Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2023 11:36

General

  • Target

    22688ff9e157c182349eb229dd249290461fa14697355057774dfd45d6aa2eda.rtf

  • Size

    32KB

  • MD5

    06eaf94652a2911e162a9f2539068fde

  • SHA1

    0b5d67194a23ca8e383adea70805475b493e00b4

  • SHA256

    22688ff9e157c182349eb229dd249290461fa14697355057774dfd45d6aa2eda

  • SHA512

    367d58564b4428e431a7aaa3ae65dd8686ee9660b09256817cd03471b64949970dc5937d2f5e94eb3a78c79467e5aa91536b89cfc9c558a8971ee40f39075a2d

  • SSDEEP

    768:gFx0XaIsnPRIa4fwJMi8kXCxQJnoncHdJBRLZ3Jt4xc:gf0Xvx3EMi8aDAiLt4K

Malware Config

Extracted

Family

lokibot

C2

http://171.22.30.147/kelly/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\22688ff9e157c182349eb229dd249290461fa14697355057774dfd45d6aa2eda.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1228
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Roaming\kellyllerpru658.exe
        "C:\Users\Admin\AppData\Roaming\kellyllerpru658.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe
          "C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe" C:\Users\Admin\AppData\Local\Temp\dqzmvns.g
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe
            "C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bvlfwhldw.fdl

      Filesize

      124KB

      MD5

      61abf3581a3e06a83eea49025d16fc93

      SHA1

      e12e72a053fc908c218172ede2eb0c8b341661d2

      SHA256

      f86753be7afbe8b3b89179dd283459b00914367c19bbd89a6fad112117af93c9

      SHA512

      c90d6220d935a879895d2480c4ed9d2506b2a28c8891e35790523a09e76965481aef7e6d30b634cdf49cb91640cf56257dcac0cb7b5e00f40777c67ff951d6a0

    • C:\Users\Admin\AppData\Local\Temp\dqzmvns.g

      Filesize

      5KB

      MD5

      1150f13d89e2a0154b11a2f20e9df7e6

      SHA1

      5cf36041f5721c64dd8e1fa8ff25fd29c456eb25

      SHA256

      496366e6c6d3a2b4e624962b0c97788c6b5a419963f4668a001fd6c1642e1c4c

      SHA512

      8889c9b97dbc6b8d9b975c1320977d8c91697069b510f7fa65df97da211d5008f9a646ff98f9bbf21241bd7a76c5af81a742b817007b94f530f840c152382007

    • C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • C:\Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • C:\Users\Admin\AppData\Roaming\kellyllerpru658.exe

      Filesize

      418KB

      MD5

      64756e8f5c253a58f8fc8e95a708f647

      SHA1

      7e28c11a713061bcad93b8faf2e238a552668bee

      SHA256

      59181328ea5b20dbebffa92c11f3ffa3616cdc8529ae91c3794186055867c6e3

      SHA512

      ae977d3ee77ad647f8ddd28bbf05c88c94afd07c188564065905618d4d74c3696c237e969bda2a0b1b5b1cf05744a914515b6bf7cb9d8ced55913ee7c5f742b0

    • C:\Users\Admin\AppData\Roaming\kellyllerpru658.exe

      Filesize

      418KB

      MD5

      64756e8f5c253a58f8fc8e95a708f647

      SHA1

      7e28c11a713061bcad93b8faf2e238a552668bee

      SHA256

      59181328ea5b20dbebffa92c11f3ffa3616cdc8529ae91c3794186055867c6e3

      SHA512

      ae977d3ee77ad647f8ddd28bbf05c88c94afd07c188564065905618d4d74c3696c237e969bda2a0b1b5b1cf05744a914515b6bf7cb9d8ced55913ee7c5f742b0

    • \Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • \Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • \Users\Admin\AppData\Local\Temp\lpubwzrt.exe

      Filesize

      100KB

      MD5

      7e0a3613230aaf331bc7afc9e46ba7c1

      SHA1

      d364d6b1cad9f4bef2518ed78ab66c55c411bcc4

      SHA256

      83f1f7e25cd82d66a8dfcb1a427f61d4c8d856300fc2df248d70d0dab560bfd9

      SHA512

      06b9e5bbf8194cccfa80c71682746f8f1af4e76457713e3a86e6b650266e1f8f5378affde3618c9d3fa087bffbbcf872e5c03cad2b4a222c402c1e4faa962f2d

    • \Users\Admin\AppData\Roaming\kellyllerpru658.exe

      Filesize

      418KB

      MD5

      64756e8f5c253a58f8fc8e95a708f647

      SHA1

      7e28c11a713061bcad93b8faf2e238a552668bee

      SHA256

      59181328ea5b20dbebffa92c11f3ffa3616cdc8529ae91c3794186055867c6e3

      SHA512

      ae977d3ee77ad647f8ddd28bbf05c88c94afd07c188564065905618d4d74c3696c237e969bda2a0b1b5b1cf05744a914515b6bf7cb9d8ced55913ee7c5f742b0

    • memory/1008-57-0x0000000075C51000-0x0000000075C53000-memory.dmp

      Filesize

      8KB

    • memory/1008-58-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/1008-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1008-55-0x000000006FE71000-0x000000006FE73000-memory.dmp

      Filesize

      8KB

    • memory/1008-54-0x00000000723F1000-0x00000000723F4000-memory.dmp

      Filesize

      12KB

    • memory/1008-78-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/1068-67-0x0000000000000000-mapping.dmp

    • memory/1228-79-0x0000000000000000-mapping.dmp

    • memory/1228-80-0x000007FEFB901000-0x000007FEFB903000-memory.dmp

      Filesize

      8KB

    • memory/1548-61-0x0000000000000000-mapping.dmp

    • memory/1748-74-0x00000000004139DE-mapping.dmp

    • memory/1748-77-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/1748-81-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB