Windows
Analysis Report
TXzf0xX2uq.exe
Overview
General Information
Sample name: | TXzf0xX2uq.exerenamed because original name is a hash value |
Original sample name: | 5cb3d5d5e66657ffe6aa4b6819b8f885364a801c01353369f2fbc37a81d250ce.exe |
Analysis ID: | 1634548 |
MD5: | d6cbda717ae7addf9b583718998ae15a |
SHA1: | cbd764261f18b1b88de0c6af3ac08cc7642621a1 |
SHA256: | 5cb3d5d5e66657ffe6aa4b6819b8f885364a801c01353369f2fbc37a81d250ce |
Tags: | exeLokiuser-adrian__luca |
Infos: | |
Detection
Lokibot
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Lokibot
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
TXzf0xX2uq.exe (PID: 8516 cmdline:
"C:\Users\ user\Deskt op\TXzf0xX 2uq.exe" MD5: D6CBDA717AE7ADDF9B583718998AE15A) svchost.exe (PID: 8532 cmdline:
"C:\Users\ user\Deskt op\TXzf0xX 2uq.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Loki Password Stealer (PWS), LokiBot | "Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2 |
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot_1 | Yara detected Lokibot | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot_1 | Yara detected Lokibot | Joe Security | ||
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Click to see the 20 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
Click to see the 24 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:33.394575+0100 | 2024312 | 1 | A Network Trojan was detected | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.334309+0100 | 2024312 | 1 | A Network Trojan was detected | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:32.642770+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:35.168422+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.510599+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:37.583171+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:35.168422+0100 | 2024318 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.510599+0100 | 2024318 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:37.583171+0100 | 2024318 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:32.642770+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:32.642770+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0084445A | |
Source: | Code function: | 0_2_0084C6D1 | |
Source: | Code function: | 0_2_0084C75C | |
Source: | Code function: | 0_2_0084EF95 | |
Source: | Code function: | 0_2_0084F0F2 | |
Source: | Code function: | 0_2_0084F3F3 | |
Source: | Code function: | 0_2_008437EF | |
Source: | Code function: | 0_2_00843B12 | |
Source: | Code function: | 0_2_0084BCBC | |
Source: | Code function: | 1_2_00403D74 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_008522EE |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00854164 |
Source: | Code function: | 0_2_00854164 |
Source: | Code function: | 0_2_00853F66 |
Source: | Code function: | 0_2_0084001C |
Source: | Code function: | 0_2_0086CABC |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_007E3B3A | |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | memstr_4b160b9e-c | |
Source: | String found in binary or memory: | memstr_b0af2807-a | |
Source: | String found in binary or memory: | memstr_79365762-f | |
Source: | String found in binary or memory: | memstr_766ba80f-1 |
Source: | Code function: | 1_2_00DA3540 | |
Source: | Code function: | 1_2_00DA33C0 | |
Source: | Code function: | 1_2_00DA2720 |
Source: | Code function: | 0_2_0084A1EF |
Source: | Code function: | 0_2_00838310 |
Source: | Code function: | 0_2_008451BD |
Source: | Code function: | 0_2_007EE6A0 | |
Source: | Code function: | 0_2_0080D975 | |
Source: | Code function: | 0_2_008021C5 | |
Source: | Code function: | 0_2_008162D2 | |
Source: | Code function: | 0_2_008603DA | |
Source: | Code function: | 0_2_0081242E | |
Source: | Code function: | 0_2_008025FA | |
Source: | Code function: | 0_2_0083E616 | |
Source: | Code function: | 0_2_007F66E1 | |
Source: | Code function: | 0_2_0081878F | |
Source: | Code function: | 0_2_00848889 | |
Source: | Code function: | 0_2_007F8808 | |
Source: | Code function: | 0_2_00816844 | |
Source: | Code function: | 0_2_00860857 | |
Source: | Code function: | 0_2_0080CB21 | |
Source: | Code function: | 0_2_00816DB6 | |
Source: | Code function: | 0_2_007F6F9E | |
Source: | Code function: | 0_2_007F3030 | |
Source: | Code function: | 0_2_00803187 | |
Source: | Code function: | 0_2_0080F1D9 | |
Source: | Code function: | 0_2_007E1287 | |
Source: | Code function: | 0_2_00801484 | |
Source: | Code function: | 0_2_007F5520 | |
Source: | Code function: | 0_2_00807696 | |
Source: | Code function: | 0_2_007F5760 | |
Source: | Code function: | 0_2_00801978 | |
Source: | Code function: | 0_2_00819AB5 | |
Source: | Code function: | 0_2_007EFCE0 | |
Source: | Code function: | 0_2_00801D90 | |
Source: | Code function: | 0_2_0080BDA6 | |
Source: | Code function: | 0_2_00867DDB | |
Source: | Code function: | 0_2_007EDF00 | |
Source: | Code function: | 0_2_007F3FE0 | |
Source: | Code function: | 0_2_01275DD8 | |
Source: | Code function: | 1_2_0040549C | |
Source: | Code function: | 1_2_004029D4 | |
Source: | Code function: | 1_2_00DA2720 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_0084A06A |
Source: | Code function: | 0_2_008381CB | |
Source: | Code function: | 0_2_008387E1 | |
Source: | Code function: | 1_2_0040650A |
Source: | Code function: | 0_2_0084B3FB |
Source: | Code function: | 0_2_0085EE0D |
Source: | Code function: | 0_2_0084C397 |
Source: | Code function: | 0_2_007E4E89 |
Source: | Code function: | 1_2_00DA3360 |
Source: | Code function: | 1_2_00DA3360 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_007E4B37 |
Source: | Code function: | 0_2_00808958 | |
Source: | Code function: | 1_2_00402AD4 | |
Source: | Code function: | 1_2_00402AFC |
Source: | Code function: | 1_2_00DA3360 |
Source: | Code function: | 0_2_007E48D7 | |
Source: | Code function: | 0_2_00865376 |
Source: | Code function: | 0_2_00803187 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: |
Source: | Binary or memory string: |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_0084445A | |
Source: | Code function: | 0_2_0084C6D1 | |
Source: | Code function: | 0_2_0084C75C | |
Source: | Code function: | 0_2_0084EF95 | |
Source: | Code function: | 0_2_0084F0F2 | |
Source: | Code function: | 0_2_0084F3F3 | |
Source: | Code function: | 0_2_008437EF | |
Source: | Code function: | 0_2_00843B12 | |
Source: | Code function: | 0_2_0084BCBC | |
Source: | Code function: | 1_2_00403D74 |
Source: | Code function: | 0_2_007E49A0 |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_00853F09 |
Source: | Code function: | 0_2_007E3B3A |
Source: | Code function: | 0_2_00815A7C |
Source: | Code function: | 0_2_007E4B37 |
Source: | Code function: | 0_2_01274678 | |
Source: | Code function: | 0_2_01275C68 | |
Source: | Code function: | 0_2_01275CC8 | |
Source: | Code function: | 1_2_0040317B | |
Source: | Code function: | 1_2_00DA3060 | |
Source: | Code function: | 1_2_00DA3060 | |
Source: | Code function: | 1_2_00DA3060 | |
Source: | Code function: | 1_2_00DA3060 | |
Source: | Code function: | 1_2_00DA4410 | |
Source: | Code function: | 1_2_00DA4410 | |
Source: | Code function: | 1_2_00DA3540 | |
Source: | Code function: | 1_2_00DA3540 | |
Source: | Code function: | 1_2_00DA3540 | |
Source: | Code function: | 1_2_00DA56A0 | |
Source: | Code function: | 1_2_00DA56A0 | |
Source: | Code function: | 1_2_00DA4610 | |
Source: | Code function: | 1_2_00DA4610 | |
Source: | Code function: | 1_2_00DA4610 | |
Source: | Code function: | 1_2_00DA4610 |
Source: | Code function: | 0_2_008380A9 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 0_2_0080A124 | |
Source: | Code function: | 0_2_0080A155 | |
Source: | Code function: | 1_2_00DA5848 | |
Source: | Code function: | 1_2_00DA33C0 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior |
Source: | Section loaded: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 0_2_008387B1 |
Source: | Code function: | 0_2_007E3B3A |
Source: | Code function: | 0_2_007E48D7 |
Source: | Code function: | 0_2_00844C27 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00837CAF |
Source: | Code function: | 0_2_0083874B |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0080862B |
Source: | Code function: | 0_2_00814E87 |
Source: | Code function: | 0_2_00821E06 |
Source: | Code function: | 0_2_00813F3A |
Source: | Code function: | 0_2_007E49A0 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 1_2_0040D069 | |
Source: | Code function: | 1_2_0040D069 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_00856283 | |
Source: | Code function: | 0_2_00856747 | |
Source: | Code function: | 1_2_00DA6AF0 | |
Source: | Code function: | 1_2_00DA6BB0 | |
Source: | Code function: | 1_2_00DA6B60 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 2 Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 1 Disable or Modify Tools | 2 OS Credential Dumping | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 2 Service Execution | 2 Valid Accounts | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 21 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 3 Windows Service | 2 Valid Accounts | 2 Obfuscated Files or Information | 2 Credentials in Registry | 1 File and Directory Discovery | SMB/Windows Admin Shares | 1 Email Collection | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 21 Access Token Manipulation | 1 DLL Side-Loading | NTDS | 117 System Information Discovery | Distributed Component Object Model | 21 Input Capture | 113 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 3 Windows Service | 1 Masquerading | LSA Secrets | 241 Security Software Discovery | SSH | 3 Clipboard Data | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | 312 Process Injection | 2 Valid Accounts | Cached Domain Credentials | 21 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 21 Virtualization/Sandbox Evasion | DCSync | 2 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 21 Access Token Manipulation | Proc Filesystem | 1 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 312 Process Injection | /etc/passwd and /etc/shadow | 1 System Owner/User Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | ReversingLabs | Win32.Infostealer.LokiBot | ||
71% | Virustotal | Browse | ||
100% | Avira | TR/AD.LokiBot.usvro |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
touxzw.ir | 104.21.64.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.64.1 | touxzw.ir | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1634548 |
Start date and time: | 2025-03-11 01:18:37 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | TXzf0xX2uq.exerenamed because original name is a hash value |
Original Sample Name: | 5cb3d5d5e66657ffe6aa4b6819b8f885364a801c01353369f2fbc37a81d250ce.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/6@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 23.60.203.209, 52.149.20.212, 150.171.28.10, 20.109.210.53
- Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, g.bing.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
20:19:33 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.64.1 | Get hash | malicious | DarkTortilla, FormBook | Browse |
| |
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
touxzw.ir | Get hash | malicious | Lokibot | Browse |
| |
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | DarkTortilla, MSIL Logger, MassLogger RAT | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\TXzf0xX2uq.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 7.414729547534895 |
Encrypted: | false |
SSDEEP: | 3072:0PiTZVAfJPejcky/qE7H5zkcViGHfpXS2YK:0SZVCQ8q0zktGHBXS2z |
MD5: | A705A4C139F8D9B5398DBB384A087BA0 |
SHA1: | 880A1266C3A329CF8E62698E86C84A54286587F4 |
SHA-256: | D1ABE172F84C2CDB6AAF39E020F64C8924B4655F467ABF48851BC86119ECE286 |
SHA-512: | 73D38544F9F0D4AE844BFCCE606969BF72568A459DEEC0D0B659280B656D1BA4594AB34CFC47CDF8EFD50501292915E9E5F16A483D00277FD9447EFD0D222B50 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\TXzf0xX2uq.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79456 |
Entropy (8bit): | 7.952251677073178 |
Encrypted: | false |
SSDEEP: | 1536:I+RznAqVEnDRsgE2lW68e++AMKxHXQugyvyVI9qrxCErG:jzan82lW69++dygKxqYEi |
MD5: | D8B4DBF7E7B1F158423AF30B58D0F660 |
SHA1: | A1A90A38599CEF91552B334BDDC592C1D1DFE7A6 |
SHA-256: | 08384D26C63533CA82BCDB19A70BDFDA821FED9C1FF9EC9B22F74227C434CD6A |
SHA-512: | 98EFF08F5C8DCA384787ED27B059967AE6636A217591E69DC9192475800ED2A2A64574E35DA7CAAB2654F7535A4027839272781C54EE2C67BD5BD2278EEF6ECF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\TXzf0xX2uq.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9594 |
Entropy (8bit): | 7.6019184990708855 |
Encrypted: | false |
SSDEEP: | 192:c09SJLZ7jNO7sh4RlrIJ6R7ZHChK2VmFMWCQLErJ8ZzOzvtk0kr3R8gKqaQGBX8:X9SJtj097UJYPg2ZaYr3RAQGl8 |
MD5: | B495BF4473CA488434C4B4283E3A97D9 |
SHA1: | 984837B70D8F565A82A750383E50CFCA48C4CD1D |
SHA-256: | 20C28D8BE9378DC21F2F1C333105BC2C668FF32FB981B19C4C4DFCA907BF1FED |
SHA-512: | E513061B4233EB26F9D193C6C00724766F066324CF3C8FA9DE37BF7935BC55FA6C335B2CAB40014E33602C6E3B53BDB2B88B2672F2C572D92E914256156922E1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\TXzf0xX2uq.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28674 |
Entropy (8bit): | 3.5739687292641804 |
Encrypted: | false |
SSDEEP: | 768:G3i/rgPZ9HVfX5tOCnUBwp5J96buL42l1lfn01uLphM:UiTgPZ9BptOvPuLDM |
MD5: | E8460A920A8E893E9948A6084B068DFF |
SHA1: | 4884F912E733FF1E43C3DC3EDE3AD624FA945E2E |
SHA-256: | 7C4397D6CDD052B3CF32E199C7E6A872DAFA27BD667E0F2BFC8D09DA122C3C7F |
SHA-512: | C2EAEBC4E069317B12939F61C1B8AC111449E24D142E3295120E28B9270D85595B154E632577256BE1BA4310A290713ED7137E4D41EFA5193FCC5F0A5428111F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
Download File
Process: | C:\Windows\SysWOW64\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 47 |
Entropy (8bit): | 1.168829563685559 |
Encrypted: | false |
SSDEEP: | 3:/lSll2DQi:AoMi |
MD5: | DAB633BEBCCE13575989DCFA4E2203D6 |
SHA1: | 33186D50F04C5B5196C1FCC1FAD17894B35AC6C7 |
SHA-256: | 1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17 |
SHA-512: | EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.84243984612773 |
TrID: |
|
File name: | TXzf0xX2uq.exe |
File size: | 963'584 bytes |
MD5: | d6cbda717ae7addf9b583718998ae15a |
SHA1: | cbd764261f18b1b88de0c6af3ac08cc7642621a1 |
SHA256: | 5cb3d5d5e66657ffe6aa4b6819b8f885364a801c01353369f2fbc37a81d250ce |
SHA512: | 4ec9698a8940bcb7ff73001cb8295e10f8496095e85672b2bbc8cf17ded28e0ff467d0dd9a6df8690fcbd18bc3b7b8108ec3e4e83ad5e35c11b4c664bc729f2c |
SSDEEP: | 24576:+u6J33O0c+JY5UZ+XC0kGso6FaOA9aMrz0WY:Qu0c++OCvkGs9FaOA8iY |
TLSH: | 5F25AE2273DDC360CB669173BF69B7016EBF3C614630B95B2F880D7DA950162262D7A3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}. |
Icon Hash: | aaf3e3e3938382a0 |
Entrypoint: | 0x427dcd |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67BE6AF9 [Wed Feb 26 01:14:33 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | afcdf79be1557326c854b6e20cb900a7 |
Instruction |
---|
call 00007FAE48DDE97Ah |
jmp 00007FAE48DD1744h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push edi |
push esi |
mov esi, dword ptr [esp+10h] |
mov ecx, dword ptr [esp+14h] |
mov edi, dword ptr [esp+0Ch] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007FAE48DD18CAh |
cmp edi, eax |
jc 00007FAE48DD1C2Eh |
bt dword ptr [004C31FCh], 01h |
jnc 00007FAE48DD18C9h |
rep movsb |
jmp 00007FAE48DD1BDCh |
cmp ecx, 00000080h |
jc 00007FAE48DD1A94h |
mov eax, edi |
xor eax, esi |
test eax, 0000000Fh |
jne 00007FAE48DD18D0h |
bt dword ptr [004BE324h], 01h |
jc 00007FAE48DD1DA0h |
bt dword ptr [004C31FCh], 00000000h |
jnc 00007FAE48DD1A6Dh |
test edi, 00000003h |
jne 00007FAE48DD1A7Eh |
test esi, 00000003h |
jne 00007FAE48DD1A5Dh |
bt edi, 02h |
jnc 00007FAE48DD18CFh |
mov eax, dword ptr [esi] |
sub ecx, 04h |
lea esi, dword ptr [esi+04h] |
mov dword ptr [edi], eax |
lea edi, dword ptr [edi+04h] |
bt edi, 03h |
jnc 00007FAE48DD18D3h |
movq xmm1, qword ptr [esi] |
sub ecx, 08h |
lea esi, dword ptr [esi+08h] |
movq qword ptr [edi], xmm1 |
lea edi, dword ptr [edi+08h] |
test esi, 00000007h |
je 00007FAE48DD1925h |
bt esi, 03h |
jnc 00007FAE48DD1978h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xba44c | 0x17c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc7000 | 0x22b1c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xea000 | 0x711c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x92bc0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xa4870 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8f000 | 0x884 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8dcc4 | 0x8de00 | d28a820a1d9ff26cda02d12b888ba4b4 | False | 0.5728679102422908 | data | 6.676118058520316 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8f000 | 0x2e10e | 0x2e200 | 79b14b254506b0dbc8cd0ad67fb70ad9 | False | 0.33535526761517614 | OpenPGP Public Key | 5.76010872795207 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xbe000 | 0x8f74 | 0x5200 | 9f9d6f746f1a415a63de45f8b7983d33 | False | 0.1017530487804878 | data | 1.198745897703538 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xc7000 | 0x22b1c | 0x22c00 | 1135182a76ab98a489512d37fb0b6587 | False | 0.8104976955935251 | data | 7.566458427321727 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xea000 | 0x711c | 0x7200 | 6fcae3cbbf6bfbabf5ec5bbe7cf612c3 | False | 0.7650767543859649 | data | 6.779031650454199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc75a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.7466216216216216 |
RT_ICON | 0xc76d0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colors | English | Great Britain | 0.3277027027027027 |
RT_ICON | 0xc77f8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.3885135135135135 |
RT_ICON | 0xc7920 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | Great Britain | 0.3333333333333333 |
RT_ICON | 0xc7c08 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | Great Britain | 0.5 |
RT_ICON | 0xc7d30 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | Great Britain | 0.2835820895522388 |
RT_ICON | 0xc8bd8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | Great Britain | 0.37906137184115524 |
RT_ICON | 0xc9480 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | Great Britain | 0.23699421965317918 |
RT_ICON | 0xc99e8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | Great Britain | 0.13858921161825727 |
RT_ICON | 0xcbf90 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | Great Britain | 0.25070356472795496 |
RT_ICON | 0xcd038 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | Great Britain | 0.3173758865248227 |
RT_MENU | 0xcd4a0 | 0x50 | data | English | Great Britain | 0.9 |
RT_STRING | 0xcd4f0 | 0x594 | data | English | Great Britain | 0.3333333333333333 |
RT_STRING | 0xcda84 | 0x68a | data | English | Great Britain | 0.2747909199522103 |
RT_STRING | 0xce110 | 0x490 | data | English | Great Britain | 0.3715753424657534 |
RT_STRING | 0xce5a0 | 0x5fc | data | English | Great Britain | 0.3087467362924282 |
RT_STRING | 0xceb9c | 0x65c | data | English | Great Britain | 0.34336609336609336 |
RT_STRING | 0xcf1f8 | 0x466 | data | English | Great Britain | 0.3605683836589698 |
RT_STRING | 0xcf660 | 0x158 | Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0 | English | Great Britain | 0.502906976744186 |
RT_RCDATA | 0xcf7b8 | 0x19de2 | data | 1.0003869603790325 | ||
RT_GROUP_ICON | 0xe959c | 0x76 | data | English | Great Britain | 0.6610169491525424 |
RT_GROUP_ICON | 0xe9614 | 0x14 | data | English | Great Britain | 1.25 |
RT_GROUP_ICON | 0xe9628 | 0x14 | data | English | Great Britain | 1.15 |
RT_GROUP_ICON | 0xe963c | 0x14 | data | English | Great Britain | 1.25 |
RT_VERSION | 0xe9650 | 0xdc | data | English | Great Britain | 0.6181818181818182 |
RT_MANIFEST | 0xe972c | 0x3ef | ASCII text, with CRLF line terminators | English | Great Britain | 0.5074478649453823 |
DLL | Import |
---|---|
WSOCK32.dll | WSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect |
VERSION.dll | GetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW |
WINMM.dll | timeGetTime, waveOutSetVolume, mciSendStringW |
COMCTL32.dll | ImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create |
MPR.dll | WNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W |
WININET.dll | InternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW |
PSAPI.DLL | GetProcessMemoryInfo |
IPHLPAPI.DLL | IcmpCreateFile, IcmpCloseHandle, IcmpSendEcho |
USERENV.dll | DestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW |
UxTheme.dll | IsThemeActive |
KERNEL32.dll | DuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA |
USER32.dll | AdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW |
GDI32.dll | StrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath |
COMDLG32.dll | GetOpenFileNameW, GetSaveFileNameW |
ADVAPI32.dll | GetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW |
SHELL32.dll | DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish |
ole32.dll | CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity |
OLEAUT32.dll | LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit |
Description | Data |
---|---|
Translation | 0x0809 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | Great Britain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T01:19:32.642770+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:32.642770+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:32.642770+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.394575+0100 | 2024312 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 | 1 | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:33.564117+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.334309+0100 | 2024312 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 | 1 | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:34.413798+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.168422+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.168422+0100 | 2024318 | ET MALWARE LokiBot Request for C2 Commands Detected M2 | 1 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:35.808325+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.510599+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.510599+0100 | 2024318 | ET MALWARE LokiBot Request for C2 Commands Detected M2 | 1 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:36.839406+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:37.583171+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
2025-03-11T01:19:37.583171+0100 | 2024318 | ET MALWARE LokiBot Request for C2 Commands Detected M2 | 1 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 01:19:32.630562067 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:32.635386944 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:32.635454893 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:32.637934923 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:32.642708063 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:32.642770052 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:32.647589922 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.394264936 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.394575119 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.394685030 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.394728899 CET | 49708 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.399353981 CET | 80 | 49708 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.552076101 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.556957006 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.559210062 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.559210062 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.564045906 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:33.564116955 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:33.568926096 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.334078074 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.334309101 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.337446928 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.337549925 CET | 49709 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.339102983 CET | 80 | 49709 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.399790049 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.405103922 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.407109976 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.408930063 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.413742065 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:34.413798094 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:34.418575048 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.167787075 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.168343067 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.168421984 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.175215960 CET | 49710 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.180104017 CET | 80 | 49710 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.741540909 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.747136116 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.747251034 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.803314924 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.808240891 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:35.808325052 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:35.814017057 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.510162115 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.510598898 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.511272907 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.511323929 CET | 49711 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.515427113 CET | 80 | 49711 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.826986074 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.832030058 CET | 80 | 49712 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.832277060 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.834408045 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.839315891 CET | 80 | 49712 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:36.839406013 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:36.844176054 CET | 80 | 49712 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:37.582515001 CET | 80 | 49712 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:37.583077908 CET | 80 | 49712 | 104.21.64.1 | 192.168.2.5 |
Mar 11, 2025 01:19:37.583170891 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Mar 11, 2025 01:19:44.549726009 CET | 49712 | 80 | 192.168.2.5 | 104.21.64.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 01:19:32.532927036 CET | 58769 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 11, 2025 01:19:32.625010967 CET | 53 | 58769 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 11, 2025 01:19:32.532927036 CET | 192.168.2.5 | 1.1.1.1 | 0x3091 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 01:19:32.625010967 CET | 1.1.1.1 | 192.168.2.5 | 0x3091 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49708 | 104.21.64.1 | 80 | 8532 | C:\Windows\SysWOW64\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 11, 2025 01:19:32.637934923 CET | 241 | OUT | |
Mar 11, 2025 01:19:32.642770052 CET | 180 | OUT | |
Mar 11, 2025 01:19:33.394264936 CET | 820 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49709 | 104.21.64.1 | 80 | 8532 | C:\Windows\SysWOW64\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 11, 2025 01:19:33.559210062 CET | 241 | OUT | |
Mar 11, 2025 01:19:33.564116955 CET | 180 | OUT | |
Mar 11, 2025 01:19:34.334078074 CET | 998 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49710 | 104.21.64.1 | 80 | 8532 | C:\Windows\SysWOW64\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 11, 2025 01:19:34.408930063 CET | 241 | OUT | |
Mar 11, 2025 01:19:34.413798094 CET | 153 | OUT | |
Mar 11, 2025 01:19:35.167787075 CET | 994 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49711 | 104.21.64.1 | 80 | 8532 | C:\Windows\SysWOW64\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 11, 2025 01:19:35.803314924 CET | 241 | OUT | |
Mar 11, 2025 01:19:35.808325052 CET | 153 | OUT | |
Mar 11, 2025 01:19:36.510162115 CET | 989 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49712 | 104.21.64.1 | 80 | 8532 | C:\Windows\SysWOW64\svchost.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 11, 2025 01:19:36.834408045 CET | 241 | OUT | |
Mar 11, 2025 01:19:36.839406013 CET | 153 | OUT | |
Mar 11, 2025 01:19:37.582515001 CET | 819 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 20:19:27 |
Start date: | 10/03/2025 |
Path: | C:\Users\user\Desktop\TXzf0xX2uq.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7e0000 |
File size: | 963'584 bytes |
MD5 hash: | D6CBDA717AE7ADDF9B583718998AE15A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 20:19:27 |
Start date: | 10/03/2025 |
Path: | C:\Windows\SysWOW64\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xda0000 |
File size: | 46'504 bytes |
MD5 hash: | 1ED18311E3DA35942DB37D15FA40CC5B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |