File name: | NDA.iso |
Full analysis: | https://app.any.run/tasks/14f67727-c240-4a75-b7ce-d6bb5b425842 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | December 06, 2018, 16:58:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-iso9660-image |
File info: | ISO 9660 CD-ROM filesystem data 'NDA' |
MD5: | DB16F0248C7DA524994A16BCB57667AA |
SHA1: | 37109E59DAE5340B6F010AD55541EF578FD762B9 |
SHA256: | 69C4AEA49087EAFDD102ED55C690C09BD00E3A9A4920EFDEB4190CB83023C3E3 |
SSDEEP: | 6144:hmIdPhRy1L8OYsJcCtqVlsuxn8F8ngxBzOmrKAtWphW1plf7QvAvUU19XqUO3oWE:XdPPyiFv5Pg8QbC1c2bil6GSr |
.iso | | | ISO 9660 CD image (27.6) |
---|---|---|
.atn | | | Photoshop Action (27.1) |
.gmc | | | Game Music Creator Music (6.1) |
VolumeSize: | 1066 kB |
---|
VolumeModifyDate: | 2018:12:06 14:59:50.00+03:00 |
---|---|
VolumeCreateDate: | 2018:12:06 14:59:50.00+03:00 |
Software: | PowerISO |
RootDirectoryCreateDate: | 2018:12:06 14:59:50+03:00 |
VolumeBlockSize: | 2048 |
VolumeBlockCount: | 533 |
VolumeName: | NDA |
System: | Win32 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2868 | "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\NDA.iso | C:\Windows\system32\rundll32.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3816 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\NDA.iso" | C:\Program Files\WinRAR\WinRAR.exe | rundll32.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3192 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3816.6544\NDA.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3816.6544\NDA.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Description: Harshnesses Exit code: 0 Version: 8.01.0004 | ||||
2240 | "C:\Users\admin\Desktop\NDA.exe" | C:\Users\admin\Desktop\NDA.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Description: Harshnesses Exit code: 0 Version: 8.01.0004 | ||||
3744 | "C:\Users\admin\Desktop\NDA.exe" | C:\Users\admin\Desktop\NDA.exe | explorer.exe | |
User: admin Integrity Level: HIGH Description: Harshnesses Exit code: 0 Version: 8.01.0004 | ||||
3292 | C:\Users\admin\AppData\Local\Temp\Rar$EXa3816.6544\NDA.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3816.6544\NDA.exe | NDA.exe | |
User: admin Integrity Level: MEDIUM Description: Harshnesses Version: 8.01.0004 | ||||
2056 | C:\Users\admin\Desktop\NDA.exe" | C:\Users\admin\Desktop\NDA.exe | — | NDA.exe |
User: admin Integrity Level: HIGH Description: Harshnesses Version: 8.01.0004 | ||||
408 | C:\Users\admin\Desktop\NDA.exe" | C:\Users\admin\Desktop\NDA.exe | — | NDA.exe |
User: admin Integrity Level: MEDIUM Description: Harshnesses Version: 8.01.0004 |
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | @C:\Windows\System32\isoburn.exe,-350 |
Value: Disc Image File | |||
(PID) Process: | — | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids |
Operation: | write | Name: | Windows.IsoFile |
Value: | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\System32\isoburn.exe,-352 |
Value: Windows Disc Image Burner | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\System32\isoburn.exe |
Value: Windows Disc Image Burner | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Program Files\WinRAR\WinRAR.exe |
Value: WinRAR archiver | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
Value: Adobe Acrobat Reader DC | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\eHome\ehshell.exe |
Value: Windows Media Center | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\system32\mspaint.exe |
Value: Paint | |||
(PID) Process: | — | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Operation: | write | Name: | C:\Windows\system32\NOTEPAD.EXE |
Value: Notepad |
PID | Process | Filename | Type | |
---|---|---|---|---|
3816 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3816.7099\NDA.exe | — | |
MD5:— | SHA256:— | |||
3292 | NDA.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
3192 | NDA.exe | C:\Users\admin\AppData\Local\Temp\~DF4B8DA12A6052D91A.TMP | binary | |
MD5:A355EB8B793BF636F649337D562709FF | SHA256:19EC3BBCC0C167C003D3BD9D284F7F69477E55FA93920D85B083D92F8C067AE7 | |||
3744 | NDA.exe | C:\Users\admin\AppData\Local\Temp\~DF808D4FF171752BF7.TMP | binary | |
MD5:A355EB8B793BF636F649337D562709FF | SHA256:19EC3BBCC0C167C003D3BD9D284F7F69477E55FA93920D85B083D92F8C067AE7 | |||
3292 | NDA.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
3292 | NDA.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:D78CB5B49204F26253FDB41C6BC96E59 | SHA256:765786EA58B66CC786C1611B47644D86CD4A7FB0B45C8A3BDE2A317DD48D1F92 | |||
3816 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa3816.6544\NDA.exe | executable | |
MD5:D78CB5B49204F26253FDB41C6BC96E59 | SHA256:765786EA58B66CC786C1611B47644D86CD4A7FB0B45C8A3BDE2A317DD48D1F92 | |||
2240 | NDA.exe | C:\Users\admin\AppData\Local\Temp\~DF716B5F71D79917CE.TMP | binary | |
MD5:A355EB8B793BF636F649337D562709FF | SHA256:19EC3BBCC0C167C003D3BD9D284F7F69477E55FA93920D85B083D92F8C067AE7 | |||
3292 | NDA.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | dbf | |
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8 | SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3292 | NDA.exe | POST | 404 | 104.27.186.214:80 | http://neduneche.tk/nedu/fre.php | US | xml | 345 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3292 | NDA.exe | 104.27.186.214:80 | neduneche.tk | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
neduneche.tk |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
3292 | NDA.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
3292 | NDA.exe | Potentially Bad Traffic | ET POLICY HTTP Request to a *.tk domain |
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
3292 | NDA.exe | Potentially Bad Traffic | ET POLICY HTTP Request to a *.tk domain |
3292 | NDA.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
3292 | NDA.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |