Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 07:46

General

  • Target

    17cbe8a0069c4b52fbf18067f4dd7edcb11bde9e6d23933799875397a97bcc5a.exe

  • Size

    123KB

  • MD5

    e78afca36c1a8c02b8adca514a527e05

  • SHA1

    cabffe8392757d75ab51ce33a3260723ba0c4f21

  • SHA256

    17cbe8a0069c4b52fbf18067f4dd7edcb11bde9e6d23933799875397a97bcc5a

  • SHA512

    60a67251114f82532b9e54a2710e95fe429f8c839171cc034709460640a74dbf7aa927ae886e666866e77f29081fddd6a634c9c2ae10fc6cf567621addf016f3

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gf17/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

  • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

  • suricata: ET MALWARE LokiBot Checkin

    suricata: ET MALWARE LokiBot Checkin

  • suricata: ET MALWARE LokiBot Fake 404 Response

    suricata: ET MALWARE LokiBot Fake 404 Response

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

  • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

  • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17cbe8a0069c4b52fbf18067f4dd7edcb11bde9e6d23933799875397a97bcc5a.exe
    "C:\Users\Admin\AppData\Local\Temp\17cbe8a0069c4b52fbf18067f4dd7edcb11bde9e6d23933799875397a97bcc5a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
      C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe C:\Users\Admin\AppData\Local\Temp\jspynxhed
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
        C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe C:\Users\Admin\AppData\Local\Temp\jspynxhed
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9are6o72zvvbe3cm3
    Filesize

    103KB

    MD5

    4e1514acb88166b02dfd91eea28f0005

    SHA1

    4a5ba4ae9d5f8a5706373d477aa04c3c58fd605f

    SHA256

    7e6c5863df94b9ca650f47d4168dbced7da43243e018cd96772d0e712f6202cd

    SHA512

    a749469bbec769c4e5ba3d27ce04b3334c910bea4de58b7691e81cc1f17468d5ff36826dcbe1310887cadc7bd7e0ee8455c9bae1f001fc582fd7af50403d2c84

  • C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • C:\Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • C:\Users\Admin\AppData\Local\Temp\jspynxhed
    Filesize

    4KB

    MD5

    b2018c28165061d834613a54ed7e241c

    SHA1

    159beadf56f5aff160166893412368f8c214401e

    SHA256

    22247dc686d0ffe62f9a071f2fd2e27cd126c5064776d5dafa42b07bac33ccbb

    SHA512

    63c87aa7c520954c6f75b4fc2d8da1e3b655ca2658f986b6bf1a63a9cd407ec40deccfd70121f9925b5aa3203ffd5e9e82ed1c9c5eded8a87db81e9937a42f67

  • \Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • \Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • \Users\Admin\AppData\Local\Temp\fnrfjcimph.exe
    Filesize

    4KB

    MD5

    a8c5c246e288248c0ad0b67ab9113c14

    SHA1

    36faee302984578feff66ea705d98a96dc364ff9

    SHA256

    58bd97da00d5aa46f94b70c50db71251daeff393d5048487ba1a038b01649a64

    SHA512

    8a87890e38ba389f70fa82b73ce3b2c0433dc1439b09b477c37e112ea09dd08496fc0548cdda96c76e30190833b607e30839bf1936b88f8b41bd7d0b47e865cf

  • memory/904-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/1672-57-0x0000000000000000-mapping.dmp
  • memory/1876-64-0x00000000004139DE-mapping.dmp
  • memory/1876-67-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1876-63-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB

  • memory/1876-69-0x0000000000400000-0x00000000004A2000-memory.dmp
    Filesize

    648KB