Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2023 09:51

General

  • Target

    PO19-003219.docx

  • Size

    10KB

  • MD5

    9d29fe2f2a17ed895175dd589f28179c

  • SHA1

    fca9f01cb1f2671731316052c4f681b22a8b458e

  • SHA256

    cde127d66368c03e3e6b564eb4b28ad03314ad956d4f8e4eda1b5d9f35910674

  • SHA512

    2acc073048ce529eca1853c6b9e9602787ac6cc9034c7cd7e2256fd837ee2d0c14d7e7b6840b41a805b26ba35c7a8f4018075a21afb2f80a8c9100112da8d345

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTOBnT8namWBX8ex6y3vkLN:SPXt4ATOVT8nosM85

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO19-003219.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1612
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Users\Admin\AppData\Local\Temp\griomhv.exe
          "C:\Users\Admin\AppData\Local\Temp\griomhv.exe" C:\Users\Admin\AppData\Local\Temp\ocezwxbaws.tnb
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Users\Admin\AppData\Local\Temp\griomhv.exe
            "C:\Users\Admin\AppData\Local\Temp\griomhv.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:848

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • C:\Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • C:\Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • C:\Users\Admin\AppData\Local\Temp\ocezwxbaws.tnb
      Filesize

      5KB

      MD5

      736c032772b93b60ae1e2067052cadb1

      SHA1

      a7e78bc73ce87b809a3d37653f1922720b183114

      SHA256

      d4ee48c3fafdea592df4f1de273497e2a15e0a86fa45d5608f61f6d764049ccd

      SHA512

      ba175ed6e56513877d0ba31e38e351927319d5db57ddaeb52b960b55660cf6414af5b1c19cf059eb3048b0e080f3b0bdb8abedd61c96a02552d5980f326d4b38

    • C:\Users\Admin\AppData\Local\Temp\ulamxtxdx.dn
      Filesize

      124KB

      MD5

      22286bcaafac73cc45e5d1cf19945c42

      SHA1

      b6b687b63da60b27a08547ab631b98496e00319f

      SHA256

      6b0abe65ad494fd2a39e1ed8799e60a45e3ebeb72136adca4eeeb575ec897c1e

      SHA512

      c16ff1af55bbde8bd07c7d252595c7778fe97284d9927ea5b441e4aef4e31df3f23187c501f22d8a294bbe21422a1715363b026eb41fff7a1a5b3d67f0412f7c

    • C:\Users\Public\vbc.exe
      Filesize

      354KB

      MD5

      58dbd12561b26a53ecf30b37a0c4060d

      SHA1

      3e1c7d108c4d672b2bf226727485a163a8fa70a9

      SHA256

      adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

      SHA512

      d83112639e95ea70a98dadb4d6875536380c45baec9d6b4dd00dd0b7d9dee8a1e68611fdd43820d5f0cca9591a47a2e5fa7d0f56e5b4d80d286f37e0d311d92d

    • C:\Users\Public\vbc.exe
      Filesize

      354KB

      MD5

      58dbd12561b26a53ecf30b37a0c4060d

      SHA1

      3e1c7d108c4d672b2bf226727485a163a8fa70a9

      SHA256

      adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

      SHA512

      d83112639e95ea70a98dadb4d6875536380c45baec9d6b4dd00dd0b7d9dee8a1e68611fdd43820d5f0cca9591a47a2e5fa7d0f56e5b4d80d286f37e0d311d92d

    • \Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • \Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • \Users\Admin\AppData\Local\Temp\griomhv.exe
      Filesize

      50KB

      MD5

      1e615c9c0c88c482c37312c4d4dd21ad

      SHA1

      d39ff54b50c39a65aab93ba6c2f0973352acc17c

      SHA256

      f95916898fe7344320b8b8e48ed7a02ec4b4093772be338da5dd3d4ba4326397

      SHA512

      c179195f66f889fd9467deffb10d4cc32e12c3d121079a173d991549bb43cce096892c13892cf25be4e0c0c1545c1d0f3d2eabdaeb38ed5bec9664b363236496

    • \Users\Public\vbc.exe
      Filesize

      354KB

      MD5

      58dbd12561b26a53ecf30b37a0c4060d

      SHA1

      3e1c7d108c4d672b2bf226727485a163a8fa70a9

      SHA256

      adc6a50e5985c31f0ed5ea885edd73e787f893f709591e5cf795fd78403d1430

      SHA512

      d83112639e95ea70a98dadb4d6875536380c45baec9d6b4dd00dd0b7d9dee8a1e68611fdd43820d5f0cca9591a47a2e5fa7d0f56e5b4d80d286f37e0d311d92d

    • memory/316-68-0x0000000000000000-mapping.dmp
    • memory/848-81-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/848-80-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/848-77-0x00000000004139DE-mapping.dmp
    • memory/900-54-0x0000000072A71000-0x0000000072A74000-memory.dmp
      Filesize

      12KB

    • memory/900-58-0x00000000714DD000-0x00000000714E8000-memory.dmp
      Filesize

      44KB

    • memory/900-57-0x0000000075E11000-0x0000000075E13000-memory.dmp
      Filesize

      8KB

    • memory/900-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/900-55-0x00000000704F1000-0x00000000704F3000-memory.dmp
      Filesize

      8KB

    • memory/900-59-0x00000000714DD000-0x00000000714E8000-memory.dmp
      Filesize

      44KB

    • memory/900-82-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/900-83-0x00000000714DD000-0x00000000714E8000-memory.dmp
      Filesize

      44KB

    • memory/1612-72-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp
      Filesize

      8KB

    • memory/1612-71-0x0000000000000000-mapping.dmp
    • memory/1852-62-0x0000000000000000-mapping.dmp