Analysis
-
max time kernel
123s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-07-2021 08:04
Static task
static1
Behavioral task
behavioral1
Sample
POE6709000.JS.js
Resource
win7v20210408
General
-
Target
POE6709000.JS.js
-
Size
2KB
-
MD5
38aed88adfeff1ade7eb881e7974a003
-
SHA1
e2957656134f6fc70a02beac4c28c4865377c9e7
-
SHA256
a01feeb43fac99c6270a8f3b0f3db9de1de8ccaf8edb8e207ed547842fd3cf8d
-
SHA512
65de2bf879e3d801333194a794bbaa9209ea1d76bc96115328688c91c1acede9e352514b88b72171f702686f799c82e2be8e9e83e0da05121690837cf60db03e
Malware Config
Extracted
lokibot
http://ikloki.xyz/vf/cf/ro.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/3040-125-0x0000000005970000-0x000000000597B000-memory.dmp CustAttr -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 9 4648 wscript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Downloader.exeDownloader.exepid process 3040 Downloader.exe 636 Downloader.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Downloader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Downloader.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Downloader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 Downloader.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Downloader.exedescription pid process target process PID 3040 set thread context of 636 3040 Downloader.exe Downloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Downloader.exedescription pid process Token: SeDebugPrivilege 636 Downloader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wscript.exeDownloader.exedescription pid process target process PID 4648 wrote to memory of 3040 4648 wscript.exe Downloader.exe PID 4648 wrote to memory of 3040 4648 wscript.exe Downloader.exe PID 4648 wrote to memory of 3040 4648 wscript.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe PID 3040 wrote to memory of 636 3040 Downloader.exe Downloader.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\POE6709000.JS.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
memory/636-129-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/636-132-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/636-130-0x00000000004139DE-mapping.dmp
-
memory/3040-123-0x00000000058D0000-0x00000000058D1000-memory.dmpFilesize
4KB
-
memory/3040-122-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/3040-114-0x0000000000000000-mapping.dmp
-
memory/3040-124-0x00000000056D0000-0x0000000005BCE000-memory.dmpFilesize
5.0MB
-
memory/3040-125-0x0000000005970000-0x000000000597B000-memory.dmpFilesize
44KB
-
memory/3040-126-0x0000000006480000-0x00000000064E1000-memory.dmpFilesize
388KB
-
memory/3040-127-0x0000000006540000-0x000000000655D000-memory.dmpFilesize
116KB
-
memory/3040-128-0x00000000066F0000-0x00000000066F1000-memory.dmpFilesize
4KB
-
memory/3040-121-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/3040-120-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/3040-119-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/3040-117-0x0000000000B80000-0x0000000000B81000-memory.dmpFilesize
4KB