File name:

Paymen-Advice -SWIFT Transfer (103).exe

Full analysis: https://app.any.run/tasks/e0c20cbb-5182-49e1-9882-b3824e8f5dcf
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: April 29, 2025, 19:35:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
lokibot
trojan
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

E967A848B5472C0E7BB53A49291AF369

SHA1:

6ACC916141A3CDFD096C30F0783A73BD255C416E

SHA256:

C30498E83C532CAC619D01F2F75512EE0A10684A667AEF8AC665AAF990CEA3D9

SSDEEP:

24576:6iz2tj5HolAlDtcPOaLmDLZpZzbudZ5m6z+wihUrhRQDehzQtyi:6iz2tj5HolAlDtNaLmDLZpZzbudZ5m66

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
    • LOKIBOT mutex has been found

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Actions looks like stealing of personal data

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • LOKIBOT has been detected (SURICATA)

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Connects to the CnC server

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • LOKIBOT has been detected (YARA)

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Steals credentials from Web Browsers

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Scans artifacts that could help determine the target

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Lokibot is detected

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Reads security settings of Internet Explorer

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Application launched itself

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
    • Connects to the server without a host name

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Contacting a server suspected of hosting an CnC

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
  • INFO

    • Checks supported languages

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Creates files or folders in the user directory

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Reads the computer name

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Reads the machine GUID from the registry

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
    • Create files in a temporary directory

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
    • Process checks computer location settings

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 4212)
    • Reads the software policy settings

      • slui.exe (PID: 2136)
    • Reads Microsoft Office registry keys

      • Paymen-Advice -SWIFT Transfer (103).exe (PID: 6872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

LokiBot

(PID) Process(6872) Paymen-Advice -SWIFT Transfer (103).exe
C294.156.177.41/ugopounds/five/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2065:03:15 19:53:14+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 687616
InitializedDataSize: 7168
UninitializedDataSize: -
EntryPoint: 0xa9c8a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.8.0.0
ProductVersionNumber: 1.8.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Advanced scientific calculator with equation solving, graphing capabilities, and multiple calculation modes
CompanyName: Phantom Dimension Software
FileDescription: QuantumCalc Pro
FileVersion: 1.8.0.0
InternalName: hFkm.exe
LegalCopyright:
LegalTrademarks: QuantumCalc™
OriginalFileName: hFkm.exe
ProductName: QuantumCalc Pro
ProductVersion: 1.8.0.0
AssemblyVersion: 1.7.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start paymen-advice -swift transfer (103).exe sppextcomobj.exe no specs slui.exe schtasks.exe no specs conhost.exe no specs #LOKIBOT paymen-advice -swift transfer (103).exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1628"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fgCsyzW" /XML "C:\Users\admin\AppData\Local\Temp\tmpF3F7.tmp"C:\Windows\SysWOW64\schtasks.exePaymen-Advice -SWIFT Transfer (103).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1676\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2136"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4212"C:\Users\admin\AppData\Local\Temp\Paymen-Advice -SWIFT Transfer (103).exe" C:\Users\admin\AppData\Local\Temp\Paymen-Advice -SWIFT Transfer (103).exe
explorer.exe
User:
admin
Company:
Phantom Dimension Software
Integrity Level:
MEDIUM
Description:
QuantumCalc Pro
Exit code:
0
Version:
1.8.0.0
Modules
Images
c:\users\admin\appdata\local\temp\paymen-advice -swift transfer (103).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5072C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6724C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6872"C:\Users\admin\AppData\Local\Temp\Paymen-Advice -SWIFT Transfer (103).exe"C:\Users\admin\AppData\Local\Temp\Paymen-Advice -SWIFT Transfer (103).exe
Paymen-Advice -SWIFT Transfer (103).exe
User:
admin
Company:
Phantom Dimension Software
Integrity Level:
MEDIUM
Description:
QuantumCalc Pro
Version:
1.8.0.0
Modules
Images
c:\users\admin\appdata\local\temp\paymen-advice -swift transfer (103).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
LokiBot
(PID) Process(6872) Paymen-Advice -SWIFT Transfer (103).exe
C294.156.177.41/ugopounds/five/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
Total events
1 877
Read events
1 873
Write events
4
Delete events
0

Modification events

(PID) Process:(6872) Paymen-Advice -SWIFT Transfer (103).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6872) Paymen-Advice -SWIFT Transfer (103).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6872) Paymen-Advice -SWIFT Transfer (103).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6872) Paymen-Advice -SWIFT Transfer (103).exeKey:HKEY_CURRENT_USER\�������������Њ��������Й���Й��я��
Operation:writeName:F3F363
Value:
%APPDATA%\F3F363\3C28B3.exe
Executable files
2
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6872Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\0f5007522459c86e95ffcc62f32308f1_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
6872Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.hdbbinary
MD5:1013079A9BF8FFA458C230EA6AAF8A89
SHA256:1B1F3BCE8DF0FC7E33B518DAB09D09AF3680E39BCC3C760DADCC50C931007BE8
6872Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
6872Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.exeexecutable
MD5:E967A848B5472C0E7BB53A49291AF369
SHA256:C30498E83C532CAC619D01F2F75512EE0A10684A667AEF8AC665AAF990CEA3D9
4212Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Local\Temp\tmpF3F7.tmpxml
MD5:8320D509C7C1C8B5DC8EB7EB6BAE7801
SHA256:81E6D17C275B30524A697C06DB9EB0EA707E1EF1AF4AD176142F45168F9D0E80
4212Paymen-Advice -SWIFT Transfer (103).exeC:\Users\admin\AppData\Roaming\fgCsyzW.exeexecutable
MD5:E967A848B5472C0E7BB53A49291AF369
SHA256:C30498E83C532CAC619D01F2F75512EE0A10684A667AEF8AC665AAF990CEA3D9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
23
DNS requests
15
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6872
Paymen-Advice -SWIFT Transfer (103).exe
POST
404
94.156.177.41:80
http://94.156.177.41/ugopounds/five/fre.php
unknown
malicious
6872
Paymen-Advice -SWIFT Transfer (103).exe
POST
404
94.156.177.41:80
http://94.156.177.41/ugopounds/five/fre.php
unknown
malicious
516
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6872
Paymen-Advice -SWIFT Transfer (103).exe
POST
404
94.156.177.41:80
http://94.156.177.41/ugopounds/five/fre.php
unknown
malicious
6872
Paymen-Advice -SWIFT Transfer (103).exe
POST
404
94.156.177.41:80
http://94.156.177.41/ugopounds/five/fre.php
unknown
malicious
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6872
Paymen-Advice -SWIFT Transfer (103).exe
94.156.177.41:80
Vivacom
BG
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.130
  • 20.190.159.128
  • 20.190.159.0
  • 40.126.31.71
  • 40.126.31.2
  • 20.190.159.130
  • 40.126.31.3
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

PID
Process
Class
Message
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 14
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M2
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M1
No debug info