Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2023 02:30

General

  • Target

    SOA #00776122.docx

  • Size

    11KB

  • MD5

    92c58afe23acd76e5f0ab0c8f0f0394e

  • SHA1

    319c1720352e2924c6630428b691ef8706731530

  • SHA256

    82f786b26b47b6e60bed7d7aacf0dc221c6ad426554fec30fab21d59549e949c

  • SHA512

    0b329608717007c410df29cf83d8b56f382e419499e8304ae5a91f5fc465a8399d932562f5e2d98fb863e78a3b20b4dda74e51665944823add61c5f2bcb8fb27

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBC0nVj:aNxUyn0i13LROEiOLkX6Ujnw+35Vj

Malware Config

Extracted

Family

lokibot

C2

http://208.67.105.148/sung/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SOA #00776122.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2044
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Public\vb.exe
        "C:\Users\Public\vb.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
          "C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe" C:\Users\Admin\AppData\Local\Temp\oftjgpiwbws.fkh
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1080
          • C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
            "C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1948

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\oftjgpiwbws.fkh
      Filesize

      5KB

      MD5

      7071418811056a8b9316df83d09bd45b

      SHA1

      bec9934a85d60e4b63337174eeda42325e64b357

      SHA256

      e66259a954b1a5da824edceff70fe92ab696a9b02235bd71fa7b03eefdc4510e

      SHA512

      c7e90b8d66daf8addace6961e38d796355339f9bf66379addea395f4766f1a534bcfeb018cf1af606eafc582095198a6062fa53b3acec7bd303bddb96039b7eb

    • C:\Users\Admin\AppData\Local\Temp\tupdbh.t
      Filesize

      124KB

      MD5

      386b4b27835117f5adfe8aa7fc64b8b8

      SHA1

      7abc537bd604a454749643f26d4b8bb9ccb60f09

      SHA256

      a1dc56a70c5ed09175ed50ed7b5a373bc99f85fa0cb9135f0129f41b81cd05c6

      SHA512

      03da267f65bd0ec66fec1a6ce11786c7fa50d26e15f4f18a4c896b970a8cff8014239d87246d0677322ebf10e0d30e97253853d9cc8c095216005af98c96574e

    • C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
      Filesize

      297KB

      MD5

      3c9d96268b12420a2e022e8827968e85

      SHA1

      7c507eaa473ec3b6fe35d6a2236d2efab99c4a7a

      SHA256

      5239fc89c8a2246a3a8972e76366bbb46d72e127b14d3250a0ca654aa272f185

      SHA512

      25e013bf42ffc836c7c8a3c0b85339c88e12b1c3b668dfa954673e7a9a32aae61152924f0660ff115a135b62c225c208dae49da116e114e2f04b9771deb95fc8

    • C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
      Filesize

      297KB

      MD5

      3c9d96268b12420a2e022e8827968e85

      SHA1

      7c507eaa473ec3b6fe35d6a2236d2efab99c4a7a

      SHA256

      5239fc89c8a2246a3a8972e76366bbb46d72e127b14d3250a0ca654aa272f185

      SHA512

      25e013bf42ffc836c7c8a3c0b85339c88e12b1c3b668dfa954673e7a9a32aae61152924f0660ff115a135b62c225c208dae49da116e114e2f04b9771deb95fc8

    • C:\Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
      Filesize

      297KB

      MD5

      3c9d96268b12420a2e022e8827968e85

      SHA1

      7c507eaa473ec3b6fe35d6a2236d2efab99c4a7a

      SHA256

      5239fc89c8a2246a3a8972e76366bbb46d72e127b14d3250a0ca654aa272f185

      SHA512

      25e013bf42ffc836c7c8a3c0b85339c88e12b1c3b668dfa954673e7a9a32aae61152924f0660ff115a135b62c225c208dae49da116e114e2f04b9771deb95fc8

    • C:\Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • C:\Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • \Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
      Filesize

      297KB

      MD5

      3c9d96268b12420a2e022e8827968e85

      SHA1

      7c507eaa473ec3b6fe35d6a2236d2efab99c4a7a

      SHA256

      5239fc89c8a2246a3a8972e76366bbb46d72e127b14d3250a0ca654aa272f185

      SHA512

      25e013bf42ffc836c7c8a3c0b85339c88e12b1c3b668dfa954673e7a9a32aae61152924f0660ff115a135b62c225c208dae49da116e114e2f04b9771deb95fc8

    • \Users\Admin\AppData\Local\Temp\xcxdwxkm.exe
      Filesize

      297KB

      MD5

      3c9d96268b12420a2e022e8827968e85

      SHA1

      7c507eaa473ec3b6fe35d6a2236d2efab99c4a7a

      SHA256

      5239fc89c8a2246a3a8972e76366bbb46d72e127b14d3250a0ca654aa272f185

      SHA512

      25e013bf42ffc836c7c8a3c0b85339c88e12b1c3b668dfa954673e7a9a32aae61152924f0660ff115a135b62c225c208dae49da116e114e2f04b9771deb95fc8

    • \Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • \Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • \Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • \Users\Public\vb.exe
      Filesize

      266KB

      MD5

      894ebe041d7580e494ed9c158ab59e47

      SHA1

      85a829f1ee7e1332887d490629d9e4b8156f1c31

      SHA256

      5ebdd970919074345053d4cd4d16f52efd564e9b73515c0688192cb37f325169

      SHA512

      9ddae11fb29d92ffcd0cad5f950d57b1f83ab8991d8a21d584608f2ad7c01134d50a9da629abe53b9ebbd65dfe4c209cf49e73b1660dcee716a13a89af9d60fe

    • memory/1080-69-0x0000000000000000-mapping.dmp
    • memory/1872-64-0x0000000000000000-mapping.dmp
    • memory/1900-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1900-57-0x0000000075A81000-0x0000000075A83000-memory.dmp
      Filesize

      8KB

    • memory/1900-58-0x0000000070F0D000-0x0000000070F18000-memory.dmp
      Filesize

      44KB

    • memory/1900-54-0x00000000724A1000-0x00000000724A4000-memory.dmp
      Filesize

      12KB

    • memory/1900-55-0x000000006FF21000-0x000000006FF23000-memory.dmp
      Filesize

      8KB

    • memory/1900-83-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1900-84-0x0000000070F0D000-0x0000000070F18000-memory.dmp
      Filesize

      44KB

    • memory/1948-76-0x00000000004139DE-mapping.dmp
    • memory/1948-81-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/1948-82-0x0000000000400000-0x00000000004A2000-memory.dmp
      Filesize

      648KB

    • memory/2044-79-0x0000000000000000-mapping.dmp
    • memory/2044-80-0x000007FEFB9B1000-0x000007FEFB9B3000-memory.dmp
      Filesize

      8KB