Analysis

  • max time kernel
    134s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 18:59

General

  • Target

    767fad8469801daac50f5365709e0149_JaffaCakes118.msi

  • Size

    532KB

  • MD5

    767fad8469801daac50f5365709e0149

  • SHA1

    61644800d1d9e46a2cd0e628bed9fd68f62428e0

  • SHA256

    744efffd117bb492d7707a2d16ae3e16dc65ea52b475c4b1f8d993f66f89f08c

  • SHA512

    554bd5dcd661e60a07a60deb116032eaa1b041ca1ba00b27bb9136b986cac8e7c80d456f75b789458f98bccb671a521b636901e192ca561bfaefa4eccf24ff18

  • SSDEEP

    6144:lEBrHvFzum8tLMmbRLHMTg2N6lpiKYeWPo+X84xLy57:lEjItLMMJMqlpHp4

Malware Config

Extracted

Family

lokibot

C2

http://deloilte.com/wp-content/uploads/2018/09/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\767fad8469801daac50f5365709e0149_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4300
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4340
    • C:\Windows\Installer\MSI808B.tmp
      "C:\Windows\Installer\MSI808B.tmp"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\Installer\MSI808B.tmp
        "C:\Windows\Installer\MSI808B.tmp"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1228
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e577f35.rbs

    Filesize

    663B

    MD5

    7ae877ba783a093b18bfe0c6495bbb07

    SHA1

    a5f030f35b1c21d4496d131bda471172bb38d94f

    SHA256

    5f92bb04f7ecf1e9f3508d7fcb68b58529e705cfd2937b40a963c770eba25ecf

    SHA512

    27582de5f6d1ab802a0e94f45dd73a2d7147b859807bbdfa2ee51a039d28bbcb91df65737f2f9f5c33b0d043e54ac661d83aebcfd8928b887b14a07b22c8ff26

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1337824034-2731376981-3755436523-1000\0f5007522459c86e95ffcc62f32308f1_6833eb7b-8d4b-4cdd-9502-9bbf7fc1cf9f

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1337824034-2731376981-3755436523-1000\0f5007522459c86e95ffcc62f32308f1_6833eb7b-8d4b-4cdd-9502-9bbf7fc1cf9f

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Windows\Installer\MSI808B.tmp

    Filesize

    506KB

    MD5

    2df75541ff9e3eb52266ee7509bd70af

    SHA1

    16a06f82099aa3fc05964079c1612073ac2ae850

    SHA256

    772b0895b96f9060a733a9d989b34f0e9b66157910403d47cbeef1efe446d773

    SHA512

    90efc8b6b2bdb8ad08645f3f1faa1ef4482fb65d173ff4729e14fe1a646604c231ace1a3758a95922c2420fcbbc9412ccf662088d1ccc434823b1b395ea798bc

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    59837785fde896dec59eac3f506deaf5

    SHA1

    9585097f8c24d1ac5d18629ae2d03676e79b7b4e

    SHA256

    c7d48c7f37ade215e5015bfea72c202f5d229a3b20e1690103a0346333bb0a94

    SHA512

    b903ab6930aa26461a96a36ad7d62fbf94cc0f77306543515d6a5d656985de42552c47f85a0463c4462f8dc56d3184604c0c0fbb19ad59c186c7dea0d8d838d7

  • \??\Volume{8a2a71c9-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{fc004821-403d-43d2-a744-d056c8f369d2}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    18afa267ad07f227bfe21e1365bf09d8

    SHA1

    14a249f9b240c344a1a7a268052012930165c7c9

    SHA256

    f52a50e7e84ddd79b4a5b77fb8dd996dee2ec9d530f6af6391dc19518192dfaa

    SHA512

    461937d5c03844b3ae516cd855042d1292e20909b052789a43d499d21f618319cc49bd668b6444d9bcf18e6383e24f2eabe9683ad3e913b9f5011eeb2e6ed6cc

  • memory/1228-22-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1228-19-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3804-18-0x0000000006090000-0x000000000612C000-memory.dmp

    Filesize

    624KB

  • memory/3804-15-0x0000000005230000-0x0000000005250000-memory.dmp

    Filesize

    128KB

  • memory/3804-14-0x0000000005290000-0x0000000005322000-memory.dmp

    Filesize

    584KB

  • memory/3804-13-0x0000000005840000-0x0000000005DE4000-memory.dmp

    Filesize

    5.6MB

  • memory/3804-12-0x0000000000920000-0x00000000009A4000-memory.dmp

    Filesize

    528KB