File name: | QUOTATION.doc |
Full analysis: | https://app.any.run/tasks/7c6b3c5a-6ec0-4674-9c15-fea805d5b897 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | July 18, 2019, 05:30:01 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 9B70FF3F80C0211EAE009BD8D6DBB66B |
SHA1: | 36C02EE6E116FD0AF0BE79832C81FACC5ED7DDC7 |
SHA256: | AB29EA420DA4EC54EE7BEE38A08807B98C3EC30C531A8B3C33E732875D3FBDFB |
SSDEEP: | 6144:LYsWuX3PbzoKt4gFBiCFyXr18UT4IOjyMjG0yjJbZsclHs+QTBPQ:LAg/QX6Q1Sy2G9hZtHs+QlQ |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
ZipRequiredVersion: | 20 |
---|---|
ZipBitFlag: | 0x0006 |
ZipCompression: | Deflated |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCRC: | 0xc1917370 |
ZipCompressedSize: | 415 |
ZipUncompressedSize: | 1570 |
ZipFileName: | [Content_Types].xml |
Title: | - |
---|---|
Subject: | - |
Creator: | Windows User |
Description: | - |
Keywords: | - |
---|---|
LastModifiedBy: | Windows User |
RevisionNumber: | 1 |
CreateDate: | 2019:07:17 05:55:00Z |
ModifyDate: | 2019:07:17 05:55:00Z |
Template: | Normal.dotm |
TotalEditTime: | - |
Pages: | 1 |
Words: | 3 |
Characters: | 18 |
Application: | Microsoft Office Word |
DocSecurity: | None |
Lines: | 1 |
Paragraphs: | 1 |
ScaleCrop: | No |
Company: | - |
LinksUpToDate: | No |
CharactersWithSpaces: | 20 |
SharedDoc: | No |
HyperlinksChanged: | No |
AppVersion: | 14 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3400 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\QUOTATION.doc.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3596 | "C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo.exe" | C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo.exe | — | WINWORD.EXE |
User: admin Company: Saab Integrity Level: MEDIUM Description: Platformer Exit code: 0 Version: 1.0.0.0 | ||||
3984 | "C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo.exe" | C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo.exe | lqS1xJZl6Gongjo.exe | |
User: admin Company: Saab Integrity Level: MEDIUM Description: Platformer Version: 1.0.0.0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3400 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRE968.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3984 | lqS1xJZl6Gongjo.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\QUOTATION.doc.docx.LNK | lnk | |
MD5:02A15F7BB5318F518EBF58DA07F5E954 | SHA256:9593CFCE625833149B36EA9EFBA7A7F3C0C3D5A867943C09BAFEF8D798F25C47 | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo.exe | executable | |
MD5:0F58F66A6EA81738F9A1F5D4787D9CC9 | SHA256:7ABC89528420DE348B0ED0FE74006024C73977DEC3ACB4DAA422DFDF9219CB89 | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1443F73.emf | emf | |
MD5:8936826B276DA09895811DAEE363E3D0 | SHA256:96EF94BFF1D67F7D96A42ED641C8F8AD12951338F3EF7D64F8202FBB42328B7F | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\lqS1xJZl6Gongjo (2).exe | executable | |
MD5:0F58F66A6EA81738F9A1F5D4787D9CC9 | SHA256:7ABC89528420DE348B0ED0FE74006024C73977DEC3ACB4DAA422DFDF9219CB89 | |||
3984 | lqS1xJZl6Gongjo.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
3984 | lqS1xJZl6Gongjo.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:0F58F66A6EA81738F9A1F5D4787D9CC9 | SHA256:7ABC89528420DE348B0ED0FE74006024C73977DEC3ACB4DAA422DFDF9219CB89 | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:22E9ABCD97C1721A6FBD9EC7B1FFDF05 | SHA256:EE671F5B5C1356F9314C39894DD05C985BC44C6D6DAAE177B75C4437B023C31F | |||
3400 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:735B7E578FA75CC2224BBFE353C5BA74 | SHA256:BB4583158D79B31E00FDDD50BB98F49C0DEA13EBFA2324F52AC21FD2A472A95A |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
3984 | lqS1xJZl6Gongjo.exe | POST | — | 47.74.38.64:80 | http://masterworkhanger.com/boichi/fre.php | JP | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3984 | lqS1xJZl6Gongjo.exe | 47.74.38.64:80 | masterworkhanger.com | Alibaba (China) Technology Co., Ltd. | JP | malicious |
Domain | IP | Reputation |
---|---|---|
masterworkhanger.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
3984 | lqS1xJZl6Gongjo.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |