Analysis

  • max time kernel
    126s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2023 06:40

General

  • Target

    dcfbb5cc6f548adc27d1a3ce25b3d1ca31826bfd.exe

  • Size

    309KB

  • MD5

    0bab5f57b83a269dd1814c5eff29e477

  • SHA1

    dcfbb5cc6f548adc27d1a3ce25b3d1ca31826bfd

  • SHA256

    4337ccc0329004c467b984ac20a8f86bf743a3e344900a6fadf4f73b2cfa0446

  • SHA512

    34dccc334675189a034f8129edde9848de9c89af999d4b13e9a9a6dda1d346f335e0458799cc8157f5e99d8abb1438c81d0a6632fd4832f34c052868c5729233

  • SSDEEP

    6144:NYa6Cg33NTReufO0F7hvil+0rUwD9h39geKEzXi1H:NYF3v1maviDUwD9geS1H

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcfbb5cc6f548adc27d1a3ce25b3d1ca31826bfd.exe
    "C:\Users\Admin\AppData\Local\Temp\dcfbb5cc6f548adc27d1a3ce25b3d1ca31826bfd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe
      "C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe" C:\Users\Admin\AppData\Local\Temp\ykghds.zod
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe
        "C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe

    Filesize

    52KB

    MD5

    7555fd80a4b33230fd7345a073958868

    SHA1

    a7fe65539fa3d23d0b4cdc87b0e0b2424788de88

    SHA256

    26fa568776a8f1605cf5221ab16394b5b13e78db93352e425541ecf317dd3357

    SHA512

    ad46f8631c3a1654ac5748956a27d3d5a9dd17d34f18e7fde51d899532a533be2e75aab00c4ec3271eb92bae234b86248dd1fb4934a38db5d8219080efc90968

  • C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe

    Filesize

    52KB

    MD5

    7555fd80a4b33230fd7345a073958868

    SHA1

    a7fe65539fa3d23d0b4cdc87b0e0b2424788de88

    SHA256

    26fa568776a8f1605cf5221ab16394b5b13e78db93352e425541ecf317dd3357

    SHA512

    ad46f8631c3a1654ac5748956a27d3d5a9dd17d34f18e7fde51d899532a533be2e75aab00c4ec3271eb92bae234b86248dd1fb4934a38db5d8219080efc90968

  • C:\Users\Admin\AppData\Local\Temp\hgvhrnj.exe

    Filesize

    52KB

    MD5

    7555fd80a4b33230fd7345a073958868

    SHA1

    a7fe65539fa3d23d0b4cdc87b0e0b2424788de88

    SHA256

    26fa568776a8f1605cf5221ab16394b5b13e78db93352e425541ecf317dd3357

    SHA512

    ad46f8631c3a1654ac5748956a27d3d5a9dd17d34f18e7fde51d899532a533be2e75aab00c4ec3271eb92bae234b86248dd1fb4934a38db5d8219080efc90968

  • C:\Users\Admin\AppData\Local\Temp\hjeapyw.csc

    Filesize

    124KB

    MD5

    09bf3b9b172e84e9959b734a54355c7d

    SHA1

    f798186188d57dbf34d0cfcc139c52a88f0b1d15

    SHA256

    fd73a6adeadce85d65c039193604b69390a7128ae4fe02c8f850933ed912eb36

    SHA512

    b83792c4cf3ac4f53a23850ad2cb3eedac5f3d1fae9932d1b3159290f7d0fc930c2c4dab9cd4d6825e523ac53926b81c4bb307b5fa071e6b9a00853bec5d9769

  • C:\Users\Admin\AppData\Local\Temp\ykghds.zod

    Filesize

    5KB

    MD5

    d454a075100f318506b1c149c30d385e

    SHA1

    b06c21c85713128bab736ca232d9c23670e79c98

    SHA256

    003158ff65bdf2b7d4824b8fd911751ef47da23de0f80d4b0a60f193d6903a22

    SHA512

    1199742cf45933045eb0a3ad434db2d632ec1129e829a8a39f1259ede960cc4800f3449af94d65d6be73a8ec63499e5c608ae49d50f2039ca9b4278ee30a2106

  • memory/1148-132-0x0000000000000000-mapping.dmp

  • memory/2032-137-0x0000000000000000-mapping.dmp

  • memory/2032-139-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2032-140-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB