Analysis

  • max time kernel
    65s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 19:18

General

  • Target

    Purchase Order no#100894.exe

  • Size

    949KB

  • MD5

    33a0fb90d362ed8d3a4ecd8d4ef6ecff

  • SHA1

    adaf7e746f89a370a6053588d996973efd7e9450

  • SHA256

    3462fa9634ad9ada7c6d07f2b48138fba9326e4771843da8a11a33bb618f265a

  • SHA512

    ae48efcec02c363d79b7b124b81c9339e1468117208de72ad280706e8df3fb7f12af0174f84da0165bd54ef6aaf07ff7871c6a8ef7dd2aeaeeabed7c6e0475d4

  • SSDEEP

    12288:cHK4HTNqNPt9WW3fYPcc94HFUOAA9j/sMeGlZUOF4g:BP3fYPcc9iHAisol73

Malware Config

Extracted

Family

lokibot

C2

http://162.0.223.13/?05315

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe"
      2⤵
        PID:1268
      • C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase Order no#100894.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1052

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1052-69-0x00000000004139DE-mapping.dmp
    • memory/1052-68-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-63-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-75-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-66-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-74-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-60-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-65-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-73-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-71-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1052-61-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1768-59-0x0000000000C00000-0x0000000000C20000-memory.dmp
      Filesize

      128KB

    • memory/1768-54-0x0000000001360000-0x0000000001454000-memory.dmp
      Filesize

      976KB

    • memory/1768-58-0x0000000005EA0000-0x0000000005F18000-memory.dmp
      Filesize

      480KB

    • memory/1768-56-0x0000000000500000-0x000000000051C000-memory.dmp
      Filesize

      112KB

    • memory/1768-55-0x0000000075931000-0x0000000075933000-memory.dmp
      Filesize

      8KB

    • memory/1768-57-0x0000000000520000-0x000000000052C000-memory.dmp
      Filesize

      48KB