analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

TNT EXPRESS ONLINE DELIVERY REPORT.ace

Full analysis: https://app.any.run/tasks/662bb8f8-35c1-4f43-a9be-595d53e8644e
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: January 11, 2019, 09:36:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
lokibot
opendir
Indicators:
MIME: application/octet-stream
File info: ACE archive data version 20, from Win/32, version 20 to extract, contains AV-String (unregistered), solid
MD5:

F2273DB31E5746756714E4EB6B4F627D

SHA1:

3F26E33972C93803763B0A78E1EC213A32382D8C

SHA256:

59A246689D87385394E50BE6C3D75E4D923B196AC69AB0B1A053B11821E0ECBB

SSDEEP:

6144:zF4QV/sfGXifuCYGeYgl5R35xW6Th0QceOTNCaogSArPhPb22Evif1gKeX28hBY:zqQV/eyaeV59TBc7BC2rPhT22gyGXpA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TNT EXPRESS ONLINE DELIVERY REPORT.scr (PID: 2776)
      • filename.scr (PID: 3228)
      • filename.scr (PID: 4048)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3756)
    • Detected artifacts of LokiBot

      • filename.scr (PID: 3228)
    • Connects to CnC server

      • filename.scr (PID: 3228)
    • LOKIBOT was detected

      • filename.scr (PID: 3228)
    • Actions looks like stealing of personal data

      • filename.scr (PID: 3228)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • filename.scr (PID: 4048)
      • TNT EXPRESS ONLINE DELIVERY REPORT.scr (PID: 2776)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2868)
      • TNT EXPRESS ONLINE DELIVERY REPORT.scr (PID: 2776)
      • filename.scr (PID: 3228)
    • Executes scripts

      • TNT EXPRESS ONLINE DELIVERY REPORT.scr (PID: 2776)
    • Application launched itself

      • filename.scr (PID: 4048)
    • Starts itself from another location

      • TNT EXPRESS ONLINE DELIVERY REPORT.scr (PID: 2776)
    • Loads DLL from Mozilla Firefox

      • filename.scr (PID: 3228)
    • Creates files in the user directory

      • filename.scr (PID: 3228)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ace | ACE compressed archive (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe tnt express online delivery report.scr wscript.exe filename.scr no specs #LOKIBOT filename.scr

Process information

PID
CMD
Path
Indicators
Parent process
2868"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\TNT EXPRESS ONLINE DELIVERY REPORT.ace"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
2776"C:\Users\admin\Desktop\TNT EXPRESS ONLINE DELIVERY REPORT.scr" /SC:\Users\admin\Desktop\TNT EXPRESS ONLINE DELIVERY REPORT.scr
explorer.exe
User:
admin
Company:
Tongman5
Integrity Level:
MEDIUM
Description:
banoko5
Exit code:
0
Version:
4.09.0008
3756"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\subfolder\filename.vbs" C:\Windows\System32\WScript.exe
TNT EXPRESS ONLINE DELIVERY REPORT.scr
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
4048"C:\Users\admin\AppData\Local\Temp\subfolder\filename.scr" /SC:\Users\admin\AppData\Local\Temp\subfolder\filename.scrTNT EXPRESS ONLINE DELIVERY REPORT.scr
User:
admin
Company:
Tongman5
Integrity Level:
MEDIUM
Description:
banoko5
Exit code:
0
Version:
4.09.0008
3228C:\Users\admin\AppData\Local\Temp\subfolder\filename.scr" /SC:\Users\admin\AppData\Local\Temp\subfolder\filename.scr
filename.scr
User:
admin
Company:
Tongman5
Integrity Level:
MEDIUM
Description:
banoko5
Version:
4.09.0008
Total events
825
Read events
796
Write events
29
Delete events
0

Modification events

(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2868) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\TNT EXPRESS ONLINE DELIVERY REPORT.ace
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\ACE Compression Software\ActiveAce\2.0
Operation:writeName:Count
Value:
0
(PID) Process:(2868) WinRAR.exeKey:HKEY_CURRENT_USER\Software\ACE Compression Software\ActiveAce\2.0
Operation:writeName:Name
Value:
542D4B42647265644B76737A7E794B566767537663764B5B7874767B4B43727A674B43594337524F47455244443758595B5E59523753525B5E4152454E3745524758454339767472171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171700
Executable files
3
Suspicious files
2
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
3228filename.scrC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck
MD5:
SHA256:
2776TNT EXPRESS ONLINE DELIVERY REPORT.scrC:\Users\admin\AppData\Local\Temp\~DF333F971C1A80D4D7.TMPbinary
MD5:5C848507F92FB4311CD11517F931B6FB
SHA256:263776E05AABB01A45CFDD55778D78349718422C33B43C0995E064DAEF9414AB
3228filename.scrC:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdbtext
MD5:5302B1B5EC232D44E2D9507FB847FC49
SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684
4048filename.scrC:\Users\admin\AppData\Local\Temp\~DF413199FC3C8AC2A5.TMPbinary
MD5:5C848507F92FB4311CD11517F931B6FB
SHA256:263776E05AABB01A45CFDD55778D78349718422C33B43C0995E064DAEF9414AB
2776TNT EXPRESS ONLINE DELIVERY REPORT.scrC:\Users\admin\AppData\Local\Temp\subfolder\filename.vbstext
MD5:2B1021FBD908BA5087757860E78B2C68
SHA256:8AC74F1C33F1172E58EFF6A85A581A1122F4B3C65496E9BDBF6C9EA9A4C40E30
2868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2868.44939\TNT EXPRESS ONLINE DELIVERY REPORT.screxecutable
MD5:9934A08EFB70059EF459BEA672E84C75
SHA256:016CAD7694EE7861820A35F3CA42F4783B095EF6CDC5A79E5115C93123F01B9E
2776TNT EXPRESS ONLINE DELIVERY REPORT.scrC:\Users\admin\AppData\Local\Temp\subfolder\filename.screxecutable
MD5:9934A08EFB70059EF459BEA672E84C75
SHA256:016CAD7694EE7861820A35F3CA42F4783B095EF6CDC5A79E5115C93123F01B9E
3228filename.scrC:\Users\admin\AppData\Roaming\F63AAA\A71D80.exeexecutable
MD5:9934A08EFB70059EF459BEA672E84C75
SHA256:016CAD7694EE7861820A35F3CA42F4783B095EF6CDC5A79E5115C93123F01B9E
3228filename.scrC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8
SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3228
filename.scr
POST
103.63.2.245:80
http://ferterliop.us/hux3/fre.php
HK
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3228
filename.scr
103.63.2.245:80
ferterliop.us
Guochao Group limited
HK
suspicious

DNS requests

Domain
IP
Reputation
ferterliop.us
  • 103.63.2.245
malicious

Threats

PID
Process
Class
Message
3228
filename.scr
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 4
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot Checkin
3228
filename.scr
A Network Trojan was detected
MALWARE [PTsecurity] Loki Bot Check-in M2
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot Checkin
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
3228
filename.scr
A Network Trojan was detected
ET TROJAN LokiBot Checkin
1 ETPRO signatures available at the full report
No debug info