Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 23:13

General

  • Target

    8c1dc01d0de2df096d444514ea7d154c_JaffaCakes118.exe

  • Size

    447KB

  • MD5

    8c1dc01d0de2df096d444514ea7d154c

  • SHA1

    d17ff796027a4443c864ba21ce2a8db7a1760c7f

  • SHA256

    58b0af868786683e720d7801e320d1003672209101d34fcaea87b0f4c0711ee5

  • SHA512

    41837ac14fb14220facfaeaf351e3af69ee98f2897e16e32933eca229c492413c421b5e3c723862b36fe47e59663d5853b4f0524eaa1e4ef21b474ff592323f3

  • SSDEEP

    12288:5I6YiFZWdaP6oNt5vb/OI7UMJa482LNmRY:5Ch0PFD5D/t7UgL8agY

Malware Config

Extracted

Family

lokibot

C2

http://frankjoe.uzocoms.eu/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c1dc01d0de2df096d444514ea7d154c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c1dc01d0de2df096d444514ea7d154c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\8c1dc01d0de2df096d444514ea7d154c_JaffaCakes118.exe" "C:\Users\Admin\Desktop\project5792.exe"
      2⤵
        PID:4184
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Desktop\project5792.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Users\Admin\Desktop\project5792.exe
          "C:\Users\Admin\Desktop\project5792.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Users\Admin\Desktop\project5792.exe
            "C:\Users\Admin\Desktop\project5792.exe"
            4⤵
            • Executes dropped EXE
            PID:2132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\project5792.exe

      Filesize

      447KB

      MD5

      8c1dc01d0de2df096d444514ea7d154c

      SHA1

      d17ff796027a4443c864ba21ce2a8db7a1760c7f

      SHA256

      58b0af868786683e720d7801e320d1003672209101d34fcaea87b0f4c0711ee5

      SHA512

      41837ac14fb14220facfaeaf351e3af69ee98f2897e16e32933eca229c492413c421b5e3c723862b36fe47e59663d5853b4f0524eaa1e4ef21b474ff592323f3

    • memory/1248-27-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/1248-21-0x0000000008D40000-0x0000000008DDC000-memory.dmp

      Filesize

      624KB

    • memory/1248-20-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/1248-19-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/1248-18-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/1248-17-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2132-24-0x0000000000510000-0x00000000005B2000-memory.dmp

      Filesize

      648KB

    • memory/2748-4-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2748-11-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2748-13-0x0000000074E30000-0x00000000755E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2748-10-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

      Filesize

      4KB

    • memory/2748-7-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

      Filesize

      40KB

    • memory/2748-6-0x00000000076D0000-0x00000000076EE000-memory.dmp

      Filesize

      120KB

    • memory/2748-5-0x0000000007760000-0x00000000077F2000-memory.dmp

      Filesize

      584KB

    • memory/2748-0-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

      Filesize

      4KB

    • memory/2748-3-0x0000000007C30000-0x00000000081D4000-memory.dmp

      Filesize

      5.6MB

    • memory/2748-2-0x00000000050F0000-0x0000000005144000-memory.dmp

      Filesize

      336KB

    • memory/2748-1-0x00000000008C0000-0x0000000000938000-memory.dmp

      Filesize

      480KB