Analysis

  • max time kernel
    100s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2023 17:12

General

  • Target

    0011INV-PBS-BPPXI22.xls

  • Size

    1.2MB

  • MD5

    33a75ae52baa059c946ce63343977318

  • SHA1

    3f9a8c9b845e25c823236f55e803261611b7ada1

  • SHA256

    ee87371ff74c24235fb99de41971f23185587ee25030fe4abf0a6142101cfb6e

  • SHA512

    3dfff19d8d8eb90400773272e7e40095b299b8040e9f3b324a26e176f01929a934ce049c48544a268fa1418a8878f0863e888e69e0e9e3c8c5f7d43e2fe21c33

  • SSDEEP

    24576:YZyg5mMZyu1m35QsTYh2TDXXXXXXXXXXXXUXXXXXXXXXX7XXXXXCK8VIvsSXOJv6:KbQDTXK8xSeJvb

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\0011INV-PBS-BPPXI22.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1952
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe
        "C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe" C:\Users\Admin\AppData\Local\Temp\qqzfykljr.euv
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe
          "C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • C:\Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • C:\Users\Admin\AppData\Local\Temp\htumj.tgq

    Filesize

    124KB

    MD5

    efc554754a187541e8796eb668035bb3

    SHA1

    97f32f178cb14870ca365a0087e695058ace851d

    SHA256

    9ad33fcd12dc3d5ea791eea89a43690923204d3f264cf90821427b60cc5a526e

    SHA512

    47efd06e5c00786513ad92fc05e97cd41bcb68bc42b2c6ee72dd0fc600da22d3edef00a95784b1d0952893e841578a775375dba569e1c30c9288769986268e9c

  • C:\Users\Admin\AppData\Local\Temp\qqzfykljr.euv

    Filesize

    5KB

    MD5

    ecb37cd6ee8b9db9885ba717d4adb214

    SHA1

    c851738f41f381fb68ff02d4407c66a40674ac55

    SHA256

    5fc04ff9019f6cba12e94c9961b6c94487ad0173ad097c66b868f6cbdc5696ac

    SHA512

    11d1832f232790ceb0faea2f373654e3a91c2d028431692908d6de4c50bfe0664ae9ee4cc55ee5b106f68eb94c9f3547ae15b1a2e1e38fdded1a4c6a3fd7ab8d

  • C:\Users\Public\vbc.exe

    Filesize

    339KB

    MD5

    21f218355048519cbfe30b197a9ed5bb

    SHA1

    ccb176d3bbea60567dc52439ffc0c127fa6eacc4

    SHA256

    de05f9c2ad13c543d4425f070e4608b37aac0b6d25c3816a8fd683cd8795a4b9

    SHA512

    33e88f9b1f374c0c0ac4230876c661a2b4cf05de5b2d1dea46e5f55e4a6644532a95442b74d1e854e9036f9acd2f3c8c1825defcd450cf72fa468529e1feafdf

  • C:\Users\Public\vbc.exe

    Filesize

    339KB

    MD5

    21f218355048519cbfe30b197a9ed5bb

    SHA1

    ccb176d3bbea60567dc52439ffc0c127fa6eacc4

    SHA256

    de05f9c2ad13c543d4425f070e4608b37aac0b6d25c3816a8fd683cd8795a4b9

    SHA512

    33e88f9b1f374c0c0ac4230876c661a2b4cf05de5b2d1dea46e5f55e4a6644532a95442b74d1e854e9036f9acd2f3c8c1825defcd450cf72fa468529e1feafdf

  • \Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • \Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • \Users\Admin\AppData\Local\Temp\dvgxyu.exe

    Filesize

    53KB

    MD5

    ec4ee3046babbdde2b727200fe57e249

    SHA1

    4b2e0a80947bf22fae5d36e42672e2001f0925f6

    SHA256

    525ac1b4fb934952919058b94afd5760c5e1fc489410d33d969d78962a06f753

    SHA512

    9186a8f6e7b775057331fede1a9efe803869a97a904276df5c46fda9c2946dda6d80f27cec6e9499ef50ec225efff066dd8b0bda69c2a3e46cf74c215136a64b

  • \Users\Public\vbc.exe

    Filesize

    339KB

    MD5

    21f218355048519cbfe30b197a9ed5bb

    SHA1

    ccb176d3bbea60567dc52439ffc0c127fa6eacc4

    SHA256

    de05f9c2ad13c543d4425f070e4608b37aac0b6d25c3816a8fd683cd8795a4b9

    SHA512

    33e88f9b1f374c0c0ac4230876c661a2b4cf05de5b2d1dea46e5f55e4a6644532a95442b74d1e854e9036f9acd2f3c8c1825defcd450cf72fa468529e1feafdf

  • memory/524-61-0x0000000000000000-mapping.dmp

  • memory/1572-79-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1572-77-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1572-74-0x00000000004139DE-mapping.dmp

  • memory/1756-67-0x0000000000000000-mapping.dmp

  • memory/1952-55-0x0000000071001000-0x0000000071003000-memory.dmp

    Filesize

    8KB

  • memory/1952-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1952-57-0x0000000075981000-0x0000000075983000-memory.dmp

    Filesize

    8KB

  • memory/1952-58-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB

  • memory/1952-78-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB

  • memory/1952-54-0x000000002F671000-0x000000002F674000-memory.dmp

    Filesize

    12KB

  • memory/1952-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1952-81-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB