Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2023 12:41

General

  • Target

    5c2f3610b4d02d7bdd87439ce17e49a51effefad.exe

  • Size

    345KB

  • MD5

    da0210cb16a56636b2d28c3f542173e2

  • SHA1

    5c2f3610b4d02d7bdd87439ce17e49a51effefad

  • SHA256

    6f7d710effbef4c9dde9997af6ca7790d879e8e190b21bd5a43e099b27f6eb8a

  • SHA512

    5adade7016a711ac7784355c151f7837758d056331649bf904cfa4a6b06084ea9441ab07bc5d6302e107f88e8209edc54a010c9c04c8b81ea4203215d66f4915

  • SSDEEP

    3072:0fY/TU9fE9PEtuzhbiXCZDs68q72mIJJik3VNr8z9asJeEoArhZ/iZDM20jrsH+o:CYa69liXCj7mJF7SffodhcfE+R6

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c2f3610b4d02d7bdd87439ce17e49a51effefad.exe
    "C:\Users\Admin\AppData\Local\Temp\5c2f3610b4d02d7bdd87439ce17e49a51effefad.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\ghlmj.exe
      "C:\Users\Admin\AppData\Local\Temp\ghlmj.exe" C:\Users\Admin\AppData\Local\Temp\kslmkms.i
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\ghlmj.exe
        "C:\Users\Admin\AppData\Local\Temp\ghlmj.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ggcpalhrnre.u

    Filesize

    124KB

    MD5

    f80e837550cc4b8ba474491b616ac01d

    SHA1

    d7583cac66bba4c9bd51ac5937bed737f2b5bd6e

    SHA256

    6a8794ae27527f8b23566553db58757eca59170cff75e09a158dce4dc2dc386b

    SHA512

    55889c69bb1d30452e6a10b7b8bd4b53aaad4167bd435061cc91dcc1e1154df5ade7e54915f2f4e713d63158f12ba54287788d86fd3c14f9a6f931f011870134

  • C:\Users\Admin\AppData\Local\Temp\ghlmj.exe

    Filesize

    84KB

    MD5

    ed9b87824104603d6e22776cce91edf2

    SHA1

    659d001492da3b7e2e0fc2ab0ac6483970557a85

    SHA256

    9e87d9057bf4b0cd43310d8e042f6173a5e584b036a0ca7e9dd50aa032c58154

    SHA512

    80b10eb87817e3b535e78d31b39c99f09507bca24d9a5da088e07ab89eeb53197f7485266075480c8f96d908a8a20074d53cc07bb8175a3fbd6d6da3d7523317

  • C:\Users\Admin\AppData\Local\Temp\ghlmj.exe

    Filesize

    84KB

    MD5

    ed9b87824104603d6e22776cce91edf2

    SHA1

    659d001492da3b7e2e0fc2ab0ac6483970557a85

    SHA256

    9e87d9057bf4b0cd43310d8e042f6173a5e584b036a0ca7e9dd50aa032c58154

    SHA512

    80b10eb87817e3b535e78d31b39c99f09507bca24d9a5da088e07ab89eeb53197f7485266075480c8f96d908a8a20074d53cc07bb8175a3fbd6d6da3d7523317

  • C:\Users\Admin\AppData\Local\Temp\ghlmj.exe

    Filesize

    84KB

    MD5

    ed9b87824104603d6e22776cce91edf2

    SHA1

    659d001492da3b7e2e0fc2ab0ac6483970557a85

    SHA256

    9e87d9057bf4b0cd43310d8e042f6173a5e584b036a0ca7e9dd50aa032c58154

    SHA512

    80b10eb87817e3b535e78d31b39c99f09507bca24d9a5da088e07ab89eeb53197f7485266075480c8f96d908a8a20074d53cc07bb8175a3fbd6d6da3d7523317

  • C:\Users\Admin\AppData\Local\Temp\kslmkms.i

    Filesize

    5KB

    MD5

    dea5fcf3522dd933e473eb4a25870dc8

    SHA1

    05e935cd8a865f022d3df6c0ffffdd74abd9cc74

    SHA256

    154fc961aa511dcbab8bbfc6699f3765d8f71d590adcba323996830445afa51a

    SHA512

    ac7323e817193538fcb692a368c45a395dc143993865d4a69b479c74cb7a6f5caff9b50dad9ae9f409c23450558ee5a8240333ae103c3c55fb80ca772a7d2a4b

  • memory/1252-132-0x0000000000000000-mapping.dmp

  • memory/4404-137-0x0000000000000000-mapping.dmp

  • memory/4404-139-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4404-140-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB