Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2023 02:28

General

  • Target

    SecuriteInfo.com.Exploit.MathType-Obfs.Gen.382.16964.xls

  • Size

    185KB

  • MD5

    4c47656c02c88cdec7e454b7566750a3

  • SHA1

    efc679a688d27742226754433c026fa9c6a59b12

  • SHA256

    64629388f660c5b68375082dfbd9aedb1fd86c7aed1db141a6102bbf5d6f8188

  • SHA512

    774f9b4c9176d618c6e95c71ace7c4412e1afb63f4970f0416ed135bacbb6a346f14b28a9d2155854b0db0aaaafac5c8aa7104a8a6da25bdae820c67ecff092c

  • SSDEEP

    3072:Ft9hc1Ut9hcu/fZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAiv8FsutHrnvZA9AOUde:Lc1+cunZ+RwPONXoRjDhIcp0fDlavx+5

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.MathType-Obfs.Gen.382.16964.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:840
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe
        "C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe" C:\Users\Admin\AppData\Local\Temp\szhfj.sve
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe
          "C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ddpbbsajx.ox

    Filesize

    124KB

    MD5

    54f7dc72d1271859d49d7764b084c028

    SHA1

    33a593b9552bd636a55563c73de0b0c099c3ad52

    SHA256

    77bf13b3fa2d37dfc38f3701cca182057f5e2bb8e67c6b81bfd5cbbe9d172028

    SHA512

    728e7583169b652148fbb5f7e1076a972083fd46120fabff34f7ba1738f1fbf047fad6649d6c8199cbd566e088e524517fb448916be1ab8b6309c4bc1ced425d

  • C:\Users\Admin\AppData\Local\Temp\szhfj.sve

    Filesize

    6KB

    MD5

    94109f9a4fdc153d8b5827e485aafcc6

    SHA1

    362c33bb4ae14c3db9681facf12dc6b69fc6ba38

    SHA256

    44452e05f13e4779b3b24477bfbb83ad0ea1154b6b62c353aaf4c036211f2926

    SHA512

    4d6baed5627a00a3f41157104d66812b646d687ff43527ce72b2899e0df96637b71c6817e31c2dc2c6b55b729293b8e116cc85b587e22858646f2099413697f8

  • C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • C:\Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • C:\Users\Public\vbc.exe

    Filesize

    366KB

    MD5

    f40f44f01175541ccf44f0c9064487b4

    SHA1

    6d80e10fe597301fbfcbad33822db6a5a018a4e9

    SHA256

    3d099ea41ca7b6d89c4a5f50abc43e65310c0f306bd18ec4915e1acf193d2117

    SHA512

    2dade5e729c35888ec9f921a515bdaba935e27090a3acfc137369414d9d3982fa33f87faea258405b91d134f47b04ecac010f7ca1fb61aeadda45d88a33de3ca

  • C:\Users\Public\vbc.exe

    Filesize

    366KB

    MD5

    f40f44f01175541ccf44f0c9064487b4

    SHA1

    6d80e10fe597301fbfcbad33822db6a5a018a4e9

    SHA256

    3d099ea41ca7b6d89c4a5f50abc43e65310c0f306bd18ec4915e1acf193d2117

    SHA512

    2dade5e729c35888ec9f921a515bdaba935e27090a3acfc137369414d9d3982fa33f87faea258405b91d134f47b04ecac010f7ca1fb61aeadda45d88a33de3ca

  • \Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • \Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • \Users\Admin\AppData\Local\Temp\uzekiwur.exe

    Filesize

    46KB

    MD5

    97988da1696d406e8b6eda6add5c1275

    SHA1

    a75d89724e46ac0eb5a2759cc02f23e9663cdf7b

    SHA256

    fb3bac859776a4d20d5f9939553acbe3518b4569a85a021bd1726005696a7188

    SHA512

    a4871053437263ea26fabe20b03b3fafaa128af8e0bf88ffcc7e242936857af5c5c251aacfb6630551bb1e1a79853b32562a7e8e24086f6ad0deb6a3375c56bc

  • \Users\Public\vbc.exe

    Filesize

    366KB

    MD5

    f40f44f01175541ccf44f0c9064487b4

    SHA1

    6d80e10fe597301fbfcbad33822db6a5a018a4e9

    SHA256

    3d099ea41ca7b6d89c4a5f50abc43e65310c0f306bd18ec4915e1acf193d2117

    SHA512

    2dade5e729c35888ec9f921a515bdaba935e27090a3acfc137369414d9d3982fa33f87faea258405b91d134f47b04ecac010f7ca1fb61aeadda45d88a33de3ca

  • memory/840-57-0x0000000075A91000-0x0000000075A93000-memory.dmp

    Filesize

    8KB

  • memory/840-58-0x0000000071DBD000-0x0000000071DC8000-memory.dmp

    Filesize

    44KB

  • memory/840-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/840-55-0x0000000070DD1000-0x0000000070DD3000-memory.dmp

    Filesize

    8KB

  • memory/840-54-0x000000002F671000-0x000000002F674000-memory.dmp

    Filesize

    12KB

  • memory/840-78-0x0000000071DBD000-0x0000000071DC8000-memory.dmp

    Filesize

    44KB

  • memory/840-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/840-81-0x0000000071DBD000-0x0000000071DC8000-memory.dmp

    Filesize

    44KB

  • memory/1332-61-0x0000000000000000-mapping.dmp

  • memory/1532-67-0x0000000000000000-mapping.dmp

  • memory/1660-74-0x00000000004139DE-mapping.dmp

  • memory/1660-77-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1660-79-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB