Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 21:45

General

  • Target

    ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe

  • Size

    309KB

  • MD5

    ab9b13bfe075715637b77b9ec4c70481

  • SHA1

    2573e9f9ea0b537f3108a4f9b1c8e101058cc405

  • SHA256

    4cbfae2977edd83d004db156859d15036289ea2dfbfeaef5aac8b5ea030a8d01

  • SHA512

    03bc1caaa8920fa7903ce6e30ad381481690b66242aabcbae2a2cf265c89b2d85318033a4d0bfab6020911a2acad33bf34b71cbc8afea6f0d1a325cd148e8d45

  • SSDEEP

    6144:wX649Vl1jeHZyL4b8yvuDbL7DXdN8wBYm7OCBy9Z/fLbDDff/TG:wXdPDGmDbPDXdNSKOCK3LnD3L

Malware Config

Extracted

Family

lokibot

C2

https://basitchemcials.com/wp-content/uploads/09/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1584.tmp" "c:\Users\Admin\AppData\Local\Temp\jxpfm5j4\CSCAED25F6815274F12AF28D79E2BB79818.TMP"
        3⤵
          PID:2768
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES1584.tmp

      Filesize

      1KB

      MD5

      682cc8e594f71acba4bf59dd02dabb0a

      SHA1

      f7282c3e6dce4ab19ad4b2bc90256016e337804c

      SHA256

      54ab45b65ee8c16e81180c8e6a28b6b3d12283c1a01680263889cef0d921a5b6

      SHA512

      1c11ee6fa95ad90477ae5d862a235d43b0c46f78d2af27cffc1d0915950c26f9f9b7570f081e7c9f2949b0bc5e5ae3a4f3c6ad79c1b052c9536803e097dcd3ea

    • C:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.dll

      Filesize

      7KB

      MD5

      4429a2ad6a5e4cca58cdeb6271550118

      SHA1

      ac387060297ac766120af610032f29d7d41f8b5a

      SHA256

      bca5748d2e47ee16eee57284d362ef64a63cd20b306c487db2cf639082d8adfc

      SHA512

      a0966f1e3792ef9d88525ff71e11c9df5ff7847a2b1059bc862af1ca19fa5100ed898229c6d118f7a14127c7c76a6e505559849953c55e16f691bb843a92c141

    • C:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.pdb

      Filesize

      19KB

      MD5

      3ffc61105e24655a80b3cdc56c85b150

      SHA1

      7c202e13c2cdec7d39ee8ac9a48364414005200f

      SHA256

      48a95fa19599c36d457b444d37c3dca0379efa70c4b1fcb377ea2e2f722eb83b

      SHA512

      081468b422c55bf535a47bf6d727cd5758697af61f81340870ead63b32ba7c9a0452e482191f6a857106a69eae46b6ff960f4d5650a097b887eccffa3c3ee356

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1340930862-1405011213-2821322012-1000\0f5007522459c86e95ffcc62f32308f1_527e8b4f-d968-48c7-a5cc-e9c96c60868c

      Filesize

      46B

      MD5

      d898504a722bff1524134c6ab6a5eaa5

      SHA1

      e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

      SHA256

      878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

      SHA512

      26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1340930862-1405011213-2821322012-1000\0f5007522459c86e95ffcc62f32308f1_527e8b4f-d968-48c7-a5cc-e9c96c60868c

      Filesize

      46B

      MD5

      c07225d4e7d01d31042965f048728a0a

      SHA1

      69d70b340fd9f44c89adb9a2278df84faa9906b7

      SHA256

      8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

      SHA512

      23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

    • \??\c:\Users\Admin\AppData\Local\Temp\jxpfm5j4\CSCAED25F6815274F12AF28D79E2BB79818.TMP

      Filesize

      1KB

      MD5

      6268dc87d97cbd2b6d101e534a6d1f52

      SHA1

      ed0007094df1e0fcd41c3527e5aafed213a8fe5f

      SHA256

      3ff86d6c7267b4a8ad305744ba00f75b8f0ecd7a0cf40c33e049b140c674aad1

      SHA512

      20b68fe6dcde654c9f5d81a97f4600c8ab5244a72193fed339402aa2f11144901238a161e5e76622a08ca3d30439879c6a31198c0b35fd2e0c8c6f0f2d5737b5

    • \??\c:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.0.cs

      Filesize

      4KB

      MD5

      36048832f59d3c1662b1292c78c44e89

      SHA1

      02eabcf2081b895ee0e090e8edafbc81136b4843

      SHA256

      3b9785b1994ca849db0a7688f5a5ad8039f2013b66d7957f73d4e47188e83d48

      SHA512

      87335388820b38e07998531a8fab3c044ad9cc6df89cc975ae46649f317c9e45dc99f7c58fdcab706e72698640c3f32b507f911a2e863ff1075444f569d9c3b2

    • \??\c:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.cmdline

      Filesize

      312B

      MD5

      be88b5558028854abfd31e4a190e052a

      SHA1

      30acd5c01e8f8eddc777bc51c0e5f4b85965a3ae

      SHA256

      d4f199062d65586b3caa05011b89e57ffa7b4b81253e331dd3008936c8be9f3b

      SHA512

      57199f60b7b25b693a709945c5c3d13b91ca4165c915f24991a1907cd4c63e00337942dcd3e420eb28efd518d95f80d928c0b057103c57f2c767174c458d8daa

    • memory/2564-21-0x00000000005D0000-0x00000000005DC000-memory.dmp

      Filesize

      48KB

    • memory/2564-34-0x0000000073F50000-0x000000007463E000-memory.dmp

      Filesize

      6.9MB

    • memory/2564-3-0x0000000073F50000-0x000000007463E000-memory.dmp

      Filesize

      6.9MB

    • memory/2564-20-0x0000000001E10000-0x0000000001E3A000-memory.dmp

      Filesize

      168KB

    • memory/2564-0-0x0000000073F5E000-0x0000000073F5F000-memory.dmp

      Filesize

      4KB

    • memory/2564-23-0x0000000001E80000-0x0000000001F22000-memory.dmp

      Filesize

      648KB

    • memory/2564-1-0x00000000002D0000-0x0000000000324000-memory.dmp

      Filesize

      336KB

    • memory/2564-2-0x00000000004C0000-0x00000000004C8000-memory.dmp

      Filesize

      32KB

    • memory/2564-18-0x0000000000520000-0x0000000000528000-memory.dmp

      Filesize

      32KB

    • memory/2684-35-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-33-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2684-28-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-27-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-26-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-24-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-31-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-25-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/2684-79-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB