Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2023 02:00

General

  • Target

    Statement Of Account .xls

  • Size

    883KB

  • MD5

    7b35fd3ea67e7ab049ba760c0bbf03e7

  • SHA1

    e0e3665311627b00580f3ff72c502e6e3779afd2

  • SHA256

    2fe07388d4fb59ade682b9553b4fee971d77a18018cbe7af052d880c2211c559

  • SHA512

    bdd45fb16e63d5eca8e957a057e272abddcc0be5326f729c6c260617f1a6128d5dd085625e35f59eef6bb681feb1eabb7ad564409c2a55ced7db3ebc455ce0b2

  • SSDEEP

    12288:Us02NM0ry+1wFZBDF4BSFLBJFKBsx02NM0ry+1ZFTBHFxBaFJBiFBBnuoSIAB1WP:KZy6Z9lsZyrX4ILSIAvQv

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Statement Of Account .xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1808
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe
        "C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe" C:\Users\Admin\AppData\Local\Temp\hmedw.p
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe
          "C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hmedw.p

    Filesize

    6KB

    MD5

    fd51be72426c39dc00f2b205f6833842

    SHA1

    57b2789688d6f661560a04ade85b93da51157d27

    SHA256

    b896a8708e886a084f33b9121ba0c706d8c49fe20ea5ee9a12d3d8607d891506

    SHA512

    55d20776296db0fdd81df8ea70f601ec249cfc3ec87f69151c51ab2934c426a02b1acc66a2a8f0d9281e074c13a919ee4f9ad89d0070786c6747523d540b3baf

  • C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • C:\Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • C:\Users\Admin\AppData\Local\Temp\nxxmjmgo.k

    Filesize

    124KB

    MD5

    ace55a7b52c7d502500c8c47650dd135

    SHA1

    aa370c3828ae5aa80e78fe6ed0bd8cebf22f68f3

    SHA256

    5ad2b3d31c912c02a656c49b681fe8d6d5b49eb77d19a07858392c88a61bd1bf

    SHA512

    84ac3071e813cc1acdb27b0e90984e16774f89239c7d1389385a2c1eab4b86531e357fb1b82fe6677a5a82234cec73426f1e94fff619b2bdac2c2255ab8c082d

  • C:\Users\Public\vbc.exe

    Filesize

    410KB

    MD5

    8e3f5686982c6fb28ca05be8afa2945c

    SHA1

    a07552b36fb3446c1bf933839aac0c5c2ac85413

    SHA256

    be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7

    SHA512

    9618d5fba1fe3923d4b9bdc18fd54fd9f2b41db43b9b9b2829eb70f7dee889e33d3844cb9517bcba85d5105571fcf46dfcab1a9872f965cfdedd7250498daaaf

  • C:\Users\Public\vbc.exe

    Filesize

    410KB

    MD5

    8e3f5686982c6fb28ca05be8afa2945c

    SHA1

    a07552b36fb3446c1bf933839aac0c5c2ac85413

    SHA256

    be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7

    SHA512

    9618d5fba1fe3923d4b9bdc18fd54fd9f2b41db43b9b9b2829eb70f7dee889e33d3844cb9517bcba85d5105571fcf46dfcab1a9872f965cfdedd7250498daaaf

  • \Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • \Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • \Users\Admin\AppData\Local\Temp\nkdvifms.exe

    Filesize

    100KB

    MD5

    7a42faf6b143e8fdb37b2a5b81e6c12e

    SHA1

    6387197a404e96da47dd4aa6d288fed647146514

    SHA256

    aeb928e5e4d606bea2a22740a0bfbf8d32250107af71f1aa5ad53f6ea9c15e4f

    SHA512

    0d39585c2ae20878af9e42d9d33cdb8f5fb6cac72a01ccb245d478b66a92bf55ab924d8cf7b349b17e62e8122b528b08a0562f0fc01013d30d47acfe9c412637

  • \Users\Public\vbc.exe

    Filesize

    410KB

    MD5

    8e3f5686982c6fb28ca05be8afa2945c

    SHA1

    a07552b36fb3446c1bf933839aac0c5c2ac85413

    SHA256

    be6c4deb16404e0a19816416d4b40cca5343115fc2fe3cf0d63ebc9821d628e7

    SHA512

    9618d5fba1fe3923d4b9bdc18fd54fd9f2b41db43b9b9b2829eb70f7dee889e33d3844cb9517bcba85d5105571fcf46dfcab1a9872f965cfdedd7250498daaaf

  • memory/292-67-0x0000000000000000-mapping.dmp

  • memory/1676-61-0x0000000000000000-mapping.dmp

  • memory/1808-54-0x000000002F841000-0x000000002F844000-memory.dmp

    Filesize

    12KB

  • memory/1808-58-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1808-57-0x0000000072C4D000-0x0000000072C58000-memory.dmp

    Filesize

    44KB

  • memory/1808-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1808-55-0x0000000071C61000-0x0000000071C63000-memory.dmp

    Filesize

    8KB

  • memory/1808-78-0x0000000072C4D000-0x0000000072C58000-memory.dmp

    Filesize

    44KB

  • memory/1808-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1808-81-0x0000000072C4D000-0x0000000072C58000-memory.dmp

    Filesize

    44KB

  • memory/2012-74-0x00000000004139DE-mapping.dmp

  • memory/2012-77-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2012-79-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB