File name: | Administrator Notification_ Redirecting email with malware.msg |
Full analysis: | https://app.any.run/tasks/32787450-da14-49b4-87e2-80194a5a04f3 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | June 19, 2019, 14:30:33 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.ms-outlook |
File info: | CDFV2 Microsoft Outlook Message |
MD5: | 042375495384B2B3B2E4AB339DB06180 |
SHA1: | CBCC057513081D761D4DE733B8DFFC9C3D4F80A2 |
SHA256: | 7102CEA9993C632F3C9F09637F182498D8D4F28A0C089A9C59A56571FE3E832E |
SSDEEP: | 6144:SXWw3xuGGPlD6t3BXSxjtbMfNjTRpr3WOzL6Tjl:SXVxrGywoftTRpH0 |
.msg | | | Outlook Message (58.9) |
---|---|---|
.oft | | | Outlook Form Template (34.4) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3172 | "C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Administrator Notification_ Redirecting email with malware.msg" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 14.0.6025.1000 | ||||
4028 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\901L4A09\EATON INQUIRY UF57_81BD_doc.gz" | C:\Program Files\WinRAR\WinRAR.exe | OUTLOOK.EXE | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
3324 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | ||||
3852 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | ||||
2944 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe | — | EATON INQUIRY UF57_81BD_doc.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | ||||
3420 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe | — | EATON INQUIRY UF57_81BD_doc.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | ||||
2572 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe | EATON INQUIRY UF57_81BD_doc.exe | |
User: admin Integrity Level: MEDIUM Version: 1.00 | ||||
2616 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.23943\EATON INQUIRY UF57_81BD_doc.exe | — | EATON INQUIRY UF57_81BD_doc.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR46.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\~DFABD6E43E7B41E989.TMP | — | |
MD5:— | SHA256:— | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\901L4A09\EATON INQUIRY UF57_81BD_doc (2).gz\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\901L4A09\EATON INQUIRY UF57_81BD_doc (2).gz | compressed | |
MD5:598E4F12C9F2CA3ED72D593C0752A833 | SHA256:BF74F8C0063AED93F58550DC16DA80FC06D87797D315A4C3950261A232358938 | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:84247F084F8B881521B6A97CE312AF32 | SHA256:F463D1ADD1E1DF7328B9A931E1D90D4D08030148B7C6009A930D371C15663E36 | |||
2572 | EATON INQUIRY UF57_81BD_doc.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_337489D668E7FA4B83F094B7D0A32713.dat | xml | |
MD5:EEAA832C12F20DE6AAAA9C7B77626E72 | SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16 | |||
4028 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa4028.21650\EATON INQUIRY UF57_81BD_doc.exe | executable | |
MD5:74669B61074D2AC7D830F7163E27EB87 | SHA256:B3C350AAEAE1B1B066FD23002A3732130B3CFDF57D39A11F04112382A0594D7F | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\901L4A09\EATON INQUIRY UF57_81BD_doc.gz | compressed | |
MD5:598E4F12C9F2CA3ED72D593C0752A833 | SHA256:BF74F8C0063AED93F58550DC16DA80FC06D87797D315A4C3950261A232358938 | |||
3172 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\901L4A09\EATON GERMANY INQUIRY.msg | msg | |
MD5:9CF03A3D18F84677FB09F54FB831A7C5 | SHA256:934BBFA6711C3BE6B6A9F7CD7F6B20C6052F28FA4FB4FBF3EFA6FDCAEA1222A1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2572 | EATON INQUIRY UF57_81BD_doc.exe | POST | 404 | 212.1.211.48:80 | http://stcatherinescollegeug.com/re/five/fre.php | US | text | 15 b | malicious |
2572 | EATON INQUIRY UF57_81BD_doc.exe | POST | 404 | 212.1.211.48:80 | http://stcatherinescollegeug.com/re/five/fre.php | US | text | 15 b | malicious |
2572 | EATON INQUIRY UF57_81BD_doc.exe | POST | 404 | 212.1.211.48:80 | http://stcatherinescollegeug.com/re/five/fre.php | US | binary | 23 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3172 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
2572 | EATON INQUIRY UF57_81BD_doc.exe | 212.1.211.48:80 | stcatherinescollegeug.com | Hostinger International Limited | US | malicious |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
dns.msftncsi.com |
| shared |
stcatherinescollegeug.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2572 | EATON INQUIRY UF57_81BD_doc.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |