Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 16:14

General

  • Target

    8798c003342136f21a6072fbaed735fd_JaffaCakes118.exe

  • Size

    367KB

  • MD5

    8798c003342136f21a6072fbaed735fd

  • SHA1

    f98d07c31a80cbb95c1ce910260c503784c8decd

  • SHA256

    556e557fa19e6fb73aa86c853cb4028f624f063d7876fb3d4e1f852bd8feb6da

  • SHA512

    4cb9748519cf68d6c556e83988f85ed47dabf3b6fc48e11ca8cc4a48b93050c358372e54bc77479dd4b58f14d344863d68ce5b92db563bf423666746913616f3

  • SSDEEP

    6144:F8PDjxZuyhDf81zUuGutRJzSLipkxBQAqTzLVJRHesE:F2DayhD4zBGutfSepkxPqvJHhE

Malware Config

Extracted

Family

lokibot

C2

http://apacino-wire.ga/parkson/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8798c003342136f21a6072fbaed735fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8798c003342136f21a6072fbaed735fd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5i2o5cft\5i2o5cft.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1865.tmp" "c:\Users\Admin\AppData\Local\Temp\5i2o5cft\CSCBBDDAA2C96834574B1E7ADFEFF7D7F5F.TMP"
        3⤵
          PID:3488
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:3660
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5000

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5i2o5cft\5i2o5cft.dll

        Filesize

        20KB

        MD5

        b18e5dbad8025326a3cd9653b00e5088

        SHA1

        e1e43ff0d7456cd6e0d43193d650417be9a73046

        SHA256

        8aa13c42ff9b9f9ad19028ed086cbbbc52a6b2c249e2825dbf6fbc5cb2ee5c26

        SHA512

        287ba43d5fec7b025cef89906174ef09a4f40c91f0add6d6a343532dd09aa757fd9991b2637d6e6c39acc65cf31fb6fa44c24f6382b3cb53ee9d39c4f0b9e85c

      • C:\Users\Admin\AppData\Local\Temp\5i2o5cft\5i2o5cft.pdb

        Filesize

        65KB

        MD5

        748ed45d038f3c3fbe1eb92e56cc59d3

        SHA1

        e4c2e81796e9cd8232cfd2d9f3a3364c79335915

        SHA256

        3a81dd8169387e5248441376e13fcfdf33dbf0a3f6048c1c84730b6f5f0af2d9

        SHA512

        7986faea613574948c7e7db8f51f3a63e35553273546d01807e4eda40281bf81c822ed40f99e8b2250e158d57dafc2ec9576c90aee659a224203ca9bbe94d092

      • C:\Users\Admin\AppData\Local\Temp\RES1865.tmp

        Filesize

        1KB

        MD5

        73530d63bf8513410daea9d3af64b8cc

        SHA1

        168e15335eaf538fca591491f09a7831bbcdc6a2

        SHA256

        be49bd15b2d2583acf429d714544d54e75eeaeebc48567708bd8fcb96ac7d82a

        SHA512

        6c3ce9c859d418944dbcccc60c3601d62930bedc62b75a96295103e3b7b2989f9fd106662ba8ee961f0c302a6f2d7a49653719d7239833be210170d558a667cb

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\0f5007522459c86e95ffcc62f32308f1_2397ee06-28fe-4eaa-8777-f7014368c353

        Filesize

        46B

        MD5

        d898504a722bff1524134c6ab6a5eaa5

        SHA1

        e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

        SHA256

        878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

        SHA512

        26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

      • \??\c:\Users\Admin\AppData\Local\Temp\5i2o5cft\5i2o5cft.0.cs

        Filesize

        46KB

        MD5

        5d7ba3d8a6c2161a368ef016c8c64148

        SHA1

        81f0f2a63aa6599a7257566781773a377c7cf5b8

        SHA256

        962c0f0e86d1922298814f7ed3b9f2d1d3fd527b9c60c2671e22086ce45b2c2f

        SHA512

        a6475172785a7114cd4ba88b8cd31e6be937915d70959e5d23eb32e8d41fe2357ef20d51ed7d3a1d70c8833e4c15859b527af51a68c69b858b8d6dcde4162c53

      • \??\c:\Users\Admin\AppData\Local\Temp\5i2o5cft\5i2o5cft.cmdline

        Filesize

        312B

        MD5

        e3620b901436eb3231f4e43ded7bc547

        SHA1

        cefd10cd5b3fad0b3a7a6847dd3c74eadb9bad30

        SHA256

        4b1dcc18a2c5de8a32891ceb87b5b78aacb14ebbae58847421981b953d0f9adb

        SHA512

        a000c13e51a354025ea11d320760aebde4819c0eb588b2f1d882be2c5ca95f8a1acee695338697a5999e918d5eac802302c13e595b7f47d609aabfef4e5476da

      • \??\c:\Users\Admin\AppData\Local\Temp\5i2o5cft\CSCBBDDAA2C96834574B1E7ADFEFF7D7F5F.TMP

        Filesize

        1KB

        MD5

        95fa4f3dccf2037788d9037192518bb7

        SHA1

        35d9aed94381ddaf579d6bdf952cea5f392cd4a0

        SHA256

        abeb2c7c001933f151c393f4a31857e12721012349ee910b34fdaac22e4e981b

        SHA512

        f0ddf010b98fff9de68b11bb4cf9c662e634f535d90cf09a0310d60ddf4df9088a4d082d055f651be8bc7fc584d9ee1317922b2d3c7a0e7ce04641603cc26f09

      • memory/1588-19-0x0000000005600000-0x0000000005692000-memory.dmp

        Filesize

        584KB

      • memory/1588-23-0x0000000005CC0000-0x0000000005D5C000-memory.dmp

        Filesize

        624KB

      • memory/1588-17-0x0000000001470000-0x000000000147C000-memory.dmp

        Filesize

        48KB

      • memory/1588-0-0x00000000744BE000-0x00000000744BF000-memory.dmp

        Filesize

        4KB

      • memory/1588-20-0x0000000005A20000-0x0000000005A4A000-memory.dmp

        Filesize

        168KB

      • memory/1588-21-0x00000000055F0000-0x00000000055FC000-memory.dmp

        Filesize

        48KB

      • memory/1588-22-0x0000000005A50000-0x0000000005AF2000-memory.dmp

        Filesize

        648KB

      • memory/1588-4-0x00000000744B0000-0x0000000074C60000-memory.dmp

        Filesize

        7.7MB

      • memory/1588-1-0x0000000000BB0000-0x0000000000C12000-memory.dmp

        Filesize

        392KB

      • memory/1588-29-0x00000000744B0000-0x0000000074C60000-memory.dmp

        Filesize

        7.7MB

      • memory/3660-28-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/3660-26-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/3660-24-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/3660-73-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB