Analysis
-
max time kernel
98s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe
Resource
win7-20240704-en
General
-
Target
5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe
-
Size
730KB
-
MD5
2360bb0b42650f2feb47a0e988ccc3ea
-
SHA1
0712817e7fabe68e34d67ce4151728d9f2eb8cba
-
SHA256
5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3
-
SHA512
d95afaa69795cfa63bed2e22f98bc37eca17402c92a83f062b04b5883ac1cd5be49b6e5653dc8d0e6fb7127e573397ca62f518045795536912526ec4bfd9744d
-
SSDEEP
12288:AcrNS33L10QdrX6O1nbGnBoX0DWdl3oV52aA8buKO01+0SOP1HvMKhv5KVwCaU0F:jNA3R5drX31bFXOul4qr8bK04BOP1Hvb
Malware Config
Extracted
lokibot
http://94.156.66.169:5888/shtfgdfgd/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 4 IoCs
pid Process 2596 jdfjdfgj.sfx.exe 2840 jdfjdfgj.exe 1952 jdfjdfgj.exe 1132 jdfjdfgj.exe -
Loads dropped DLL 7 IoCs
pid Process 2756 cmd.exe 2596 jdfjdfgj.sfx.exe 2596 jdfjdfgj.sfx.exe 2596 jdfjdfgj.sfx.exe 2596 jdfjdfgj.sfx.exe 2840 jdfjdfgj.exe 2840 jdfjdfgj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook jdfjdfgj.exe Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook jdfjdfgj.exe Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook jdfjdfgj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2840 set thread context of 1952 2840 jdfjdfgj.exe 34 PID 2840 set thread context of 1132 2840 jdfjdfgj.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdfjdfgj.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdfjdfgj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2840 jdfjdfgj.exe Token: SeDebugPrivilege 1952 jdfjdfgj.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2756 1848 5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe 30 PID 1848 wrote to memory of 2756 1848 5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe 30 PID 1848 wrote to memory of 2756 1848 5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe 30 PID 1848 wrote to memory of 2756 1848 5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe 30 PID 2756 wrote to memory of 2596 2756 cmd.exe 32 PID 2756 wrote to memory of 2596 2756 cmd.exe 32 PID 2756 wrote to memory of 2596 2756 cmd.exe 32 PID 2756 wrote to memory of 2596 2756 cmd.exe 32 PID 2596 wrote to memory of 2840 2596 jdfjdfgj.sfx.exe 33 PID 2596 wrote to memory of 2840 2596 jdfjdfgj.sfx.exe 33 PID 2596 wrote to memory of 2840 2596 jdfjdfgj.sfx.exe 33 PID 2596 wrote to memory of 2840 2596 jdfjdfgj.sfx.exe 33 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1952 2840 jdfjdfgj.exe 34 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 PID 2840 wrote to memory of 1132 2840 jdfjdfgj.exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook jdfjdfgj.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook jdfjdfgj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe"C:\Users\Admin\AppData\Local\Temp\5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jystsdf.cmd" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.sfx.exejdfjdfgj.sfx.exe -pluklhpfbsnrsyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\Admin\AppData\Local\Temp3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe"C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exeC:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exeC:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe5⤵
- Executes dropped EXE
PID:1132
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD59aa2e1f4bd4d6919c533aec18e0c47e9
SHA162225abcd9442ec735e4a049f5765e514b6be651
SHA2567da2b4bacf0927f5510aee39c8122872f52367dfab528cc77176ee19b70e9fd1
SHA512588ad8b4677f75d319808c167ed1d57a962776d71667f08c0e2373dc153375f2dcf931e0655f1e3fdef1027ba918c742a6b49c06377575ea60a6376e48ffa810
-
Filesize
18KB
MD57e3bf51c4c3a36b47e11430547e25cde
SHA17a0ee686431fa4580341973c3731ebaaf9a1b86a
SHA256ff026f8db90e85004687be818e5f7479292631773cd032d6fdcc69ff7030b3c5
SHA51205052c720ed921cac145672fc037ac85fa53b70ff6093e53156b8bd45d14cec8ccc65428ab09f89dfaba51d8c2961b02e3c9cf9b5f983d88cd2bf04c5f998a1e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2212144002-1172735686-1556890956-1000\0f5007522459c86e95ffcc62f32308f1_5349ca0f-aec5-405f-83e0-aa034653cb76
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2212144002-1172735686-1556890956-1000\0f5007522459c86e95ffcc62f32308f1_5349ca0f-aec5-405f-83e0-aa034653cb76
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
365KB
MD503ac3991dbdb18d73bda731e1f9cdf7c
SHA196ab8e03593bf0591bae31487e89ac6b6e3c3a91
SHA25614294dff13988ad3efe1ef9ca884b98d554a2c94bab76671e8a724d489785059
SHA5121d76a3e1b9e0396bfc9b7a0772c4974161eb215f934cba6e6bc0dddb1c4e67f8e24c68262cadebb591b4ff0743822b001e4afa5d7d3e79cbf2900d3245cbe8a5