File name: | 173fdfc00276566dcde5e80866aca985011c4ce6801b4339794c95fbcd2c77a9 |
Full analysis: | https://app.any.run/tasks/4b31c135-7003-4c71-828a-549c83be9f8c |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | December 06, 2018, 15:48:57 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-iso9660-image |
File info: | ISO 9660 CD-ROM filesystem data 'VD1818592 1' |
MD5: | 9302A7733DCAC1B00B64D51CD09089B3 |
SHA1: | 414DF4FBAD6EEEB0C34E127B503D9D715680FB64 |
SHA256: | 173FDFC00276566DCDE5E80866ACA985011C4CE6801B4339794C95FBCD2C77A9 |
SSDEEP: | 24576:M+TwG1YVK1vvr8bAsKzf5oiNVLi4XCnDhmvfc:MAwAYVmvD8bAsKzf5oiNVLi4XsDhj |
.iso | | | ISO 9660 CD image (27.6) |
---|---|---|
.atn | | | Photoshop Action (27.1) |
.gmc | | | Game Music Creator Music (6.1) |
VolumeSize: | 1046 kB |
---|
VolumeModifyDate: | 2018:12:05 21:19:24.00+01:00 |
---|---|
VolumeCreateDate: | 2018:12:05 21:19:24.00+01:00 |
Software: | PowerISO |
RootDirectoryCreateDate: | 2018:12:05 21:19:24+01:00 |
VolumeBlockSize: | 2048 |
VolumeBlockCount: | 523 |
VolumeName: | VD1818592 1 |
System: | Win32 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2872 | "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\173fdfc00276566dcde5e80866aca985011c4ce6801b4339794c95fbcd2c77a9.iso | C:\Windows\system32\rundll32.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2620 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\173fdfc00276566dcde5e80866aca985011c4ce6801b4339794c95fbcd2c77a9.iso" | C:\Program Files\WinRAR\WinRAR.exe | rundll32.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
2244 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2620.38219\VD1818592 1.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2620.38219\VD1818592 1.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Description: SITOSTEROL Exit code: 0 Version: 7.08.0006 | ||||
2804 | C:\Users\admin\AppData\Local\Temp\Rar$EXa2620.38219\VD1818592 1.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2620.38219\VD1818592 1.exe | VD1818592 1.exe | |
User: admin Integrity Level: MEDIUM Description: SITOSTEROL Version: 7.08.0006 |
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\isoburn.exe,-350 |
Value: Disc Image File | |||
(PID) Process: | — | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids |
Operation: | write | Name: | Windows.IsoFile |
Value: | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\System32\isoburn.exe,-352 |
Value: Windows Disc Image Burner | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\System32\isoburn.exe |
Value: Windows Disc Image Burner | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Program Files\WinRAR\WinRAR.exe |
Value: WinRAR archiver | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
Value: Adobe Acrobat Reader DC | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\eHome\ehshell.exe |
Value: Windows Media Center | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\system32\mspaint.exe |
Value: Paint | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\system32\NOTEPAD.EXE |
Value: Notepad |
PID | Process | Filename | Type | |
---|---|---|---|---|
2804 | VD1818592 1.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
2620 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa2620.38219\VD1818592 1.exe | executable | |
MD5:1B3D83671AEE35E87C48CE2235B1D766 | SHA256:84B3D7D51BC54AEE7E96D75753C5112FD4C6193AA27BED216957C03A980AB35F | |||
2804 | VD1818592 1.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
2804 | VD1818592 1.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:1B3D83671AEE35E87C48CE2235B1D766 | SHA256:84B3D7D51BC54AEE7E96D75753C5112FD4C6193AA27BED216957C03A980AB35F | |||
2244 | VD1818592 1.exe | C:\Users\admin\AppData\Local\Temp\~DF69902DED895963F9.TMP | binary | |
MD5:1BC7678F41C3718F3D41C977B2A5AF2E | SHA256:F5332C94FFCC76021FD21FD647C2088CB05C91E3FB559EDDA17F6292A52262BC | |||
2804 | VD1818592 1.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | dbf | |
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8 | SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2804 | VD1818592 1.exe | POST | — | 104.24.104.117:80 | http://www.rajas.cf/evans/fre.php | US | — | — | malicious |
2804 | VD1818592 1.exe | POST | — | 104.24.104.117:80 | http://www.rajas.cf/evans/fre.php | US | — | — | malicious |
2804 | VD1818592 1.exe | POST | — | 104.24.104.117:80 | http://www.rajas.cf/evans/fre.php | US | — | — | malicious |
2804 | VD1818592 1.exe | POST | — | 104.24.104.117:80 | http://www.rajas.cf/evans/fre.php | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2804 | VD1818592 1.exe | 104.24.104.117:80 | www.rajas.cf | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
www.rajas.cf |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .cf Domain |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2804 | VD1818592 1.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.cf Domain |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2804 | VD1818592 1.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2804 | VD1818592 1.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2804 | VD1818592 1.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.cf Domain |