Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 08:33

General

  • Target

    9d0690c91bf2a7865663aedba946a273408ba8de85ec3da05ab125fd5a6a580e.exe

  • Size

    300KB

  • MD5

    72a7ae75504377eaeabc054ec4ac80d4

  • SHA1

    4cd0094273f3914f612fc5a8ed2bfa1c13fa44d3

  • SHA256

    9d0690c91bf2a7865663aedba946a273408ba8de85ec3da05ab125fd5a6a580e

  • SHA512

    eb546277baedaf38ea6d02b55b082978e9c64ab5586ac4b42f06286445ac161b42a5a2070a3acf5d06ce01228838bba312efb2ac6ea416aca74ddec3da646e67

  • SSDEEP

    6144:ebE/HU4T44R2GZzuj7Fko78xZEg6NfshMzZgrgH4/aRv+/3pOGL6ADjP/k:ebKIVcgY/aRv4bemjP/k

Malware Config

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d0690c91bf2a7865663aedba946a273408ba8de85ec3da05ab125fd5a6a580e.exe
    "C:\Users\Admin\AppData\Local\Temp\9d0690c91bf2a7865663aedba946a273408ba8de85ec3da05ab125fd5a6a580e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\mfctf.exe
      "C:\Users\Admin\AppData\Local\Temp\mfctf.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Users\Admin\AppData\Local\Temp\mfctf.exe
        "C:\Users\Admin\AppData\Local\Temp\mfctf.exe"
        3⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:5012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 716
        3⤵
        • Program crash
        PID:1820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3604 -ip 3604
    1⤵
      PID:4936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\lxamtxhedqm.veh

      Filesize

      104KB

      MD5

      757e96fe0b2ab49cfac55bae58562f8d

      SHA1

      bcdc33f6310480ed69b6500094965c58b79b497c

      SHA256

      b3b898deebfd27e6b49af7e8a17da2ba1058422555b30875c05412de35faf23e

      SHA512

      52b4763c712c8bbbd97ec03b9acb4f5ee079533a557b4c5039a217088e1c0a2f6697675d9577388804c658d4cb30bbae656ddf6c490196260e8ffefea9a8596c

    • C:\Users\Admin\AppData\Local\Temp\mfctf.exe

      Filesize

      59KB

      MD5

      b886e5335de23984feb437703ae9a43c

      SHA1

      b43aea33165f7286c884fd9f5d66c6a9b09babed

      SHA256

      a543116dba9c492a026732ba961dbc137eb6bce3b8658dcb85a3ca71c26967aa

      SHA512

      bcbbc3df90bd8d4c6fb9688de401583087f9c5e51b67debf39400ed3d7451e6cb997cab8db166715512212672678996dddc1e2d2fd49d249f1db1d8e1a4d04a2

    • C:\Users\Admin\AppData\Local\Temp\mfctf.exe

      Filesize

      59KB

      MD5

      b886e5335de23984feb437703ae9a43c

      SHA1

      b43aea33165f7286c884fd9f5d66c6a9b09babed

      SHA256

      a543116dba9c492a026732ba961dbc137eb6bce3b8658dcb85a3ca71c26967aa

      SHA512

      bcbbc3df90bd8d4c6fb9688de401583087f9c5e51b67debf39400ed3d7451e6cb997cab8db166715512212672678996dddc1e2d2fd49d249f1db1d8e1a4d04a2

    • C:\Users\Admin\AppData\Local\Temp\mfctf.exe

      Filesize

      59KB

      MD5

      b886e5335de23984feb437703ae9a43c

      SHA1

      b43aea33165f7286c884fd9f5d66c6a9b09babed

      SHA256

      a543116dba9c492a026732ba961dbc137eb6bce3b8658dcb85a3ca71c26967aa

      SHA512

      bcbbc3df90bd8d4c6fb9688de401583087f9c5e51b67debf39400ed3d7451e6cb997cab8db166715512212672678996dddc1e2d2fd49d249f1db1d8e1a4d04a2

    • C:\Users\Admin\AppData\Local\Temp\zfsfh.q

      Filesize

      6KB

      MD5

      a5dbb138e924474217693e24969fd8b9

      SHA1

      500817fb14d17114187be78cbd90a5a151d7753d

      SHA256

      20fa7b45149a3d20bc8210285bf13e1238dd662644b5e41f3db7dd09148752c9

      SHA512

      1052bea6587e4cff14d6fba1ef7e1309ffa2fd230dacc73263a6e0ac558d1058abc9b914a5f8afa2223fc5b3dad785deaf28c4e3cd1f3fb4a41b369c3b3d93ff