Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 23:00 UTC

General

  • Target

    MalwareBazaar.exe

  • Size

    367KB

  • MD5

    3edc8e31efe97c259c8f2eebbbb4da98

  • SHA1

    1692639db61f72b4e1bfa80e4a55bc1cfa8bb129

  • SHA256

    eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703

  • SHA512

    65f40b27c53379426e398d6e8ec7e2e64ea836bf4a9871f2aca7c66ef2baba0eb6a512611e935d5a2a3585b56c806d2b0a2ac9dc73cf3f71afa68a34596bae35

  • SSDEEP

    6144:lykHWlFEnk3OQdZXq5Brr5JhV/Vz27y1svOwEi4ZABsQCDVlPMimKv6BPBIi+7PM:lpybZXGnbhSGsvOri4ZZdnMim3NB5iw9

Malware Config

Extracted

Family

lokibot

C2

http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe
    "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe
      C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1060
    • C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe
      C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe
      2⤵
        PID:3256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 80
          3⤵
          • Program crash
          PID:312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3256 -ip 3256
      1⤵
        PID:700

      Network

      • flag-us
        DNS
        g.bing.com
        Remote address:
        8.8.8.8:53
        Request
        g.bing.com
        IN A
        Response
        g.bing.com
        IN CNAME
        g-bing-com.dual-a-0034.a-msedge.net
        g-bing-com.dual-a-0034.a-msedge.net
        IN CNAME
        dual-a-0034.a-msedge.net
        dual-a-0034.a-msedge.net
        IN A
        13.107.21.237
        dual-a-0034.a-msedge.net
        IN A
        204.79.197.237
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
        Remote address:
        13.107.21.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MUID=1B0C2116CF556DDA0B7635C5CEB56CC6; domain=.bing.com; expires=Sun, 31-Aug-2025 23:00:51 GMT; path=/; SameSite=None; Secure; Priority=High;
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 29E7B8873BB448F5A999999DEB2D6639 Ref B: LON04EDGE1113 Ref C: 2024-08-06T23:00:51Z
        date: Tue, 06 Aug 2024 23:00:51 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
        Remote address:
        13.107.21.237:443
        Request
        GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=1B0C2116CF556DDA0B7635C5CEB56CC6
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MSPTC=5lz-5rcvUfl82gCuv-W1mSBKFurridf9_VzVbL1bQ2A; domain=.bing.com; expires=Sun, 31-Aug-2025 23:00:51 GMT; path=/; Partitioned; secure; SameSite=None
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: F755CD8630D94CE2AE74FB29175142CC Ref B: LON04EDGE1113 Ref C: 2024-08-06T23:00:51Z
        date: Tue, 06 Aug 2024 23:00:51 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
        Remote address:
        13.107.21.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=1B0C2116CF556DDA0B7635C5CEB56CC6; MSPTC=5lz-5rcvUfl82gCuv-W1mSBKFurridf9_VzVbL1bQ2A
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 8E7075807F404C4197184E35103E5F0C Ref B: LON04EDGE1113 Ref C: 2024-08-06T23:00:51Z
        date: Tue, 06 Aug 2024 23:00:51 GMT
      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        237.21.107.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        237.21.107.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-nl
        POST
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        MalwareBazaar.exe
        Remote address:
        94.156.66.169:5788
        Request
        POST /bhvstgd/Panel/five/fre.php HTTP/1.0
        User-Agent: Mozilla/4.08 (Charon; Inferno)
        Host: 94.156.66.169
        Accept: */*
        Content-Type: application/octet-stream
        Content-Encoding: binary
        Content-Key: 2C665EBA
        Content-Length: 358
        Connection: close
        Response
        HTTP/1.1 404 Not Found
        Server: nginx/1.10.3
        Date: Tue, 06 Aug 2024 23:00:49 GMT
        Content-Type: text/html
        Connection: close
        X-Powered-By: PHP/5.3.3
      • flag-us
        DNS
        140.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        140.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-nl
        POST
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        MalwareBazaar.exe
        Remote address:
        94.156.66.169:5788
        Request
        POST /bhvstgd/Panel/five/fre.php HTTP/1.0
        User-Agent: Mozilla/4.08 (Charon; Inferno)
        Host: 94.156.66.169
        Accept: */*
        Content-Type: application/octet-stream
        Content-Encoding: binary
        Content-Key: 2C665EBA
        Content-Length: 180
        Connection: close
        Response
        HTTP/1.1 404 Not Found
        Server: nginx/1.10.3
        Date: Tue, 06 Aug 2024 23:00:50 GMT
        Content-Type: text/html
        Connection: close
        X-Powered-By: PHP/5.3.3
      • flag-nl
        POST
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        MalwareBazaar.exe
        Remote address:
        94.156.66.169:5788
        Request
        POST /bhvstgd/Panel/five/fre.php HTTP/1.0
        User-Agent: Mozilla/4.08 (Charon; Inferno)
        Host: 94.156.66.169
        Accept: */*
        Content-Type: application/octet-stream
        Content-Encoding: binary
        Content-Key: 2C665EBA
        Content-Length: 153
        Connection: close
        Response
        HTTP/1.1 404 Not Found
        Server: nginx/1.10.3
        Date: Tue, 06 Aug 2024 23:00:50 GMT
        Content-Type: text/html
        Connection: close
        X-Powered-By: PHP/5.3.3
      • flag-us
        DNS
        169.66.156.94.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        169.66.156.94.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.35.223.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.35.223.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.165.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.165.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        43.229.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        43.229.111.52.in-addr.arpa
        IN PTR
        Response
      • 13.107.21.237:443
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=
        tls, http2
        2.0kB
        9.3kB
        22
        19

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dd0fbf11098c48f2900d816254745ade&localId=w:58F15D5C-450D-8348-2910-A8A47129F4C2&deviceId=6825833575955334&anid=

        HTTP Response

        204
      • 94.156.66.169:5788
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        http
        MalwareBazaar.exe
        880 B
        431 B
        6
        6

        HTTP Request

        POST http://94.156.66.169/bhvstgd/Panel/five/fre.php

        HTTP Response

        404
      • 94.156.66.169:5788
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        http
        MalwareBazaar.exe
        702 B
        431 B
        6
        6

        HTTP Request

        POST http://94.156.66.169/bhvstgd/Panel/five/fre.php

        HTTP Response

        404
      • 94.156.66.169:5788
        http://94.156.66.169/bhvstgd/Panel/five/fre.php
        http
        MalwareBazaar.exe
        675 B
        431 B
        6
        6

        HTTP Request

        POST http://94.156.66.169/bhvstgd/Panel/five/fre.php

        HTTP Response

        404
      • 8.8.8.8:53
        g.bing.com
        dns
        56 B
        151 B
        1
        1

        DNS Request

        g.bing.com

        DNS Response

        13.107.21.237
        204.79.197.237

      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        237.21.107.13.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        237.21.107.13.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        140.32.126.40.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        140.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        169.66.156.94.in-addr.arpa
        dns
        72 B
        132 B
        1
        1

        DNS Request

        169.66.156.94.in-addr.arpa

      • 8.8.8.8:53
        26.35.223.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        26.35.223.20.in-addr.arpa

      • 8.8.8.8:53
        26.165.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        26.165.165.52.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        43.229.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        43.229.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2392887640-1187051047-2909758433-1000\0f5007522459c86e95ffcc62f32308f1_c186ecc3-67e4-4d2b-8682-b6c322da87aa

        Filesize

        46B

        MD5

        d898504a722bff1524134c6ab6a5eaa5

        SHA1

        e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

        SHA256

        878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

        SHA512

        26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2392887640-1187051047-2909758433-1000\0f5007522459c86e95ffcc62f32308f1_c186ecc3-67e4-4d2b-8682-b6c322da87aa

        Filesize

        46B

        MD5

        c07225d4e7d01d31042965f048728a0a

        SHA1

        69d70b340fd9f44c89adb9a2278df84faa9906b7

        SHA256

        8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

        SHA512

        23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

      • memory/376-6-0x0000000007A20000-0x0000000007FC4000-memory.dmp

        Filesize

        5.6MB

      • memory/376-3-0x00000000749E0000-0x0000000075190000-memory.dmp

        Filesize

        7.7MB

      • memory/376-4-0x0000000004DE0000-0x0000000004E48000-memory.dmp

        Filesize

        416KB

      • memory/376-5-0x00000000073D0000-0x000000000746C000-memory.dmp

        Filesize

        624KB

      • memory/376-0-0x00000000749EE000-0x00000000749EF000-memory.dmp

        Filesize

        4KB

      • memory/376-7-0x0000000007510000-0x00000000075A2000-memory.dmp

        Filesize

        584KB

      • memory/376-8-0x0000000007470000-0x0000000007476000-memory.dmp

        Filesize

        24KB

      • memory/376-14-0x00000000749E0000-0x0000000075190000-memory.dmp

        Filesize

        7.7MB

      • memory/376-2-0x0000000004DD0000-0x0000000004DD6000-memory.dmp

        Filesize

        24KB

      • memory/376-1-0x0000000000440000-0x00000000004A4000-memory.dmp

        Filesize

        400KB

      • memory/1060-9-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/1060-12-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/1060-33-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.