Analysis

  • max time kernel
    136s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2024, 16:14

General

  • Target

    cd23b9710a6f3bddf569663eca410316_JaffaCakes118.msi

  • Size

    428KB

  • MD5

    cd23b9710a6f3bddf569663eca410316

  • SHA1

    26afee2a515aa7c0d2ab691fadd85bfc948dcfbe

  • SHA256

    193e8868bf9fbb4fc5edb8a0e2400796ee644114d8a401c8550ce0aa958665ac

  • SHA512

    789589860b13b580604be4d7127bc340cc0d29bcf8e6cb6a9259bbf4623033f96addc41b1df41850ee273c9e642730cff5dbc54d75171bdf9caa727cd4ab13cd

  • SSDEEP

    12288:sEfBZl1vvNQSnTlBZl1vvNQSnTnHrpq0sU5:sEJ1vvNQQTz1vvNQQTNq0x

Malware Config

Extracted

Family

lokibot

C2

http://pms-ne.kr/ikloki/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\cd23b9710a6f3bddf569663eca410316_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1728
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4180
    • C:\Windows\Installer\MSIED6E.tmp
      "C:\Windows\Installer\MSIED6E.tmp"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Windows\Installer\MSIED6E.tmp
        "C:\Windows\Installer\MSIED6E.tmp"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2196
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57ec86.rbs

    Filesize

    663B

    MD5

    8ced906c5f3e10f42d69e9e5b2ab2b41

    SHA1

    e5b9118ceab68e86a66184102986469544efad43

    SHA256

    fbdfa46be7c05ace6aea2c43003709564bbecddb5a29c4fb79708b66e80493c4

    SHA512

    da5d8a7854b62191e7dd9790a09bd9dd4ae0af25a2bc31cbc1b533e823bacd55e9c64e4bdf0c9d964e353f5c53109977d3367ec30d9f1ad6c57033f93ab15a12

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\0f5007522459c86e95ffcc62f32308f1_03d68389-5a68-4d9e-92ac-47b927e624dd

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\0f5007522459c86e95ffcc62f32308f1_03d68389-5a68-4d9e-92ac-47b927e624dd

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Windows\Installer\MSIED6E.tmp

    Filesize

    401KB

    MD5

    42f0ce29970a9ab24c4d01d061091bca

    SHA1

    c871ab752d547956b4ea1f3944b3b32a793e7112

    SHA256

    a8b1fd6c71325bc5a80c2a175dfcb39fddc77b2125f8065c63636dfdff9bab7f

    SHA512

    6b9d538b41ff821f6b95d0722c76fd2d940053990e7d782ba8f39fc71e357ed655528361cc7e961b7bc141ac4be38e926102876ecfd4cd22600fa87a97f538ad

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    bd798e99ace3533989f0203e961e8478

    SHA1

    9c0383060520b8fdaf9e9c5c498beaeca54928ab

    SHA256

    1a2521fdcf1446bb36c5d3a352f75751b1244310a6b48b472167a1063dec8708

    SHA512

    637dee315071646895a778ad8a7a2b520ba43dd6c2322e5d2bf3f73f504cf9b0a04ad8ca1042822f2873a220120524d874d0d1148a0a083a21a3bcb05809c496

  • \??\Volume{83bffa96-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{aedb2393-bb6f-471a-8928-6092d5a99f1e}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    7e28105e28fe7785eee990b5fff334f6

    SHA1

    632e8c21e886a40db7398e29248daf6245815aad

    SHA256

    48dacdce876e37b39ede1c5293d31e57b4eeae06634c33a7bcc25ea8486c4faf

    SHA512

    2d66749e66458bc805acda64195576f660958a66483d920734ec93d9b99aa6a4a50191c6ee12661878be7433c77c039dde80e74c4d1b2e683933123ccba2cb6e

  • memory/2196-20-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2196-23-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4244-14-0x0000000004920000-0x0000000004942000-memory.dmp

    Filesize

    136KB

  • memory/4244-19-0x0000000005FD0000-0x000000000606C000-memory.dmp

    Filesize

    624KB

  • memory/4244-18-0x00000000054D0000-0x0000000005562000-memory.dmp

    Filesize

    584KB

  • memory/4244-17-0x0000000005980000-0x0000000005F24000-memory.dmp

    Filesize

    5.6MB

  • memory/4244-13-0x0000000004940000-0x000000000495A000-memory.dmp

    Filesize

    104KB

  • memory/4244-12-0x0000000000090000-0x00000000000FA000-memory.dmp

    Filesize

    424KB