Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 12:23

General

  • Target

    11.10.2022_____Remittance Advice.exe

  • Size

    185KB

  • MD5

    17fbfeff461f7699a5030a39515da9e8

  • SHA1

    96ab0813e976419985e47bca34f5add10f81471c

  • SHA256

    ccffa2c388af2b3da210647b0f7be25a53cf7a4c6f99bf4b64987e881b763e23

  • SHA512

    a4ec56cecb3330d191ff391093a996fa51d957bbc03819aece09c0098e2b6e911b47d4a0189bb8b6cf89dd94581b9a949e69af42929b63dd1fe484117f7811c2

  • SSDEEP

    3072:l1NjcVVnLpPunbVq5/0/XhZfomCZq0XPdvhHTe/mb3bfV987+eM5Bw5P2DQkFyiE:HNeZmQ5WhZfobUKVZHC/0x987Qw5yQE+

Malware Config

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11.10.2022_____Remittance Advice.exe
    "C:\Users\Admin\AppData\Local\Temp\11.10.2022_____Remittance Advice.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe
      "C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe
        "C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe"
        3⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bbxubwoziav.bbc

    Filesize

    4KB

    MD5

    6fa96d4b67776e2df8b1f2f1f0ec545e

    SHA1

    7b7ef1cc90416d58684dcf7e6aa2a90d81a16ba8

    SHA256

    c35013739aecc8da58fd0dc15fe06c0028f31d05c974bd86730ea2e8d98230c7

    SHA512

    a671d7668ffbd9da54ca0df7f9c97c0b50f0b78ab4cbb3bca30b1758f3133fc497c0a22587fa4adf745027efcaecb591e3952cfbd8bf4e09c0ae8766b997437b

  • C:\Users\Admin\AppData\Local\Temp\qywem.zrb

    Filesize

    104KB

    MD5

    bfad23ebd727182e48b96c714d46bb4d

    SHA1

    2ddebb0baca457a1c3f51bcd5227925fc0b8f1b2

    SHA256

    77f9dbcd7da167d4d427e38364b2794975ec644e1b92eabfc6349a4d7a6461b3

    SHA512

    8c7d183f74d6f3b3d652ef539c7428b58745ebb0836f9a1a83dfdf0d5c65f0be4485983e3335234d785f4c0073864401af4ee6f610e0997b8ac5e60d2266db82

  • C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe

    Filesize

    125KB

    MD5

    e60d23b478bc7e2304512c1d80d0183d

    SHA1

    feb422df606fe854cba115059d3d23bd46fdbfa0

    SHA256

    3a98bdcdbb6e63a51334f825c7b4024ce5f773f28423a5a2a41b6b5ec45d1afd

    SHA512

    97965bb30621d2afa058a2ab834b1df764d082f47a442bee2cfa68190730462da470d355ce6bb392a2f1d16736c7b090110193d142cc7248d670da2db799296f

  • C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe

    Filesize

    125KB

    MD5

    e60d23b478bc7e2304512c1d80d0183d

    SHA1

    feb422df606fe854cba115059d3d23bd46fdbfa0

    SHA256

    3a98bdcdbb6e63a51334f825c7b4024ce5f773f28423a5a2a41b6b5ec45d1afd

    SHA512

    97965bb30621d2afa058a2ab834b1df764d082f47a442bee2cfa68190730462da470d355ce6bb392a2f1d16736c7b090110193d142cc7248d670da2db799296f

  • C:\Users\Admin\AppData\Local\Temp\tujbbtdfos.exe

    Filesize

    125KB

    MD5

    e60d23b478bc7e2304512c1d80d0183d

    SHA1

    feb422df606fe854cba115059d3d23bd46fdbfa0

    SHA256

    3a98bdcdbb6e63a51334f825c7b4024ce5f773f28423a5a2a41b6b5ec45d1afd

    SHA512

    97965bb30621d2afa058a2ab834b1df764d082f47a442bee2cfa68190730462da470d355ce6bb392a2f1d16736c7b090110193d142cc7248d670da2db799296f

  • \Users\Admin\AppData\Local\Temp\tujbbtdfos.exe

    Filesize

    125KB

    MD5

    e60d23b478bc7e2304512c1d80d0183d

    SHA1

    feb422df606fe854cba115059d3d23bd46fdbfa0

    SHA256

    3a98bdcdbb6e63a51334f825c7b4024ce5f773f28423a5a2a41b6b5ec45d1afd

    SHA512

    97965bb30621d2afa058a2ab834b1df764d082f47a442bee2cfa68190730462da470d355ce6bb392a2f1d16736c7b090110193d142cc7248d670da2db799296f

  • \Users\Admin\AppData\Local\Temp\tujbbtdfos.exe

    Filesize

    125KB

    MD5

    e60d23b478bc7e2304512c1d80d0183d

    SHA1

    feb422df606fe854cba115059d3d23bd46fdbfa0

    SHA256

    3a98bdcdbb6e63a51334f825c7b4024ce5f773f28423a5a2a41b6b5ec45d1afd

    SHA512

    97965bb30621d2afa058a2ab834b1df764d082f47a442bee2cfa68190730462da470d355ce6bb392a2f1d16736c7b090110193d142cc7248d670da2db799296f

  • memory/1220-54-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB