File name: | 756c183c563b4a59922c963635e1566f |
Full analysis: | https://app.any.run/tasks/b1f64c85-2eed-492a-85d1-4e233b021c19 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | July 17, 2019, 08:15:43 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 756C183C563B4A59922C963635E1566F |
SHA1: | DC5A6598C4A4192FE8D82E79BF9579DD7D2D3A07 |
SHA256: | 4C36A374FD24BD9F3C8E5D4B786B040C209023C11A95CBE87D217625850B34FF |
SSDEEP: | 12288:D7M6PYzBg2/VLWK3jwkdUonWc3Emk/0L19cMgvMXZrB:DwKC/V13050fJ90vMXZV |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | 0x0006 |
ZipCompression: | Deflated |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCRC: | 0xc1917370 |
ZipCompressedSize: | 415 |
ZipUncompressedSize: | 1570 |
ZipFileName: | [Content_Types].xml |
Title: | - |
---|---|
Subject: | - |
Creator: | Windows User |
Description: | - |
Keywords: | - |
---|---|
LastModifiedBy: | Windows User |
RevisionNumber: | 1 |
CreateDate: | 2019:07:17 06:02:00Z |
ModifyDate: | 2019:07:17 06:02:00Z |
Template: | Normal.dotm |
TotalEditTime: | - |
Pages: | 1 |
Words: | 3 |
Characters: | 18 |
Application: | Microsoft Office Word |
DocSecurity: | None |
Lines: | 1 |
Paragraphs: | 1 |
ScaleCrop: | No |
Company: | - |
LinksUpToDate: | No |
CharactersWithSpaces: | 20 |
SharedDoc: | No |
HyperlinksChanged: | No |
AppVersion: | 14 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3524 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\756c183c563b4a59922c963635e1566f.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3532 | "C:\Users\admin\AppData\Local\Temp\hCM3ONXvJywdfYp.exe" | C:\Users\admin\AppData\Local\Temp\hCM3ONXvJywdfYp.exe | — | WINWORD.EXE |
User: admin Company: Saab Integrity Level: MEDIUM Description: Platformer Exit code: 0 Version: 1.0.0.0 | ||||
2196 | "C:\Users\admin\AppData\Local\Temp\hCM3ONXvJywdfYp.exe" | C:\Users\admin\AppData\Local\Temp\hCM3ONXvJywdfYp.exe | hCM3ONXvJywdfYp.exe | |
User: admin Company: Saab Integrity Level: MEDIUM Description: Platformer Version: 1.0.0.0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRD011.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2196 | hCM3ONXvJywdfYp.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
3524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$6c183c563b4a59922c963635e1566f.docx | pgc | |
MD5:7CC7C4D9967F464A313549835FFF2A51 | SHA256:440A2DEA571E58CB8C245E696FA932F6927DB02D69037C260D52387D521D54AF | |||
2196 | hCM3ONXvJywdfYp.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:F2CF706441C854AEA6BA1536C91644C1 | SHA256:836D320FAC02781C094DDBE918B9A44214DF10EC94FC4545871DD634010A8EF3 | |||
3524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\hCM3ONXvJywdfYp.exe | executable | |
MD5:F2CF706441C854AEA6BA1536C91644C1 | SHA256:836D320FAC02781C094DDBE918B9A44214DF10EC94FC4545871DD634010A8EF3 | |||
3524 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:B01C9F87FF2B41047925567000AFA00A | SHA256:E62AD27D9F17CFDC42EEF21A357A06884F5500FD7599DB58DB3FB075DBE2C013 | |||
3524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B7F2940A.emf | emf | |
MD5:CE16D635C448AC38EE2425804A7F32A0 | SHA256:916AE84A34BACDF65E2AEFDC6C2A0D086D634329670C08B5EFFCCD6C7426F766 | |||
2196 | hCM3ONXvJywdfYp.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
2196 | hCM3ONXvJywdfYp.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | dbf | |
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8 | SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2196 | hCM3ONXvJywdfYp.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/chisom/fre.php | JP | — | — | malicious |
2196 | hCM3ONXvJywdfYp.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/chisom/fre.php | JP | — | — | malicious |
2196 | hCM3ONXvJywdfYp.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/chisom/fre.php | JP | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2196 | hCM3ONXvJywdfYp.exe | 47.74.38.64:80 | masterworkhanger.com | Alibaba (China) Technology Co., Ltd. | JP | malicious |
Domain | IP | Reputation |
---|---|---|
masterworkhanger.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2196 | hCM3ONXvJywdfYp.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |