Analysis
-
max time kernel
47s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 04:00
Static task
static1
General
-
Target
PO772986.exe
-
Size
656KB
-
MD5
04123d5520d6eff585c03e96b02c9446
-
SHA1
bfebae123679cf50b6a82d53e4557472dc036b95
-
SHA256
9b9cfba2ff3b094cd28f4483e7520b07ea46d3e99f96f173835c81eaed289221
-
SHA512
eee6019ac66b9d5cb3a41964a990f9746db4f7bf65147c8bc79591e260a10d55efd8c7572cdbde92a80c88b999076b6a94ee717e8a0074816ba0310801ac2151
-
SSDEEP
6144:uau3IHhrLZqtmQgfiL0LP9fbvU+GkJsvZ1zrOOPj0If6oM:vu3S1kL8ZFGMiHQICl
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/4LlT7SRZcUYvF
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Lokibot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO772986.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO772986.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO772986.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 272 set thread context of 2776 272 PO772986.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO772986.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 PID 272 wrote to memory of 2776 272 PO772986.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO772986.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO772986.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO772986.exe"C:\Users\Admin\AppData\Local\Temp\PO772986.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Local\Temp\PO772986.exe"C:\Users\Admin\AppData\Local\Temp\PO772986.exe"2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2776
-