Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-03-2021 09:45
Static task
static1
Behavioral task
behavioral1
Sample
lokibot.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
lokibot.doc
Resource
win10v20201028
General
-
Target
lokibot.doc
-
Size
3.6MB
-
MD5
344bd19acdaf2557abdb66a2c88a3680
-
SHA1
0aa0a31b77e26a71e1e35081bbc6cfbe245f4241
-
SHA256
2ec1e4844941e4fb73e64732da4d6eede18abf02ec70ae9a2e97d3e2b9ca51fc
-
SHA512
d9d4e7870113576a54ab30543989a3b7856ba35b8f377f7f1d098eb7e37b2dac2910c20bab0d42d296ff79235976030bab62003cff4b26b62a3df5dda9f222a6
Malware Config
Extracted
remcos
eventsbypearce.host:2580
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
tracert.exetracert.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 844 1968 tracert.exe WINWORD.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1244 1968 tracert.exe WINWORD.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 15 600 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
openvpn-gui.exepid process 992 openvpn-gui.exe -
Loads dropped DLL 5 IoCs
Processes:
WINWORD.EXEtracert.exetracert.exeopenvpn-gui.exepid process 1968 WINWORD.EXE 844 tracert.exe 1244 tracert.exe 1244 tracert.exe 992 openvpn-gui.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2000 1968 DW20.EXE WINWORD.EXE -
Drops file in Windows directory 2 IoCs
Processes:
WINWORD.EXEtracert.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File created C:\Windows\Tasks\openvpn-gui.job tracert.exe -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\0\win32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\ = "Microsoft Forms 2.0 Object Library" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\HELPDIR WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{880540EE-3A39-4656-A04D-AA4BC41ACA1F}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Word8.0\\MSForms.exd" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1968 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
WINWORD.EXEopenvpn-gui.exenotepad.exepid process 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 992 openvpn-gui.exe 1968 WINWORD.EXE 1220 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
notepad.exepid process 1220 notepad.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1968 WINWORD.EXE 1968 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXEopenvpn-gui.exepid process 1968 WINWORD.EXE 1968 WINWORD.EXE 992 openvpn-gui.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1968 wrote to memory of 1936 1968 WINWORD.EXE splwow64.exe PID 1968 wrote to memory of 1936 1968 WINWORD.EXE splwow64.exe PID 1968 wrote to memory of 1936 1968 WINWORD.EXE splwow64.exe PID 1968 wrote to memory of 1936 1968 WINWORD.EXE splwow64.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 844 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe PID 1968 wrote to memory of 1244 1968 WINWORD.EXE tracert.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\lokibot.doc"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1936
-
C:\Windows\SysWOW64\tracert.exe"C:\Windows\system32\tracert.exe"2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Drops file in Windows directory
PID:844 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "move /y "C:\Users\Admin\AppData\Local\Temp\openvpn-gui.lnk" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\openvpn-gui.lnk""3⤵PID:1932
-
C:\Windows\SysWOW64\tracert.exe"C:\Windows\system32\tracert.exe"2⤵
- Process spawned unexpected child process
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "move /y "C:\Users\Admin\AppData\Local\Temp\openvpn-gui.lnk" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\openvpn-gui.lnk""3⤵PID:916
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exe"C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"5⤵
- Blocklisted process makes network request
PID:600 -
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 10042⤵
- Process spawned suspicious child process
PID:2000 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 10043⤵PID:1624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
50d07e64e3238da3764e519781a4c457
SHA1df7812d8516572253185a1a09440450a7719ec1d
SHA2562d6e623cbde0b5632db298f854119721d4974159da4125481674bfb41c61688e
SHA5127628988e2822282b47c3796238bd87aac5b73e596fa4b5bfa57746890bc2cddc0e0fb445ddc27b1431c029bcd5d1787f64adb7f777583e7d097a8095832ceb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
aee5d448ddfd5a72816390b609796ec9
SHA1ab21c2a3d06f343124690023543e1ba585fa33cb
SHA25625c252467b5d5bc55fa9eb66aedf64fa4a7cda325279c7571dec8c7211dfd98a
SHA51221c35fd22ea363c94b54e47b53ac3c145c90f08d52a0d9e223ef7e79e9be34eaf72ff40f3703838f1620c450e405c6aec45a9fdd3c3a26b0eb237a3d41d7c08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
063a0282f4d4da502009e2cf4f630d9b
SHA1a7875cfc520ad287a0fbae04db3860cee2287413
SHA2560ff37f4cb9092caf6d6e16bb37815775bba6a9fa93da12de93a1447c35b5f31d
SHA512674793f9d6bc61013271a58991c061788fe188917f36b1787a4c8233270516b7506c36fefdd078cdc4f92fd95d223daeb6e9a996dbe7eb5dda1750775c9c3d8d
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\libcrypto-1_1.dllMD5
a9e401b488e5de728d14c0464133e2fb
SHA15a9054227c61268f189326d814cc20d778e3919c
SHA25665313e789b1f60b577a68f41b2e1c826e0605f46f44d7b85af4c04db0ef93473
SHA512ce59abc0ab3dbe5eb09163f0fcdc59ad3a457608728827324ef60f4072faeb6cb6ed94033c09bbff63a5922e7c41b62d59c375b4b6e76da36c9bc4769d42a912
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\libcrypto-1_1.dllMD5
a9e401b488e5de728d14c0464133e2fb
SHA15a9054227c61268f189326d814cc20d778e3919c
SHA25665313e789b1f60b577a68f41b2e1c826e0605f46f44d7b85af4c04db0ef93473
SHA512ce59abc0ab3dbe5eb09163f0fcdc59ad3a457608728827324ef60f4072faeb6cb6ed94033c09bbff63a5922e7c41b62d59c375b4b6e76da36c9bc4769d42a912
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\cGSzhgKv[1].jpgMD5
d499c1124624c77afad022186b0941a6
SHA1e76235a865a66bda873e2e3558ba585850d72309
SHA25639bed068dcf604d167046c28e7ff1b0fef49a0096f7450cc8f30794796b74eac
SHA512a0c2e649457fc0355a9fe85b8bb8449badad61f632b7b1931f371fb0c7b4113687fb04fae582bb35e225f6d10a5292db964386db0daad045860cf93e486ff8e8
-
C:\Users\Admin\AppData\Local\Temp\259286297.cvrMD5
4f17e6897890eb7e3eac7d8e45d35032
SHA18f93a12d89d0960b71f70ce1750b16d49c843a3c
SHA25674b5b18ae99c07608551e92f4454670c66aa64a8e87ea8753e6e3abfe52d3513
SHA5125ea2e44c72f1e5a1db3979ad95df13dac091e20d8d76b5df58dfc94541ee54e5d1d4433137198be1704592194e9164a16b96c8ec1fb6ac8e492483d41b906a26
-
C:\Users\Admin\AppData\Local\Temp\openvpn-gui.lnkMD5
e5bcd45dc969572cbb9547a196bc6e30
SHA1e12a376600f83bc6ab554795a205e3e0730765f3
SHA256baabf515e7c271187d59b9d1fa1972b39bc976fc41d2e29f71bc15985e2a5acb
SHA512f01cf1015d310b348eef15a9868ee91d7324b4485da954153e1a457b5b5e889ac10e6e9a2092899c1ae67a1e3c9c635e4848ec9987af0ed79df2140e576972d6
-
C:\Users\Admin\AppData\Local\Temp\openvpn-gui.lnkMD5
cbf59dd773916cbdea18d301bcbbc177
SHA14765d5f8fdf067323ba396253054f53bad73f99e
SHA25648efbfd74df64a95b0b72b166712e2155187c8c16a04c5366f4592eaa403a152
SHA5125cf99dcad849351a41db8808774b305e3a0203edd855a493402a129f39bbdd125a93b0e398744c3ce969299d7775d9a9e52a03542ff2fe6e70a37b65c1112ced
-
C:\Windows\Tasks\openvpn-gui.jobMD5
508ef2391897cf3b365121dae42548e7
SHA1a6068f7ffa955038f5db20167fc7338c63419bfc
SHA25675b98d55edacda30950e0d72e510a5641f043aeaf9d7751528c1524dfc9ac271
SHA512766c0fbf0533c0cf2cff4247ee0706bb64a80ce17a7b55b2f061acad5c0251088e006f10dbac0a057eaf7b6484e776d2e0e027311badd57696a4aac2510f841d
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\libcrypto-1_1.dllMD5
a9e401b488e5de728d14c0464133e2fb
SHA15a9054227c61268f189326d814cc20d778e3919c
SHA25665313e789b1f60b577a68f41b2e1c826e0605f46f44d7b85af4c04db0ef93473
SHA512ce59abc0ab3dbe5eb09163f0fcdc59ad3a457608728827324ef60f4072faeb6cb6ed94033c09bbff63a5922e7c41b62d59c375b4b6e76da36c9bc4769d42a912
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\openvpn-gui.exeMD5
7215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945
-
\Users\Admin\AppData\Local\Temp\Machiavelli.dllMD5
c23b325e91b29cacf36e66485f1d3607
SHA1149c6794ef791ac91529cdb065f93bba51c125d6
SHA25623bbff49b731f952677bc4c4be00d2b6051a7e9544ccec10321f88d72546fb62
SHA5124cde97b8ac755570d2ea6e8e4bd6559ce58988b28d852d1624f01aeb5c16c6f9d4f35f7ab293f562a162b65b2314e07556a348cc7be9e5f93c4c923998b6c422
-
memory/600-51-0x0000000000000000-mapping.dmp
-
memory/600-53-0x0000000000090000-0x0000000000098000-memory.dmpFilesize
32KB
-
memory/600-55-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/624-16-0x000007FEF5E90000-0x000007FEF610A000-memory.dmpFilesize
2.5MB
-
memory/844-13-0x0000000075ED1000-0x0000000075ED3000-memory.dmpFilesize
8KB
-
memory/844-9-0x0000000000000000-mapping.dmp
-
memory/844-11-0x0000000000090000-0x0000000000093000-memory.dmpFilesize
12KB
-
memory/916-37-0x0000000000000000-mapping.dmp
-
memory/992-47-0x00000000000B0000-0x00000000000BB000-memory.dmpFilesize
44KB
-
memory/992-40-0x0000000000000000-mapping.dmp
-
memory/1220-48-0x0000000000090000-0x0000000000092000-memory.dmpFilesize
8KB
-
memory/1220-50-0x0000000000120000-0x0000000000128000-memory.dmpFilesize
32KB
-
memory/1220-45-0x0000000000000000-mapping.dmp
-
memory/1244-12-0x0000000000000000-mapping.dmp
-
memory/1624-25-0x00000000022F0000-0x0000000002301000-memory.dmpFilesize
68KB
-
memory/1624-19-0x0000000000000000-mapping.dmp
-
memory/1624-22-0x0000000001ED0000-0x0000000001EE1000-memory.dmpFilesize
68KB
-
memory/1624-27-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/1932-23-0x0000000000000000-mapping.dmp
-
memory/1936-5-0x0000000000000000-mapping.dmp
-
memory/1936-6-0x000007FEFB831000-0x000007FEFB833000-memory.dmpFilesize
8KB
-
memory/1968-49-0x0000000000740000-0x0000000000741000-memory.dmpFilesize
4KB
-
memory/1968-2-0x0000000072331000-0x0000000072334000-memory.dmpFilesize
12KB
-
memory/1968-7-0x00000000060E0000-0x00000000060E2000-memory.dmpFilesize
8KB
-
memory/1968-10-0x0000000002220000-0x0000000002226000-memory.dmpFilesize
24KB
-
memory/1968-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1968-3-0x000000006FDB1000-0x000000006FDB3000-memory.dmpFilesize
8KB
-
memory/2000-17-0x0000000000000000-mapping.dmp