Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-01-2022 21:48

General

  • Target

    Payment Notification.xll

  • Size

    554KB

  • MD5

    68172769631a891bc5790feb75823f43

  • SHA1

    e05ed4dbc6c2eb776c95007f62711c682b10c0c4

  • SHA256

    e8ec7dcf12edf07c6099157c32557f41ebd74ddee6b125d1e34dcc4259dc10a7

  • SHA512

    95c0980d2c06842c77b600bce5d8919e93ae206ad031d3ba88ae8c5ed9cdab81274c8cea04ef990553e045dc4173b0650074fcba79ce718b422a1642638b25b4

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

lokibot

C2

http://windowssecuritycheck.gdn/jx/l/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

pony

C2

http://windowssecuritycheck.gdn/jx/p/gate.php

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Sets service image path in registry 2 TTPs
  • Checks QEMU agent file 2 TTPs 4 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Notification.xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\sse.exe
      C:\Users\Admin\AppData\Local\Temp\sse.exe
      2⤵
      • Executes dropped EXE
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\sse.exe
        C:\Users\Admin\AppData\Local\Temp\sse.exe
        3⤵
        • Checks QEMU agent file
        • Checks computer location settings
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        PID:1700
        • C:\Users\Admin\AppData\Local\Temp\wix.exe
          "C:\Users\Admin\AppData\Local\Temp\wix.exe"
          4⤵
          • Executes dropped EXE
          • Checks QEMU agent file
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:932
          • C:\Users\Admin\AppData\Local\Temp\wix.exe
            "C:\Users\Admin\AppData\Local\Temp\wix.exe"
            5⤵
            • Checks QEMU agent file
            • Checks computer location settings
            • Loads dropped DLL
            • Accesses Microsoft Outlook accounts
            • Accesses Microsoft Outlook profiles
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • outlook_win_path
            PID:904
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30459546.bat" "C:\Users\Admin\AppData\Local\Temp\wix.exe" "
              6⤵
                PID:1844
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
      1⤵
        PID:2276
      • C:\Windows\System32\WaaSMedicAgent.exe
        C:\Windows\System32\WaaSMedicAgent.exe db077dd8fcda461dc9ceb50c767a2cac M47BRkgQTUyhsRmoBvSRng.0.1.0.0.0
        1⤵
        • Modifies data under HKEY_USERS
        PID:3996

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      5
      T1012

      System Information Discovery

      5
      T1082

      Collection

      Data from Local System

      3
      T1005

      Email Collection

      2
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\30459546.bat
        MD5

        3880eeb1c736d853eb13b44898b718ab

        SHA1

        4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

        SHA256

        936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

        SHA512

        3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

      • C:\Users\Admin\AppData\Local\Temp\Payment Notification.xll
        MD5

        68172769631a891bc5790feb75823f43

        SHA1

        e05ed4dbc6c2eb776c95007f62711c682b10c0c4

        SHA256

        e8ec7dcf12edf07c6099157c32557f41ebd74ddee6b125d1e34dcc4259dc10a7

        SHA512

        95c0980d2c06842c77b600bce5d8919e93ae206ad031d3ba88ae8c5ed9cdab81274c8cea04ef990553e045dc4173b0650074fcba79ce718b422a1642638b25b4

      • C:\Users\Admin\AppData\Local\Temp\Payment Notification.xll
        MD5

        68172769631a891bc5790feb75823f43

        SHA1

        e05ed4dbc6c2eb776c95007f62711c682b10c0c4

        SHA256

        e8ec7dcf12edf07c6099157c32557f41ebd74ddee6b125d1e34dcc4259dc10a7

        SHA512

        95c0980d2c06842c77b600bce5d8919e93ae206ad031d3ba88ae8c5ed9cdab81274c8cea04ef990553e045dc4173b0650074fcba79ce718b422a1642638b25b4

      • C:\Users\Admin\AppData\Local\Temp\oWd6XQZBhARVHwO1QZW240
        MD5

        f97264a5d29376aadd091cb8880bf4e4

        SHA1

        1641d112c7f0f31ccff1b9ccab6222d245642e27

        SHA256

        5bd919690a6400c82da06969c65988a748945cbf3fd6f4ed803884ba516e4bd2

        SHA512

        6badc1c7bd2b5dad04ff809f0ea6e3a590a777fcaef4750e873bdaea24afd9ce4cc5e1190811632c12f9d6a5cfd67e0b449060fd1811bd55e8863f3a5620b0e2

      • C:\Users\Admin\AppData\Local\Temp\sse.exe
        MD5

        6eaeb3b2575361e191ee34c0baacf7b7

        SHA1

        673bf4970b55bf5d4a89cc14b0a977ccebb53789

        SHA256

        a42c56999d2837f01e3d1e04b7ce70fb17b1357a3ffb08d1e29eb09f8f8b0c05

        SHA512

        153ae58e82e37e0e13475e82df39937c175d48824e9ccee1cbe868d2fd32fcfcb967323df8db6eb1ecbecbc78a59c9dff232607936c16169e915a8d38f92b7ce

      • C:\Users\Admin\AppData\Local\Temp\sse.exe
        MD5

        6eaeb3b2575361e191ee34c0baacf7b7

        SHA1

        673bf4970b55bf5d4a89cc14b0a977ccebb53789

        SHA256

        a42c56999d2837f01e3d1e04b7ce70fb17b1357a3ffb08d1e29eb09f8f8b0c05

        SHA512

        153ae58e82e37e0e13475e82df39937c175d48824e9ccee1cbe868d2fd32fcfcb967323df8db6eb1ecbecbc78a59c9dff232607936c16169e915a8d38f92b7ce

      • C:\Users\Admin\AppData\Local\Temp\sse.exe
        MD5

        6eaeb3b2575361e191ee34c0baacf7b7

        SHA1

        673bf4970b55bf5d4a89cc14b0a977ccebb53789

        SHA256

        a42c56999d2837f01e3d1e04b7ce70fb17b1357a3ffb08d1e29eb09f8f8b0c05

        SHA512

        153ae58e82e37e0e13475e82df39937c175d48824e9ccee1cbe868d2fd32fcfcb967323df8db6eb1ecbecbc78a59c9dff232607936c16169e915a8d38f92b7ce

      • C:\Users\Admin\AppData\Local\Temp\wix.exe
        MD5

        c509c11adc8929e2a932b4bda1216791

        SHA1

        985cf44ab37c06fe2d544cc350210e4a65eb3136

        SHA256

        40d656064f338170882f2de5b2983bd751d102c5986a84ab6a8bd6c61adbf0fc

        SHA512

        e537eb81f104dd55e818f6d516fa11fb9e5f7407436d570b76b5e69fc1cf33e5b114404000d02d1bdea0b2ae2bd4c632f3d3a84bdb4af63ed821e4dae7a9187c

      • C:\Users\Admin\AppData\Local\Temp\wix.exe
        MD5

        c509c11adc8929e2a932b4bda1216791

        SHA1

        985cf44ab37c06fe2d544cc350210e4a65eb3136

        SHA256

        40d656064f338170882f2de5b2983bd751d102c5986a84ab6a8bd6c61adbf0fc

        SHA512

        e537eb81f104dd55e818f6d516fa11fb9e5f7407436d570b76b5e69fc1cf33e5b114404000d02d1bdea0b2ae2bd4c632f3d3a84bdb4af63ed821e4dae7a9187c

      • C:\Users\Admin\AppData\Local\Temp\wix.exe
        MD5

        c509c11adc8929e2a932b4bda1216791

        SHA1

        985cf44ab37c06fe2d544cc350210e4a65eb3136

        SHA256

        40d656064f338170882f2de5b2983bd751d102c5986a84ab6a8bd6c61adbf0fc

        SHA512

        e537eb81f104dd55e818f6d516fa11fb9e5f7407436d570b76b5e69fc1cf33e5b114404000d02d1bdea0b2ae2bd4c632f3d3a84bdb4af63ed821e4dae7a9187c

      • memory/904-195-0x0000000001660000-0x00000000018B0000-memory.dmp
        Filesize

        2.3MB

      • memory/904-218-0x0000000000400000-0x0000000001654000-memory.dmp
        Filesize

        18.3MB

      • memory/904-217-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB

      • memory/904-216-0x00007FF88D9F0000-0x00007FF88DBE5000-memory.dmp
        Filesize

        2.0MB

      • memory/932-193-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB

      • memory/932-194-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB

      • memory/932-191-0x00007FF88D9F0000-0x00007FF88DBE5000-memory.dmp
        Filesize

        2.0MB

      • memory/932-189-0x00000000020B0000-0x00000000020D7000-memory.dmp
        Filesize

        156KB

      • memory/1700-179-0x0000000000400000-0x0000000001654000-memory.dmp
        Filesize

        18.3MB

      • memory/1700-188-0x0000000000400000-0x0000000001654000-memory.dmp
        Filesize

        18.3MB

      • memory/1700-182-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB

      • memory/1700-181-0x00007FF88D9F0000-0x00007FF88DBE5000-memory.dmp
        Filesize

        2.0MB

      • memory/1700-180-0x0000000001660000-0x0000000001880000-memory.dmp
        Filesize

        2.1MB

      • memory/3876-134-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-149-0x0000015291220000-0x00000152912C4000-memory.dmp
        Filesize

        656KB

      • memory/3876-137-0x00007FF84B520000-0x00007FF84B530000-memory.dmp
        Filesize

        64KB

      • memory/3876-131-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-161-0x0000015291502000-0x0000015291504000-memory.dmp
        Filesize

        8KB

      • memory/3876-160-0x0000015291500000-0x0000015291502000-memory.dmp
        Filesize

        8KB

      • memory/3876-133-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-132-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-162-0x0000015291504000-0x0000015291506000-memory.dmp
        Filesize

        8KB

      • memory/3876-138-0x00007FF84B520000-0x00007FF84B530000-memory.dmp
        Filesize

        64KB

      • memory/3876-130-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-163-0x0000015291507000-0x0000015291509000-memory.dmp
        Filesize

        8KB

      • memory/3876-168-0x000001529150C000-0x000001529150F000-memory.dmp
        Filesize

        12KB

      • memory/3876-169-0x000001529150A000-0x000001529150C000-memory.dmp
        Filesize

        8KB

      • memory/3876-164-0x0000015291509000-0x000001529150A000-memory.dmp
        Filesize

        4KB

      • memory/3876-212-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-214-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-213-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/3876-215-0x00007FF84DA70000-0x00007FF84DA80000-memory.dmp
        Filesize

        64KB

      • memory/4076-178-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB

      • memory/4076-174-0x0000000002200000-0x0000000002228000-memory.dmp
        Filesize

        160KB

      • memory/4076-175-0x00007FF88D9F0000-0x00007FF88DBE5000-memory.dmp
        Filesize

        2.0MB

      • memory/4076-176-0x0000000077820000-0x00000000779C3000-memory.dmp
        Filesize

        1.6MB