File name:

Malware_ZIP_cc86ef29bb42e961ab64abf6b12cc4aa4bc2b9e5e65d0227f326267e3a70b94f

Full analysis: https://app.any.run/tasks/618e4b34-2e4f-4427-8d4c-8144d4c2967f
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: April 15, 2019, 10:17:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
lokibot
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

36A0D906B62576A0E5BED5C9D0C54D47

SHA1:

DCD4D6C215FAB4B3DCBC8EC55729F17705949CE7

SHA256:

CC86EF29BB42E961AB64ABF6B12CC4AA4BC2B9E5E65D0227F326267E3A70B94F

SSDEEP:

6144:Id35eZYp0uwGkTp7R7Mc/WY9yohBENZ3R+lvPvwAoHBnWmsXHEGpxmHJ/LUwHFp3:Id/0Ykl9gsN9yohBEvQ3YAeBninShLUi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • G_Link_Log_February_Statement_pdf.exe (PID: 2844)
      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
    • Detected artifacts of LokiBot

      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
    • Actions looks like stealing of personal data

      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
  • SUSPICIOUS

    • Application launched itself

      • G_Link_Log_February_Statement_pdf.exe (PID: 2844)
    • Loads DLL from Mozilla Firefox

      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
    • Executable content was dropped or overwritten

      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
    • Creates files in the user directory

      • G_Link_Log_February_Statement_pdf.exe (PID: 2960)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2019:03:22 00:10:01
ZipCRC: 0x469c295a
ZipCompressedSize: 324702
ZipUncompressedSize: 610816
ZipFileName: G_Link_Log_February_Statement_pdf.exe
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs g_link_log_february_statement_pdf.exe no specs #LOKIBOT g_link_log_february_statement_pdf.exe

Process information

PID
CMD
Path
Indicators
Parent process
596"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Malware_ZIP_cc86ef29bb42e961ab64abf6b12cc4aa4bc2b9e5e65d0227f326267e3a70b94f.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2844"C:\Users\admin\Desktop\G_Link_Log_February_Statement_pdf.exe" C:\Users\admin\Desktop\G_Link_Log_February_Statement_pdf.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\g_link_log_february_statement_pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2960"C:\Users\admin\Desktop\G_Link_Log_February_Statement_pdf.exe" C:\Users\admin\Desktop\G_Link_Log_February_Statement_pdf.exe
G_Link_Log_February_Statement_pdf.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\g_link_log_february_statement_pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
332
Read events
323
Write events
9
Delete events
0

Modification events

(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(596) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Malware_ZIP_cc86ef29bb42e961ab64abf6b12cc4aa4bc2b9e5e65d0227f326267e3a70b94f.zip
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(596) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2960) G_Link_Log_February_Statement_pdf.exeKey:HKEY_CURRENT_USER\http://allignmentz.xyz/stock/rok5/fre.php
Operation:writeName:F63AAA
Value:
%APPDATA%\F63AAA\A71D80.exe
Executable files
1
Suspicious files
0
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
596WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa596.47786\G_Link_Log_February_Statement_pdf.exe
MD5:
SHA256:
2960G_Link_Log_February_Statement_pdf.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck
MD5:
SHA256:
2960G_Link_Log_February_Statement_pdf.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.exeexecutable
MD5:
SHA256:
2960G_Link_Log_February_Statement_pdf.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8
SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
allignmentz.xyz
malicious

Threats

No threats detected
No debug info