Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-07-2021 07:36
Static task
static1
Behavioral task
behavioral1
Sample
POE6709000.JS.js
Resource
win7v20210410
General
-
Target
POE6709000.JS.js
-
Size
2KB
-
MD5
38aed88adfeff1ade7eb881e7974a003
-
SHA1
e2957656134f6fc70a02beac4c28c4865377c9e7
-
SHA256
a01feeb43fac99c6270a8f3b0f3db9de1de8ccaf8edb8e207ed547842fd3cf8d
-
SHA512
65de2bf879e3d801333194a794bbaa9209ea1d76bc96115328688c91c1acede9e352514b88b72171f702686f799c82e2be8e9e83e0da05121690837cf60db03e
Malware Config
Extracted
lokibot
http://ikloki.xyz/vf/cf/ro.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1460-66-0x00000000003C0000-0x00000000003CB000-memory.dmp CustAttr -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 6 1100 wscript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Downloader.exeDownloader.exeDownloader.exepid process 1460 Downloader.exe 976 Downloader.exe 1108 Downloader.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Downloader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Downloader.exe -
Loads dropped DLL 2 IoCs
Processes:
Downloader.exepid process 1460 Downloader.exe 1460 Downloader.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Downloader.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Downloader.exedescription pid process target process PID 1460 set thread context of 1108 1460 Downloader.exe Downloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Downloader.exepid process 1460 Downloader.exe 1460 Downloader.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Downloader.exeDownloader.exedescription pid process Token: SeDebugPrivilege 1460 Downloader.exe Token: SeDebugPrivilege 1108 Downloader.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
wscript.exeDownloader.exedescription pid process target process PID 1100 wrote to memory of 1460 1100 wscript.exe Downloader.exe PID 1100 wrote to memory of 1460 1100 wscript.exe Downloader.exe PID 1100 wrote to memory of 1460 1100 wscript.exe Downloader.exe PID 1100 wrote to memory of 1460 1100 wscript.exe Downloader.exe PID 1460 wrote to memory of 976 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 976 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 976 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 976 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe PID 1460 wrote to memory of 1108 1460 Downloader.exe Downloader.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\POE6709000.JS.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
memory/1108-73-0x00000000004139DE-mapping.dmp
-
memory/1108-72-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1108-75-0x00000000757D1000-0x00000000757D3000-memory.dmpFilesize
8KB
-
memory/1108-76-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/1460-68-0x00000000006B0000-0x00000000006CD000-memory.dmpFilesize
116KB
-
memory/1460-67-0x0000000004EA0000-0x0000000004F01000-memory.dmpFilesize
388KB
-
memory/1460-66-0x00000000003C0000-0x00000000003CB000-memory.dmpFilesize
44KB
-
memory/1460-65-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/1460-60-0x0000000000000000-mapping.dmp
-
memory/1460-63-0x0000000001140000-0x0000000001141000-memory.dmpFilesize
4KB