Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2023 12:49

General

  • Target

    cdcbca7a700fdee5246a10aef03525b7.exe

  • Size

    147KB

  • MD5

    cdcbca7a700fdee5246a10aef03525b7

  • SHA1

    61a7fcf2d4a51cd208e07394f36aa67a3efe25d6

  • SHA256

    8f8be2570869e7162851b8460f71be93035fd241900cfedda66771ce7c4d26ca

  • SHA512

    fbe47c44b921e197d367076d6ed41d37a9055043c50993586a9ce84602506b1b6de4b67eb4736fb173cc085e1f87560bfed98ffdb1d2b503d91d49c3a606c431

  • SSDEEP

    3072:3fY/TU9fE9PEtuwbkFgPUq8k6IKJ8qzlIsQCWZO8jgrxf3dw1fIkygtLOv7Xf7y:vYa6sCk6JPBIZkv3Cwk0v7Xfm

Malware Config

Extracted

Family

lokibot

C2

https://sempersim.su/ha1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdcbca7a700fdee5246a10aef03525b7.exe
    "C:\Users\Admin\AppData\Local\Temp\cdcbca7a700fdee5246a10aef03525b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe
      "C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe" C:\Users\Admin\AppData\Local\Temp\vbnijzypt.uez
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe
        "C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vbnijzypt.uez

    Filesize

    5KB

    MD5

    8b0cb9d49809b5b4318997f8494940cb

    SHA1

    ce77c8ef018473bed677b254373bbcc73528e315

    SHA256

    29884b06dfd13e0c1b6583afb5d21836c21f17754e429f688cd3e921ba390f77

    SHA512

    b4684260dd66c1f4faff4e17fc97048db6fff7c86e24bf3a59d0cae8f9aa6e960bd10d80936469b56f79b4fd64e662ab31270d36082071df32eae77fd407d6bc

  • C:\Users\Admin\AppData\Local\Temp\vhlqnazkhjf.fin

    Filesize

    124KB

    MD5

    83edc48401cb3662f06772f5ddac1da9

    SHA1

    7f9981273ac6f2cd4cb706c58b209105b4c43ff6

    SHA256

    d482cf391166f99c891a733601c195c703dddce927ae70b94712fb9cb651f05f

    SHA512

    93ce16a5210dc5420e3d56272f51898113b4c537939ef94cb064e4988d995d8ae162f7cda114463b0b528ba6105ad38d34e67336d12358c043bd4aeb4b16659a

  • C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe

    Filesize

    5KB

    MD5

    7f0aa64ba60fe88dafa4f5c431f19fa9

    SHA1

    336b5e9c23bdca072d514825cc80350ffd9e4250

    SHA256

    6f79b33f5d6b7239c252e3bc2ca6c7287af8c59dea3dc225c38b70b0d741a36f

    SHA512

    583d573b2cbfb5a508f21cb2706b0ed2961bf07d22ae9fef765ffc0352d60fa1a77708837f54dfd19a81698f90adc9bae23a39b6aed9666e2e27b9e8804e642b

  • C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe

    Filesize

    5KB

    MD5

    7f0aa64ba60fe88dafa4f5c431f19fa9

    SHA1

    336b5e9c23bdca072d514825cc80350ffd9e4250

    SHA256

    6f79b33f5d6b7239c252e3bc2ca6c7287af8c59dea3dc225c38b70b0d741a36f

    SHA512

    583d573b2cbfb5a508f21cb2706b0ed2961bf07d22ae9fef765ffc0352d60fa1a77708837f54dfd19a81698f90adc9bae23a39b6aed9666e2e27b9e8804e642b

  • C:\Users\Admin\AppData\Local\Temp\zzohyznaoe.exe

    Filesize

    5KB

    MD5

    7f0aa64ba60fe88dafa4f5c431f19fa9

    SHA1

    336b5e9c23bdca072d514825cc80350ffd9e4250

    SHA256

    6f79b33f5d6b7239c252e3bc2ca6c7287af8c59dea3dc225c38b70b0d741a36f

    SHA512

    583d573b2cbfb5a508f21cb2706b0ed2961bf07d22ae9fef765ffc0352d60fa1a77708837f54dfd19a81698f90adc9bae23a39b6aed9666e2e27b9e8804e642b

  • \Users\Admin\AppData\Local\Temp\zzohyznaoe.exe

    Filesize

    5KB

    MD5

    7f0aa64ba60fe88dafa4f5c431f19fa9

    SHA1

    336b5e9c23bdca072d514825cc80350ffd9e4250

    SHA256

    6f79b33f5d6b7239c252e3bc2ca6c7287af8c59dea3dc225c38b70b0d741a36f

    SHA512

    583d573b2cbfb5a508f21cb2706b0ed2961bf07d22ae9fef765ffc0352d60fa1a77708837f54dfd19a81698f90adc9bae23a39b6aed9666e2e27b9e8804e642b

  • \Users\Admin\AppData\Local\Temp\zzohyznaoe.exe

    Filesize

    5KB

    MD5

    7f0aa64ba60fe88dafa4f5c431f19fa9

    SHA1

    336b5e9c23bdca072d514825cc80350ffd9e4250

    SHA256

    6f79b33f5d6b7239c252e3bc2ca6c7287af8c59dea3dc225c38b70b0d741a36f

    SHA512

    583d573b2cbfb5a508f21cb2706b0ed2961bf07d22ae9fef765ffc0352d60fa1a77708837f54dfd19a81698f90adc9bae23a39b6aed9666e2e27b9e8804e642b

  • memory/1092-62-0x00000000004139DE-mapping.dmp

  • memory/1092-65-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1092-66-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1628-56-0x0000000000000000-mapping.dmp

  • memory/2008-54-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB