0a06b092.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
a00f9938052cd7987d8740671ba12f61cde995601edb75b63d7347e48b552bf5.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
a3960e88c72a663734c17d85f5015571b340789d3a9646aa71a8d7ded643a7c6.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
b1adee00a132b96a6f457031953b01fd1e322c57bff3fc9517b7d92d1ba884f4.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral6
Sample
b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
c0592acd4714d89c4f9e10ef0b2a9b4a7f0a445f24fb5212781fd47ca7d34dd2.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral8
Sample
c14987c4c6fc2de2cac43355964465d7611652e29f699d64fa292399f526c103.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
c203192bf329f099fddebfc57a7a258b974550e0b51a81115c9980aff02fe6c1.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral10
Sample
cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
d2ba18358b1edbac5cdb875761367ce6f88ef0e61d749357a259988d15d1bc17.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral12
Sample
d6b7cb431b16723bce5523e0ac0c99fe0e583afaf1154f51cffee7420fe4dd74.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
db246897a0efe3c4b3cd4b9f832067815fa920045e9a5a3d0881dc9ffd958fb0.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral14
Sample
df16940f38135c9dfa808b7f19348339deca912fe54331b2dd739decdf37d9e0.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
e39833949c41ebb2bcc53a374f17491536b1dda70e53700b19fa53f04bf695ab.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral16
Sample
e98170984c87aa1b92df230ef020557cad5afa4cf6815f7cbd764a70a1323b66.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
ea2a2d0b594f527f391abdf595d5f93424d9121dc292ff458362bff765bff2cd.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral18
Sample
eaffdf51b17ef1b7b7bf01ab6e8c2dce61a3dbd875b368e06a6d3b95e100c6f1.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
eda6bb813cee36866a58cc01b6c928484e8751e3c442ec9739f798aeb8e453f9.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral20
Sample
f4f625c6ec130389122077c9650b1c195a7793a173a621416cea8622c14405fc.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
f72762cd37962e6fc7a65ae4c414589694aef8794e6d1fa8060f270f069bf1ac.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral22
Sample
fce3d69b9c65945dcfbb74155f2186626f2ab404e38117f2222762361d7af6e2.exe
Resource
win10v2004-20240730-en
General
-
Target
a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe
-
Size
288KB
-
MD5
f32cb49ff554b7ef003605ac8b2f0227
-
SHA1
79d24998d91d215f67552fe100deabbbe47cd59e
-
SHA256
a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196
-
SHA512
c78dc5f89c2b32cb0887b7d55ab07c4f1c275b36f844d38e67abeb1613cddc0bf093d3521e5944aa873d4c20354391623e49226d2d5e729b323942f28677b034
-
SSDEEP
3072:tJbvlzyr2Pp95wU+3J2foPh64t+daj9+lEjrDgV6Qk99qE7XAy:/v9I2hnw/3J2fEv+AZ+lsX
Malware Config
Extracted
lokibot
http://kovachevpress.com/docsx/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3168 AddInProcess32.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral3/memory/3028-3-0x00000000029D0000-0x00000000029E0000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86 PID 3028 wrote to memory of 3168 3028 a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe"C:\Users\Admin\AppData\Local\Temp\a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579