Analysis

  • max time kernel
    116s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2023 06:20

General

  • Target

    e3ba2aad-07d0-422b-a318-cdfe2784e3bc.docx

  • Size

    10KB

  • MD5

    d49730cd5ca9b74c501f728e7252ad00

  • SHA1

    7805590ffd6fe168accb4d67f12ffc9256f18455

  • SHA256

    b32a53d373444d380506d91ba97b42a82d3f5dc787352589eaab58ecac8175f5

  • SHA512

    1075ae933b928a1b6b94a7e60024d46565374fd846f8022cef1b2b1a452ad7cccbea4ef28311d49b8a239012cacc758515dea825ee5cba0b27f100271610975d

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOUAIl+CVWBXJC0c37G:SPXU/slT+LO2HkZC9q

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.60/shen/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e3ba2aad-07d0-422b-a318-cdfe2784e3bc.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1228
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:876

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1296C9B0-C11A-454E-8A9C-39E390A627A2}.FSD
      Filesize

      128KB

      MD5

      5fe360b865dea902df075ebd0131be7a

      SHA1

      988ecfd1cfe41a84f6637fdfa0d0771a539f6630

      SHA256

      f91501e13035cf9af94439a3182d918f5873f00103848b18a6bab5261666f3e6

      SHA512

      aa1a8ae2f0d96081d2398321c5c69be9082f1dabf00c7a6509f89c33b715fcac6e1545e66312bfa869dcde04b349ad9bcaef3e757f0eed5414636cc2ae435f6a

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      15d9cbcc9b213c7a563da808a9b55c9b

      SHA1

      7c85be964e6390d8854d3f054e47fcae1e7de5d9

      SHA256

      c2476da2ba639b18a346fc73418153dd69eb6fbb0518b8364ce5ca1a1c68f547

      SHA512

      645ba885fec330f1457f5201706db3122f589c2dd458e9b6d3a145f93acef7a157748ba5688dd01d5f1653df9eefed9a1640746a89320dc1105b2310472b7fa9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{103F32F6-CDA4-4792-93AC-5DC683075DC8}.FSD
      Filesize

      128KB

      MD5

      73d5b5a3ad768fa8c9fc4e06ba2f7b63

      SHA1

      689b508cba450fcd144468b71b86f61905fcac2d

      SHA256

      243eab73ef464b9c053dd0243a60c923990fca19412cb0f8a7ac933fe9c44c8d

      SHA512

      2ff49b664a9b3db0e12ff33e8f0e033926e8b370868ac605de168556fa449f5b80bb57344d4265536b486ab6ae44dc895fa4ccfa9845c32fda505a74170b587d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\ru[1].doc
      Filesize

      15KB

      MD5

      7d4a02f8a8fcbb6348d5b3f687948a6d

      SHA1

      a5cc2e326f6c5ddeaf79d5e3ea8c791f9de9286a

      SHA256

      97ceffc6a9462c025e344a0b709c3470ff551a914cce1ed209e4ddd63b734182

      SHA512

      720d976288a2030244e17f90be2daa1f8bb0c87271d85f6eac890fa780b832ec6b7bfaf6615672e29531f65cc367d13766b2301a77761af9c792b8edffbc7d32

    • C:\Users\Admin\AppData\Local\Temp\{73A301CC-5835-4301-81AB-11D63C6A0F36}
      Filesize

      128KB

      MD5

      e338fddeac26f8f3f05018870760fd9b

      SHA1

      b8e23e846ff08b6aa480558b43c947317fe83465

      SHA256

      4c3aa35600d4f7954a642f36c1e422b1b989edeb52a1039309dbde11405f5b35

      SHA512

      1bf6ddaed93c1d6c69e72615069063dc1cd8d8ea369b00d60b5afccfde7cfcfaf314b2a007b33344402289989fa5eecb764c62af0503f67ff286558b670fc6d6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      90B

      MD5

      7cf62ebf45ccf0fd53250f60606bbd48

      SHA1

      ea3057721196230090353e1161bebfc1c4744f42

      SHA256

      cd83da0719967014f64f03cdc3a1756fbc65f4803943945f4c3351b27f7e6131

      SHA512

      304721b2b20cf3fc1c9f8372d0028541aa161e555a08bc1d71cf25e0093f104d84d7f64cfa5763563875fdff7d14e56bb7afd2c476888d3a38da848a544b2b2c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      fe8b67b75d82d368370a1d5cfb5e9235

      SHA1

      20927f3cfd4ab909dcf3ca9035abf181c9150520

      SHA256

      11c9d1bae27cbf7037edb4567cf1c2d46212cb73c21c1f5c82dbd6de27cedc77

      SHA512

      bf8868a04433554cd1a38a50574300e9367fb232d80e58e8ab58c3d9b249b1a36bb23201037e2dff6e0c3f2dd0a81699fe98bcd21ddae0e3df4ed48c41af233e

    • C:\Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • C:\Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • C:\Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • \Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • \Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • \Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • \Users\Public\vbc.exe
      Filesize

      309KB

      MD5

      10719af09de2df1eab59c94c0123bc97

      SHA1

      b3346d4a8346187092513157e3a7b23ace097e26

      SHA256

      1ff892055edd4d11fc6eba41d01583668b1676a69efbb67c246e2997eee58d3f

      SHA512

      2bd5de31435f16e8e804a0a5b5334fe48a1a0159c7fadada05643f6995617078a24a49247578c0b9057e0581ea1ba397d11a2f5a49bba825dc5e4bb35eb8d3e9

    • memory/876-151-0x00000000002A0000-0x00000000002BB000-memory.dmp
      Filesize

      108KB

    • memory/876-159-0x0000000000400000-0x0000000002BBB000-memory.dmp
      Filesize

      39.7MB

    • memory/972-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/972-190-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB