Loading ...

Play interactive tourEdit tour

Analysis Report scan00430599935.exe

Overview

General Information

Joe Sandbox Version:28.0.0 Lapis Lazuli
Analysis ID:228942
Start date:11.05.2020
Start time:07:26:29
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 56s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:scan00430599935.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.spyw.evad.winEXE@3/2@96/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 95.4% (good quality ratio 93.2%)
  • Quality average: 83.9%
  • Quality standard deviation: 24.6%
HCA Information:
  • Successful, ratio: 94%
  • Number of executed functions: 84
  • Number of non-executed functions: 162
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
  • Excluded IPs from analysis (whitelisted): 2.18.68.82, 205.185.216.42, 205.185.216.10
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingWhitelistedThreatDetection
Threshold1000 - 100false
Lokibot
malicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification Spiderchart

Analysis Advice

All domains contacted by the sample do not resolve. Likely the sample is an old dropper which does no longer work
Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook
Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExecution through API2Application Shimming1Access Token Manipulation1Software Packing2Credential Dumping2System Time Discovery11Remote File Copy1Man in the Browser1Data Encrypted1Remote File Copy1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Replication Through Removable MediaService ExecutionPort MonitorsProcess Injection112Deobfuscate/Decode Files or Information1Input Capture21Account Discovery1Remote ServicesData from Local System2Exfiltration Over Other Network MediumStandard Cryptographic Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
External Remote ServicesWindows Management InstrumentationAccessibility FeaturesApplication Shimming1Obfuscated Files or Information3Credentials in Registry2Security Software Discovery13Windows Remote ManagementEmail Collection1Automated ExfiltrationStandard Non-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Drive-by CompromiseScheduled TaskSystem FirmwareDLL Search Order HijackingMasquerading11Credentials in FilesFile and Directory Discovery2Logon ScriptsInput Capture21Data EncryptedStandard Application Layer Protocol1SIM Card SwapPremium SMS Toll Fraud
Exploit Public-Facing ApplicationCommand-Line InterfaceShortcut ModificationFile System Permissions WeaknessVirtualization/Sandbox Evasion2Account ManipulationSystem Information Discovery37Shared WebrootData StagedScheduled TransferStandard Cryptographic ProtocolManipulate Device CommunicationManipulate App Store Rankings or Ratings
Spearphishing LinkGraphical User InterfaceModify Existing ServiceNew ServiceAccess Token Manipulation1Brute ForceVirtualization/Sandbox Evasion2Third-party SoftwareScreen CaptureData Transfer Size LimitsCommonly Used PortJamming or Denial of ServiceAbuse Accessibility Features
Spearphishing AttachmentScriptingPath InterceptionScheduled TaskProcess Injection112Two-Factor Authentication InterceptionProcess Discovery3Pass the HashEmail CollectionExfiltration Over Command and Control ChannelUncommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Spearphishing via ServiceThird-party SoftwareLogon ScriptsProcess InjectionIndicator BlockingBash HistoryApplication Window Discovery11Remote Desktop ProtocolClipboard DataExfiltration Over Alternative ProtocolStandard Application Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Supply Chain CompromiseRundll32DLL Search Order HijackingService Registry Permissions WeaknessProcess InjectionInput PromptSystem Owner/User Discovery1Windows Admin SharesAutomated CollectionExfiltration Over Physical MediumMultilayer EncryptionRogue Cellular Base StationData Destruction
Trusted RelationshipPowerShellChange Default File AssociationExploitation for Privilege EscalationScriptingKeychainRemote System Discovery1Taint Shared ContentAudio CaptureCommonly Used PortConnection ProxyData Encrypted for Impact

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Found malware configurationShow sources
Source: scan00430599935.exe.2016.2.memstrMalware Configuration Extractor: Lokibot {"c2:": "http://rnarport.com/dull/five/fre.php"}
Multi AV Scanner detection for domain / URLShow sources
Source: rnarport.comVirustotal: Detection: 12%Perma Link
Source: http://rnarport.com/dull/five/fre.phpVirustotal: Detection: 16%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: scan00430599935.exeVirustotal: Detection: 75%Perma Link
Source: scan00430599935.exeReversingLabs: Detection: 87%

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0046A568 FindFirstFileA,GetLastError,FindClose,0_2_0046A568
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004085F4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004085F4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00405300 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405300
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_1_00403D74

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then push 00000000h0_2_0046F478
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then call 0040635Ch0_2_0046F478
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then push 00480D2Ch0_2_0046F478
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then xor ebx, ebx0_2_0046F028
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then inc ebx0_2_0046F028
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then mov eax, dword ptr [ebp+08h]0_2_0046F028
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 4x nop then call 004063BCh0_2_0046F334

Networking:

barindex
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)Show sources
Source: unknownDNS traffic detected: query: rnarport.com replaycode: Server failure (2)
Contains functionality to download additional files from the internetShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_00404ED4 recv,2_2_00404ED4
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: rnarport.com
Urls found in memory or binary dataShow sources
Source: scan00430599935.exe, 00000002.00000002.1187738174.000000000049F000.00000040.00000001.sdmpString found in binary or memory: http://rnarport.com/dull/five/fre.php
Source: scan00430599935.exe, scan00430599935.exe, 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.ibsensoftware.com/

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to retrieve information about pressed keystrokesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00447130 GetKeyboardState,0_2_00447130
Creates a DirectInput object (often for capturing keystrokes)Show sources
Source: scan00430599935.exe, 00000000.00000002.765642789.00000000007C0000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
Source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
Source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
Source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
Source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
Source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
Contains functionality to call native functionsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004646F4 NtdllDefWindowProc_A,0_2_004646F4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0044A04C NtdllDefWindowProc_A,GetCapture,0_2_0044A04C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00464E9C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00464E9C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00464F4C IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00464F4C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004599E4 GetSubMenu,SaveDC,RestoreDC,7337B080,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_004599E4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042DA58 NtdllDefWindowProc_A,0_2_0042DA58
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00750642 NtUnmapViewOfSection,GetThreadContext,SetThreadContext,NtResumeThread,0_2_00750642
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00750DDD NtQueryInformationProcess,NtQueryInformationProcess,0_2_00750DDD
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_007555BB NtMapViewOfSection,0_2_007555BB
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00755CD2 NtCreateSection,0_2_00755CD2
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00750DAB NtQueryInformationProcess,NtQueryInformationProcess,0_2_00750DAB
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_007555B3 NtMapViewOfSection,0_2_007555B3
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_007576F8 SetThreadContext,NtResumeThread,0_2_007576F8
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00755C91 NtCreateSection,0_2_00755C91
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00434B400_2_00434B40
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0045EBEC0_2_0045EBEC
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004232870_2_00423287
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004599E40_2_004599E4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00439F980_2_00439F98
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_0040549C2_2_0040549C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_004029D42_2_004029D4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_0040549C2_1_0040549C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_004029D42_1_004029D4
Found potential string decryption / allocating functionsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00406384 appears 63 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00405B6F appears 84 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00403F20 appears 93 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00404BEE appears 56 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00404B22 appears 54 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 00412093 appears 40 times
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: String function: 0041219C appears 90 times
PE file contains strange resourcesShow sources
Source: scan00430599935.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version infoShow sources
Source: scan00430599935.exe, 00000000.00000000.762289868.0000000000485000.00000002.00020000.sdmpBinary or memory string: OriginalFilename.e2oxoe( vs scan00430599935.exe
Source: scan00430599935.exe, 00000000.00000002.765567325.0000000000730000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs scan00430599935.exe
Source: scan00430599935.exe, 00000002.00000000.764289887.0000000000485000.00000002.00020000.sdmpBinary or memory string: OriginalFilename.e2oxoe( vs scan00430599935.exe
Source: scan00430599935.exeBinary or memory string: OriginalFilename.e2oxoe( vs scan00430599935.exe
Searches the installation path of Mozilla FirefoxShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeRegistry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Mozilla\Mozilla Firefox\63.0.3 (x86 en-US)\Main Install DirectoryJump to behavior
Yara signature matchShow sources
Source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Steve Miller, Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Steve Miller, Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Steve Miller, Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Steve Miller, Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Steve Miller, Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
Source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
Classification labelShow sources
Source: classification engineClassification label: mal100.spyw.evad.winEXE@3/2@96/0
Contains functionality for error loggingShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004256AC GetLastError,FormatMessageA,0_2_004256AC
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_2_0040650A
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_1_0040650A
Contains functionality to check free disk spaceShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004087DA GetDiskFreeSpaceA,0_2_004087DA
Contains functionality to enum processes or threadsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0075624A VirtualAlloc,CreateToolhelp32Snapshot,Process32FirstW,0_2_0075624A
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,2_2_0040434D
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00418190 FindResourceA,0_2_00418190
Creates files inside the user directoryShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-58933367-3072710494-194312298-1002\4216a73197943a17d1161a6bdc4512b0_59407d34-c8c5-44df-a766-ba8a11cb1cb0Jump to behavior
Creates mutexesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeMutant created: \Sessions\1\BaseNamedObjects\F7EE0CF1CF93AA2F06F12A09
Parts of this applications are using Borland Delphi (Probably coded in Delphi)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Reads ini filesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Reads the hosts fileShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Sample is known by AntivirusShow sources
Source: scan00430599935.exeVirustotal: Detection: 75%
Source: scan00430599935.exeReversingLabs: Detection: 87%
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\scan00430599935.exe 'C:\Users\user\Desktop\scan00430599935.exe'
Source: unknownProcess created: C:\Users\user\Desktop\scan00430599935.exe 'C:\Users\user\Desktop\scan00430599935.exe'
Source: C:\Users\user\Desktop\scan00430599935.exeProcess created: C:\Users\user\Desktop\scan00430599935.exe 'C:\Users\user\Desktop\scan00430599935.exe' Jump to behavior
Checks if Microsoft Office is installedShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeUnpacked PE file: 2.2.scan00430599935.exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.x:W;
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeUnpacked PE file: 2.2.scan00430599935.exe.400000.0.unpack
Yara detected aPLib compressed binaryShow sources
Source: Yara matchFile source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: scan00430599935.exe PID: 4492, type: MEMORY
Source: Yara matchFile source: Process Memory Space: scan00430599935.exe PID: 2016, type: MEMORY
Source: Yara matchFile source: 0.2.scan00430599935.exe.2280000.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPE
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C758 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0042C758
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00451464 push 004514F1h; ret 0_2_004514E9
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00406054 push 00406080h; ret 0_2_00406078
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C058 push 0042C084h; ret 0_2_0042C07C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C010 push 0042C04Eh; ret 0_2_0042C046
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042A01C push 0042A048h; ret 0_2_0042A040
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E0CC push 0042E0FFh; ret 0_2_0042E0F7
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0040E0F4 push 0040E120h; ret 0_2_0040E118
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C090 push 0042C0C8h; ret 0_2_0042C0C0
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E17C push 0042E1BFh; ret 0_2_0042E1B7
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00406110 push 0040613Ch; ret 0_2_00406134
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E12C push 0042E158h; ret 0_2_0042E150
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004521D0 push ecx; mov dword ptr [esp], edx0_2_004521D4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E1E4 push 0042E227h; ret 0_2_0042E21F
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E248 push 0042E294h; ret 0_2_0042E28C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042E2A0 push 0042E2EBh; ret 0_2_0042E2E3
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C3B4 push 0042C3E0h; ret 0_2_0042C3D8
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00452470 push ecx; mov dword ptr [esp], edx0_2_00452474
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0045A498 push 0045A503h; ret 0_2_0045A4FB
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C560 push 0042C58Ch; ret 0_2_0042C584
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0041A564 push ecx; mov dword ptr [esp], ecx0_2_0041A569
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004225E2 push 0042268Fh; ret 0_2_00422687
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004225E4 push 0042268Fh; ret 0_2_00422687
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004146CC push 00414742h; ret 0_2_0041473A
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00422694 push 00422724h; ret 0_2_0042271C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00414744 push 004147ECh; ret 0_2_004147E4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00422726 push 004229C4h; ret 0_2_004229BC
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004527C0 push 004527ECh; ret 0_2_004527E4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004147EE push 0041491Ch; ret 0_2_00414914
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042A868 push 0042A894h; ret 0_2_0042A88C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004148F0 push 0041491Ch; ret 0_2_00414914
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0043E8A0 push 0043E8E2h; ret 0_2_0043E8DA

Hooking and other Techniques for Hiding and Protection:

barindex
Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon.png
Contains functionality to check if a window is minimized (may be used to check if an application is visible)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0046477C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_0046477C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0044C024 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_0044C024
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0044C948 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_0044C948
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042AAA0 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0042AAA0
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00464E9C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00464E9C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00464F4C IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00464F4C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0044B770 IsIconic,GetCapture,0_2_0044B770
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004617A4 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,0_2_004617A4
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C758 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0042C758
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect sleep reduction / modificationsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004408080_2_00440808
Contains functionality to detect sandboxes (mouse cursor move detection)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_00463CEC
Found evasive API chain (date check)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-42592
Found large amount of non-executed APIsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeAPI coverage: 5.9 %
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\Desktop\scan00430599935.exe TID: 4216Thread sleep time: -540000s >= -30000sJump to behavior
Uses the system / local time for branch decision (may execute only at specific dates)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0046F334 GetSystemTime followed by cmp: cmp word ptr [ebp-30h], 07e2h and CTI: jnc 0046F356h0_2_0046F334
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0046A568 FindFirstFileA,GetLastError,FindClose,0_2_0046A568
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_004085F4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_004085F4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00405300 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405300
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_1_00403D74
Contains functionality to query system informationShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00425C3C GetSystemInfo,0_2_00425C3C
Queries a list of all running processesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Checks if the current process is being debuggedShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeProcess queried: DebugObjectHandleJump to behavior
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0042C758 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0042C758
Contains functionality to read the PEBShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_1_0040317B mov eax, dword ptr fs:[00000030h]2_1_0040317B
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_00402B7C GetProcessHeap,RtlAllocateHeap,2_2_00402B7C
Enables debug privilegesShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Maps a DLL or memory area into another processShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeSection loaded: unknown target: C:\Users\user\Desktop\scan00430599935.exe protection: execute and read and writeJump to behavior
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeProcess created: C:\Users\user\Desktop\scan00430599935.exe 'C:\Users\user\Desktop\scan00430599935.exe' Jump to behavior
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: scan00430599935.exe, 00000002.00000002.1188195678.0000000000C90000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: scan00430599935.exe, 00000002.00000002.1188195678.0000000000C90000.00000002.00000001.sdmpBinary or memory string: Progman
Source: scan00430599935.exe, 00000002.00000002.1188195678.0000000000C90000.00000002.00000001.sdmpBinary or memory string: hProgram ManagerWE
Source: scan00430599935.exe, 00000002.00000002.1188195678.0000000000C90000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality locales information (e.g. system language)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_004054B8
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetLocaleInfoA,GetACP,0_2_0040C6A8
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetLocaleInfoA,0_2_0040B14C
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetLocaleInfoA,0_2_0040B100
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_004055C4
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetLocaleInfoA,0_2_00405DAE
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: GetLocaleInfoA,0_2_00405DB0
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00750FC4 cpuid 0_2_00750FC4
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeQueries volume information: C:\ VolumeInformationJump to behavior
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_0046F334 GetSystemTime,RtlExitUserThread,GetTickCount,GetSystemTimeAsFileTime,FileTimeToSystemTime,RtlExitUserThread,GetTickCount,0_2_0046F334
Contains functionality to query the account / user nameShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 2_2_00406069 GetUserNameW,2_2_00406069
Contains functionality to query windows versionShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: 0_2_00451464 GetVersion,0_2_00451464
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information:

barindex
Yara detected LokibotShow sources
Source: Yara matchFile source: 00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: scan00430599935.exe PID: 4492, type: MEMORY
Source: Yara matchFile source: Process Memory Space: scan00430599935.exe PID: 2016, type: MEMORY
Source: Yara matchFile source: 2.2.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.29a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.1.scan00430599935.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.29a0000.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.scan00430599935.exe.2280000.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.1.scan00430599935.exe.400000.0.unpack, type: UNPACKEDPE
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\cert9.dbJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\pkcs11.txtJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\key4.dbJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Tries to harvest and steal ftp login credentialsShow sources
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
Tries to steal Mail credentials (via file access)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
Source: C:\Users\user\Desktop\scan00430599935.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
Tries to steal Mail credentials (via file registry)Show sources
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: PopPassword2_2_0040D069
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: SmtpPassword2_2_0040D069
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: PopPassword2_1_0040D069
Source: C:\Users\user\Desktop\scan00430599935.exeCode function: SmtpPassword2_1_0040D069

Malware Configuration

Threatname: Lokibot

{"c2:": "http://rnarport.com/dull/five/fre.php"}

Behavior Graph

Simulations

Behavior and APIs

TimeTypeDescription
07:27:27API Interceptor9x Sleep call for process: scan00430599935.exe modified

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
scan00430599935.exe75%VirustotalBrowse
scan00430599935.exe87%ReversingLabsWin32.Trojan.Injector

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.2.scan00430599935.exe.400000.0.unpack100%AviraHEUR/AGEN.1042789Download File
0.2.scan00430599935.exe.2280000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.1.scan00430599935.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.2.scan00430599935.exe.29a0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.scan00430599935.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

SourceDetectionScannerLabelLink
rnarport.com12%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.ibsensoftware.com/3%VirustotalBrowse
http://www.ibsensoftware.com/0%URL Reputationsafe
http://rnarport.com/dull/five/fre.php16%VirustotalBrowse
http://rnarport.com/dull/five/fre.php0%Avira URL Cloudsafe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
    00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
      • 0x13bff:$des3: 68 03 66 00 00
      • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
      • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
      00000000.00000002.767677709.00000000029A0000.00000040.00000001.sdmpLoki_1Loki Payloadkevoreilly
      • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
      • 0x153fc:$a2: last_compatible_version
      00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
          • 0x13bff:$des3: 68 03 66 00 00
          • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
          • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
          00000002.00000002.1187670382.0000000000400000.00000040.00000001.sdmpLoki_1Loki Payloadkevoreilly
          • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
          • 0x153fc:$a2: last_compatible_version
          00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmpSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableSteve Miller, Florian Roth
          • 0x13e78:$s1: http://
          • 0x17633:$s1: http://
          • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          • 0x13e80:$s2: https://
          • 0x13e78:$f1: http://
          • 0x17633:$f1: http://
          • 0x13e80:$f2: https://
          00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x12fff:$des3: 68 03 66 00 00
              • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              00000000.00000002.765779289.0000000002280000.00000004.00000001.sdmpLoki_1Loki Payloadkevoreilly
              • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x13ffc:$a2: last_compatible_version
              00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
                00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                  • 0x13bff:$des3: 68 03 66 00 00
                  • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                  • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                  00000002.00000001.764652690.0000000000400000.00000040.00020000.sdmpLoki_1Loki Payloadkevoreilly
                  • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                  • 0x153fc:$a2: last_compatible_version
                  Process Memory Space: scan00430599935.exe PID: 4492JoeSecurity_LokibotYara detected LokibotJoe Security
                    Process Memory Space: scan00430599935.exe PID: 4492JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                      Process Memory Space: scan00430599935.exe PID: 2016JoeSecurity_LokibotYara detected LokibotJoe Security
                        Process Memory Space: scan00430599935.exe PID: 2016JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security

                          Unpacked PEs

                          SourceRuleDescriptionAuthorStrings
                          0.2.scan00430599935.exe.2280000.2.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableSteve Miller, Florian Roth
                          • 0x13278:$s1: http://
                          • 0x16233:$s1: http://
                          • 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
                          • 0x13280:$s2: https://
                          • 0x13278:$f1: http://
                          • 0x16233:$f1: http://
                          • 0x13280:$f2: https://
                          0.2.scan00430599935.exe.2280000.2.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                            0.2.scan00430599935.exe.2280000.2.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                            • 0x123ff:$des3: 68 03 66 00 00
                            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                            0.2.scan00430599935.exe.2280000.2.unpackLoki_1Loki Payloadkevoreilly
                            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                            • 0x133fc:$a2: last_compatible_version
                            2.2.scan00430599935.exe.400000.0.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                              2.2.scan00430599935.exe.400000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                2.2.scan00430599935.exe.400000.0.raw.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                • 0x13bff:$des3: 68 03 66 00 00
                                • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                2.2.scan00430599935.exe.400000.0.raw.unpackLoki_1Loki Payloadkevoreilly
                                • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                • 0x153fc:$a2: last_compatible_version
                                0.2.scan00430599935.exe.29a0000.3.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                  0.2.scan00430599935.exe.29a0000.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                    0.2.scan00430599935.exe.29a0000.3.raw.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                    • 0x13bff:$des3: 68 03 66 00 00
                                    • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                    • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                    0.2.scan00430599935.exe.29a0000.3.raw.unpackLoki_1Loki Payloadkevoreilly
                                    • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                    • 0x153fc:$a2: last_compatible_version
                                    2.1.scan00430599935.exe.400000.0.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                      2.1.scan00430599935.exe.400000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                        2.1.scan00430599935.exe.400000.0.raw.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                        • 0x13bff:$des3: 68 03 66 00 00
                                        • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                        • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                        2.1.scan00430599935.exe.400000.0.raw.unpackLoki_1Loki Payloadkevoreilly
                                        • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                        • 0x153fc:$a2: last_compatible_version
                                        2.2.scan00430599935.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                          2.2.scan00430599935.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                            2.2.scan00430599935.exe.400000.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                            • 0x12fff:$des3: 68 03 66 00 00
                                            • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                            • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                            2.2.scan00430599935.exe.400000.0.unpackLoki_1Loki Payloadkevoreilly
                                            • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                            • 0x13ffc:$a2: last_compatible_version
                                            0.2.scan00430599935.exe.29a0000.3.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableSteve Miller, Florian Roth
                                            • 0x13e78:$s1: http://
                                            • 0x17633:$s1: http://
                                            • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
                                            • 0x13e80:$s2: https://
                                            • 0x13e78:$f1: http://
                                            • 0x17633:$f1: http://
                                            • 0x13e80:$f2: https://
                                            0.2.scan00430599935.exe.29a0000.3.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                              0.2.scan00430599935.exe.29a0000.3.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                                0.2.scan00430599935.exe.29a0000.3.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                                • 0x12fff:$des3: 68 03 66 00 00
                                                • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                                • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                                0.2.scan00430599935.exe.29a0000.3.unpackLoki_1Loki Payloadkevoreilly
                                                • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                                • 0x13ffc:$a2: last_compatible_version
                                                0.2.scan00430599935.exe.2280000.2.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableSteve Miller, Florian Roth
                                                • 0x13e78:$s1: http://
                                                • 0x17633:$s1: http://
                                                • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
                                                • 0x13e80:$s2: https://
                                                • 0x13e78:$f1: http://
                                                • 0x17633:$f1: http://
                                                • 0x13e80:$f2: https://
                                                0.2.scan00430599935.exe.2280000.2.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                                  0.2.scan00430599935.exe.2280000.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                                    0.2.scan00430599935.exe.2280000.2.raw.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                                    • 0x12fff:$des3: 68 03 66 00 00
                                                    • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                                    • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                                    0.2.scan00430599935.exe.2280000.2.raw.unpackLoki_1Loki Payloadkevoreilly
                                                    • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                                    • 0x13ffc:$a2: last_compatible_version
                                                    2.1.scan00430599935.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableSteve Miller, Florian Roth
                                                    • 0x13e78:$s1: http://
                                                    • 0x17633:$s1: http://
                                                    • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
                                                    • 0x13e80:$s2: https://
                                                    • 0x13e78:$f1: http://
                                                    • 0x17633:$f1: http://
                                                    • 0x13e80:$f2: https://
                                                    2.1.scan00430599935.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                                                      2.1.scan00430599935.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                                                        2.1.scan00430599935.exe.400000.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                                                        • 0x12fff:$des3: 68 03 66 00 00
                                                        • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                                                        • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                                                        2.1.scan00430599935.exe.400000.0.unpackLoki_1Loki Payloadkevoreilly
                                                        • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                                                        • 0x13ffc:$a2: last_compatible_version

                                                        Sigma Overview

                                                        No Sigma rule has matched

                                                        Joe Sandbox View / Context

                                                        IPs

                                                        No context

                                                        Domains

                                                        No context

                                                        ASN

                                                        No context

                                                        JA3 Fingerprints

                                                        No context

                                                        Dropped Files

                                                        No context

                                                        Screenshots

                                                        Thumbnails

                                                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.