Analysis

  • max time kernel
    141s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 21:45

General

  • Target

    ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe

  • Size

    309KB

  • MD5

    ab9b13bfe075715637b77b9ec4c70481

  • SHA1

    2573e9f9ea0b537f3108a4f9b1c8e101058cc405

  • SHA256

    4cbfae2977edd83d004db156859d15036289ea2dfbfeaef5aac8b5ea030a8d01

  • SHA512

    03bc1caaa8920fa7903ce6e30ad381481690b66242aabcbae2a2cf265c89b2d85318033a4d0bfab6020911a2acad33bf34b71cbc8afea6f0d1a325cd148e8d45

  • SSDEEP

    6144:wX649Vl1jeHZyL4b8yvuDbL7DXdN8wBYm7OCBy9Z/fLbDDff/TG:wXdPDGmDbPDXdNSKOCK3LnD3L

Malware Config

Extracted

Family

lokibot

C2

https://basitchemcials.com/wp-content/uploads/09/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zjacxzi5\zjacxzi5.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5A84.tmp" "c:\Users\Admin\AppData\Local\Temp\zjacxzi5\CSCE30A51EC8E774E5590B3C0FBA770D6B8.TMP"
        3⤵
          PID:2780
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES5A84.tmp

      Filesize

      1KB

      MD5

      c72fb257681352d14c9ad9e1a647400f

      SHA1

      44bd4b3a95c7bb68601d21bfa8c894fbff37ad9d

      SHA256

      d4eea9d60c69360818774ed513fbd92af74f02c3973988182c0083a0eb9988b8

      SHA512

      b6623a73e0a8346303c62ccf1045a60e266ef06508ede8dcf857af01e3103b9e52edef9d4b8c5cccbb2d88893d73dea8471a2c4495db4183b862671aee69a823

    • C:\Users\Admin\AppData\Local\Temp\zjacxzi5\zjacxzi5.dll

      Filesize

      7KB

      MD5

      891cedf0c02648ca5b637296c1ec0ad0

      SHA1

      f8525ff162c61d7e56b8170033b8afa07539d2f4

      SHA256

      7a0bbd272fd35dc39106cf7abdb30efece2d68623c17f73f70ca99c85674e2ae

      SHA512

      84664ecfb677d0ff4cb3191d5906ffffc84249692180bfcd32e84d42a8adb2dcb5916dbfdca973d10e3fc017b746bfbd44f987496d78298e40c7542a33cc0f62

    • C:\Users\Admin\AppData\Local\Temp\zjacxzi5\zjacxzi5.pdb

      Filesize

      19KB

      MD5

      8463721c609610024c4b3b54a903566a

      SHA1

      1ba4813277ee97bb88b2acf8153e0fe384709456

      SHA256

      1f1f5befe800278712c3b59545e222a5c90825ad957b602295910422bf39c401

      SHA512

      c56acd200171af91b4ba747d71a4b15c38e5d47e3fb13d46885c65708a0486eb3e7dd10bb0eed1bbff1f7af6c89480db01ccab347ee3c3afaa498204a2c5920c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1337824034-2731376981-3755436523-1000\0f5007522459c86e95ffcc62f32308f1_6833eb7b-8d4b-4cdd-9502-9bbf7fc1cf9f

      Filesize

      46B

      MD5

      c07225d4e7d01d31042965f048728a0a

      SHA1

      69d70b340fd9f44c89adb9a2278df84faa9906b7

      SHA256

      8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

      SHA512

      23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1337824034-2731376981-3755436523-1000\0f5007522459c86e95ffcc62f32308f1_6833eb7b-8d4b-4cdd-9502-9bbf7fc1cf9f

      Filesize

      46B

      MD5

      d898504a722bff1524134c6ab6a5eaa5

      SHA1

      e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

      SHA256

      878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

      SHA512

      26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

    • \??\c:\Users\Admin\AppData\Local\Temp\zjacxzi5\CSCE30A51EC8E774E5590B3C0FBA770D6B8.TMP

      Filesize

      1KB

      MD5

      f39ddf9e67b820042f4a418907902fec

      SHA1

      bdce3ee2d4f58bc01ff704b489b3135d25b0803c

      SHA256

      bca35c70c5cbaec83b600462bf1b68be80cd11a50e04ebdd2513603a4e64a044

      SHA512

      647485a3a96eb1691ce4d31723f1ce1612eb2a9df33b2a0b5f362284a501e0914ff3ba133d2c7bd139d88b9677536528af65dd0e1c58abca961ebde77132be90

    • \??\c:\Users\Admin\AppData\Local\Temp\zjacxzi5\zjacxzi5.0.cs

      Filesize

      4KB

      MD5

      36048832f59d3c1662b1292c78c44e89

      SHA1

      02eabcf2081b895ee0e090e8edafbc81136b4843

      SHA256

      3b9785b1994ca849db0a7688f5a5ad8039f2013b66d7957f73d4e47188e83d48

      SHA512

      87335388820b38e07998531a8fab3c044ad9cc6df89cc975ae46649f317c9e45dc99f7c58fdcab706e72698640c3f32b507f911a2e863ff1075444f569d9c3b2

    • \??\c:\Users\Admin\AppData\Local\Temp\zjacxzi5\zjacxzi5.cmdline

      Filesize

      312B

      MD5

      39131652d1bcf33d62d6f7f4e2225df9

      SHA1

      a9a016f7349cf6d45b1cb71dfe2ec16ae50a84ff

      SHA256

      fa98a83369c2995fa9014ff0467bb2f1a713ee5f66963190ac5ad6757f5a59c6

      SHA512

      cb972a6a4ce08044c3b88030ba7edd324c738807e515c99c071c8025f4621aa6654a817096316ac11e2bc0be2100701b0fbd07f75272ec093e67ae54ade04a16

    • memory/1500-21-0x0000000004D30000-0x0000000004D5A000-memory.dmp

      Filesize

      168KB

    • memory/1500-25-0x0000000005230000-0x00000000052CC000-memory.dmp

      Filesize

      624KB

    • memory/1500-3-0x0000000000CF0000-0x0000000000CF8000-memory.dmp

      Filesize

      32KB

    • memory/1500-19-0x0000000000D00000-0x0000000000D08000-memory.dmp

      Filesize

      32KB

    • memory/1500-0-0x000000007471E000-0x000000007471F000-memory.dmp

      Filesize

      4KB

    • memory/1500-22-0x0000000004B80000-0x0000000004B8C000-memory.dmp

      Filesize

      48KB

    • memory/1500-24-0x0000000004D80000-0x0000000004E22000-memory.dmp

      Filesize

      648KB

    • memory/1500-4-0x0000000074710000-0x0000000074EC0000-memory.dmp

      Filesize

      7.7MB

    • memory/1500-1-0x0000000000120000-0x0000000000174000-memory.dmp

      Filesize

      336KB

    • memory/1500-2-0x0000000004B90000-0x0000000004C22000-memory.dmp

      Filesize

      584KB

    • memory/1500-31-0x0000000074710000-0x0000000074EC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4824-30-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4824-35-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4824-28-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4824-26-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4824-77-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB