File name: | Original-Invoice-BL.bin |
Full analysis: | https://app.any.run/tasks/6dd2c1f7-5537-4b5b-9e4b-0668ad010d21 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | August 12, 2022, 22:25:36 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | C3B7056575E0D316BF99B8752928F699 |
SHA1: | 4B52397209481FFF59B85CFF34E47D1E2CCBED87 |
SHA256: | BD5502B3B91005D62013D1821B3A0A3C6C4FCD8E493E57C5088968304DBC035C |
SSDEEP: | 24576:gGHCm8uPdJlsAU1wlEuAAiodUazVzy/1Gw:luWauEuAQUaz1ydGw |
.exe | | | Win64 Executable (generic) (76.4) |
---|---|---|
.exe | | | Win32 Executable (generic) (12.4) |
.exe | | | Generic Win/DOS Executable (5.5) |
.exe | | | DOS Executable Generic (5.5) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 5.1 |
ImageVersion: | - |
OSVersion: | 5.1 |
EntryPoint: | 0x1f110 |
UninitializedDataSize: | - |
InitializedDataSize: | 80896 |
CodeSize: | 201216 |
LinkerVersion: | 14.3 |
PEType: | PE32 |
TimeStamp: | 2022:01:24 08:31:18+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 24-Jan-2022 07:31:18 |
Detected languages: |
|
Debug artifacts: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000120 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 24-Jan-2022 07:31:18 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x000311EA | 0x00031200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.71153 |
.rdata | 0x00033000 | 0x0000AB02 | 0x0000AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.23189 |
.data | 0x0003E000 | 0x000246D8 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.34668 |
.didat | 0x00063000 | 0x0000018C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.36381 |
.rsrc | 0x00064000 | 0x0000580C | 0x00005A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.43875 |
.reloc | 0x0006A000 | 0x0000229C | 0x00002400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.56962 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.25329 | 1875 | Latin 1 / Western European | English - United States | RT_MANIFEST |
7 | 3.1586 | 482 | Latin 1 / Western European | English - United States | RT_STRING |
8 | 3.11685 | 460 | Latin 1 / Western European | English - United States | RT_STRING |
9 | 3.11236 | 440 | Latin 1 / Western European | English - United States | RT_STRING |
10 | 2.99727 | 326 | Latin 1 / Western European | English - United States | RT_STRING |
11 | 3.21979 | 1132 | Latin 1 / Western European | English - United States | RT_STRING |
12 | 3.12889 | 358 | Latin 1 / Western European | English - United States | RT_STRING |
13 | 3.01704 | 338 | Latin 1 / Western European | English - United States | RT_STRING |
14 | 2.94627 | 266 | Latin 1 / Western European | English - United States | RT_STRING |
15 | 2.83619 | 188 | Latin 1 / Western European | English - United States | RT_STRING |
KERNEL32.dll |
USER32.dll (delay-loaded) |
gdiplus.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3160 | "C:\Users\admin\AppData\Local\Temp\Original-Invoice-BL.bin.exe" | C:\Users\admin\AppData\Local\Temp\Original-Invoice-BL.bin.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3416 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\kphurevjgikjuj.bat" " | C:\Windows\system32\cmd.exe | — | Original-Invoice-BL.bin.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
3860 | server1.sfx.exe -pfiqmknsracznyvoGfkfbncgmgcjhsgfdynfjmfcgyqdkgimaabidpodnfaHjqgdbwghnjvzgnbfknhewhkenvsnhfvajmbffrgbjhm -dC:\Users\admin\AppData\Roaming | C:\Users\admin\AppData\Roaming\server1.sfx.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3920 | C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503} | C:\Windows\system32\DllHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: COM Surrogate Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1336 | "C:\Users\admin\AppData\Roaming\server1.exe" | C:\Users\admin\AppData\Roaming\server1.exe | — | server1.sfx.exe | |||||||||||
User: admin Company: Eightkg page Integrity Level: MEDIUM Description: Eightkge page Exit code: 0 Version: 8.4.7.9 Modules
| |||||||||||||||
972 | C:\Users\admin\AppData\Roaming\server1.exe | C:\Users\admin\AppData\Roaming\server1.exe | server1.exe | ||||||||||||
User: admin Company: Eightkg page Integrity Level: MEDIUM Description: Eightkge page Version: 8.4.7.9 Modules
LokiBot(PID) Process(972) server1.exe Decoys (4)kbfvzoboss.bid/alien/fre.php alphastand.trade/alien/fre.php alphastand.win/alien/fre.php alphastand.top/alien/fre.php C2http://dnuocc.com/hoijkfvdsjbjfd/Panel/five/fre.php |
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached |
Operation: | write | Name: | {FFE2A43C-56B9-4BF5-9A79-CC6D4285608A} {00000122-0000-0000-C000-000000000046} 0xFFFF |
Value: 01000000000000007A3270749AAED801 | |||
(PID) Process: | (3160) Original-Invoice-BL.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
Operation: | write | Name: | Name |
Value: Original-Invoice-BL.bin.exe | |||
(PID) Process: | (3920) DllHost.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
Operation: | write | Name: | Name |
Value: DllHost.exe | |||
(PID) Process: | (3860) server1.sfx.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3860) server1.sfx.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3860) server1.sfx.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3860 | server1.sfx.exe | C:\Users\admin\AppData\Roaming\server1.exe | executable | |
MD5:D265164A468BB99E50B457C1603F014E | SHA256:96D4E169DD80CF45E6E09B277F1E03885ADBA72280CBB5178DF74A1481AB6170 | |||
3160 | Original-Invoice-BL.bin.exe | C:\Users\admin\AppData\Roaming\kphurevjgikjuj.bat | text | |
MD5:514C2E61F8C2606F72E9D848000448AD | SHA256:1DFD94C188441CAE4CC56C31FDE2CDE59E196A372485A6E03C6F0FD1E0CD2EAC | |||
3160 | Original-Invoice-BL.bin.exe | C:\Users\admin\AppData\Roaming\server1.sfx.exe | executable | |
MD5:1EA5E91563E337449407E5D3F5BC6E67 | SHA256:7E774C6D150C74483D0F229D2908AB6FAA722FB98B9ACB5F1BA161B71970372D | |||
972 | server1.exe | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | abr | |
MD5:D898504A722BFF1524134C6AB6A5EAA5 | SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9 | |||
972 | server1.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
3160 | Original-Invoice-BL.bin.exe | C:\Users\admin\AppData\Roaming\sioga.PNG | image | |
MD5:E6A82413DB6873E7D5D4E89113E443AC | SHA256:B508C679EC9DA81EC23FF324BC3CAC5DE112956D273E4E4EDF7CD9152D719ACB | |||
972 | server1.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:F93EEDDC7806D631C5E35AD6C33EB8AB | SHA256:32BA3839E8045109C78A62AE312130ADE9C8DE6EBD98FDA5BF394327D7A6AB43 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
972 | server1.exe | POST | — | 109.206.241.133:80 | http://dnuocc.com/hoijkfvdsjbjfd/Panel/five/fre.php | unknown | — | — | malicious |
972 | server1.exe | POST | — | 109.206.241.133:80 | http://dnuocc.com/hoijkfvdsjbjfd/Panel/five/fre.php | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
972 | server1.exe | 109.206.241.133:80 | dnuocc.com | — | — | malicious |
Domain | IP | Reputation |
---|---|---|
dnuocc.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
972 | server1.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
972 | server1.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
972 | server1.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
972 | server1.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |