Resubmissions

08-09-2020 17:20

200908-pgj23a6kq6 10

08-09-2020 07:26

200908-nczeywwlb2 10

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    08-09-2020 07:26

General

  • Target

    win32.exe

  • Size

    264KB

  • MD5

    aee8a4f7de7a199cc9a7d5cfbc3e11d9

  • SHA1

    cd6c91aa00c6cf69573fb156198b6afb44a5a6e6

  • SHA256

    5d9004bb38a2e4c6ee1528f75e8453e778d9f39a3e7d9f02ee7821eae65cf886

  • SHA512

    7fefe7d493b1fc2a51db5d1e53fc0b59629f0aa982169a87378d0880d10dc051f337a0d3fb2cefb73a6a546d8910c189aa5cdd9539489db22c34e68f7b0c972e

Malware Config

Extracted

Family

lokibot

C2

http://joovy.ga/webxpo/gate.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

formbook

C2

http://www.artiyonq.com/pw9/

Decoy

applephone.red

bureauxfashion.com

05044444.com

newmarketingideas.net

7754y.com

976life.com

rilio.realty

amandakohar.com

003manbetx.com

tomtomxl.com

pulse-group.com

qdhtdzj.com

desitebuilder.com

ivymaephotography.info

sgpoloclub.com

aaeventsshop.com

mobilesant.com

lewismobilewelding.com

firefromthearchives.com

printathomeparties.com

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Formbook Payload 7 IoCs
  • ServiceHost packer 1 IoCs

    Detects ServiceHost packer used for .NET malware

  • Blacklisted process makes network request 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file execution options in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • NSIS installer 12 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 270 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\win32.exe
      "C:\Users\Admin\AppData\Local\Temp\win32.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe KakaGemot,Hurley
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3424
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:3896
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Blacklisted process makes network request
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:3884
            • C:\Users\Admin\AppData\Roaming\8zmBAMf.exe
              "C:\Users\Admin\AppData\Roaming\8zmBAMf.exe"
              5⤵
              • Executes dropped EXE
              PID:1676
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe KakaGemot,Hurley
                6⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2616
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe"
                  7⤵
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Checks processor information in registry
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2316
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    8⤵
                    • Modifies firewall policy service
                    • Checks BIOS information in registry
                    • Adds Run key to start application
                    • Drops desktop.ini file(s)
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2660
            • C:\Users\Admin\AppData\Roaming\SXqidAz.exe
              "C:\Users\Admin\AppData\Roaming\SXqidAz.exe"
              5⤵
              • Executes dropped EXE
              PID:3372
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe KakaGemot,Hurley
                6⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:3004
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:192
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\SysWOW64\cscript.exe"
        2⤵
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2236
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:3760
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:2588

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      5
      T1112

      Install Root Certificate

      1
      T1130

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      4
      T1012

      System Information Discovery

      5
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Emphysema
      • C:\Users\Admin\AppData\Local\Temp\Emphysema
      • C:\Users\Admin\AppData\Local\Temp\Emphysema
      • C:\Users\Admin\AppData\Local\Temp\KakaGemot.DLL
      • C:\Users\Admin\AppData\Local\Temp\KakaGemot.DLL
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\70.opends60.dll
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\70.opends60.dll
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\MicrosoftVisualJUpgradeEngineInterface.dll
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\MicrosoftVisualJUpgradeEngineInterface.dll
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\u2lexch.dll
      • C:\Users\Admin\AppData\Local\Temp\idea\openx\zope\u2lexch.dll
      • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
      • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
      • C:\Users\Admin\AppData\Roaming\8zmBAMf.exe
      • C:\Users\Admin\AppData\Roaming\8zmBAMf.exe
      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1400429095-533421673-2598934218-1000\0f5007522459c86e95ffcc62f32308f1_18823ca4-5761-4226-8787-cf36135f1c68
      • C:\Users\Admin\AppData\Roaming\SXqidAz.exe
      • C:\Users\Admin\AppData\Roaming\SXqidAz.exe
      • \Users\Admin\AppData\Local\Temp\KakaGemot.dll
      • \Users\Admin\AppData\Local\Temp\KakaGemot.dll
      • \Users\Admin\AppData\Local\Temp\KakaGemot.dll
      • memory/192-32-0x0000000000000000-mapping.dmp
      • memory/1676-7-0x0000000000000000-mapping.dmp
      • memory/2236-42-0x0000000006980000-0x0000000006AF3000-memory.dmp
        Filesize

        1.4MB

      • memory/2236-38-0x0000000000000000-mapping.dmp
      • memory/2236-44-0x0000000006980000-0x0000000006AF3000-memory.dmp
        Filesize

        1.4MB

      • memory/2236-46-0x0000000006D40000-0x0000000006E05000-memory.dmp
        Filesize

        788KB

      • memory/2236-40-0x0000000001120000-0x0000000001147000-memory.dmp
        Filesize

        156KB

      • memory/2236-39-0x0000000001120000-0x0000000001147000-memory.dmp
        Filesize

        156KB

      • memory/2316-30-0x0000000000000000-mapping.dmp
      • memory/2316-31-0x0000000000400000-0x0000000000435000-memory.dmp
        Filesize

        212KB

      • memory/2316-33-0x0000000004ED0000-0x0000000004F72000-memory.dmp
        Filesize

        648KB

      • memory/2316-34-0x0000000005320000-0x0000000005760000-memory.dmp
        Filesize

        4.2MB

      • memory/2616-22-0x00000000055A0000-0x00000000055D5000-memory.dmp
        Filesize

        212KB

      • memory/2616-18-0x0000000000000000-mapping.dmp
      • memory/2660-41-0x00000000064A0000-0x0000000006542000-memory.dmp
        Filesize

        648KB

      • memory/2660-45-0x0000000000000000-mapping.dmp
      • memory/2660-37-0x0000000000E20000-0x0000000001260000-memory.dmp
        Filesize

        4.2MB

      • memory/2660-35-0x0000000000000000-mapping.dmp
      • memory/2660-36-0x0000000000E20000-0x0000000001260000-memory.dmp
        Filesize

        4.2MB

      • memory/3004-29-0x0000000004C00000-0x0000000004C2D000-memory.dmp
        Filesize

        180KB

      • memory/3004-26-0x0000000000000000-mapping.dmp
      • memory/3372-11-0x0000000000000000-mapping.dmp
      • memory/3424-4-0x0000000005150000-0x00000000051F2000-memory.dmp
        Filesize

        648KB

      • memory/3424-0-0x0000000000000000-mapping.dmp
      • memory/3760-47-0x0000000000000000-mapping.dmp
      • memory/3760-48-0x00007FF647530000-0x00007FF6475C3000-memory.dmp
        Filesize

        588KB

      • memory/3760-49-0x00007FF647530000-0x00007FF6475C3000-memory.dmp
        Filesize

        588KB

      • memory/3760-50-0x00007FF647530000-0x00007FF6475C3000-memory.dmp
        Filesize

        588KB

      • memory/3884-5-0x0000000000000000-mapping.dmp
      • memory/3884-6-0x0000000000400000-0x00000000004A2000-memory.dmp
        Filesize

        648KB