Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 10:08

General

  • Target

    e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe

  • Size

    389KB

  • MD5

    e23b6a4a3f9a691aa57140829b735dec

  • SHA1

    b3c8ae5a874edee651364aa876822dd4f334e7ae

  • SHA256

    650d7fdcda7e9fd5e63dbf129286101684f74824062e13dede5c6812c58cfe43

  • SHA512

    a2ba559420885f969889bf970e37fd2d00da0f4cfeea9ae85ea7a0c1bb1431ef5c1d25a8c94443c92fcadedd8f7ff485a8cc9d84051cc54eb0db7fe0e2e7f2bd

  • SSDEEP

    3072:WYmct0HIParaYwR18hNGmNsulHtbeNB0kD2Urx0L0ktMal5RJduMPZXzx:Qct00iqRu3NGD0k6Urxq9zdvPZXzx

Malware Config

Extracted

Family

lokibot

C2

http://ipqbook.com/bouf/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o3oyghf1\o3oyghf1.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC275.tmp" "c:\Users\Admin\AppData\Local\Temp\o3oyghf1\CSC720532B4806C41579494DCFF65C78978.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2128
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESC275.tmp

    Filesize

    1KB

    MD5

    09e3bc380406bd94dfd533b4e605cfe6

    SHA1

    dfe2ffde5b5256c8867d40acc6b719f6e86de926

    SHA256

    b586c0b0c861c0b68b94c58563477979f600d9c2cd621c5f806cb77d5b047e44

    SHA512

    c4e3257e492a7f452e59301c760b875cdbf7b3abaf522bc433099d788da522a59de81d47f92ce63fe1165d94718410b619802e2ebbaab269c4a7532f32a731cc

  • C:\Users\Admin\AppData\Local\Temp\o3oyghf1\o3oyghf1.dll

    Filesize

    6KB

    MD5

    6df59141a6424949042b62e62ca81707

    SHA1

    b99fcc4c251902185404b1edca984bbb8da0798b

    SHA256

    dccfde08402407b44b7989871064e657d5094bb4ba05a105652beca313268c31

    SHA512

    85b3ec953d8168177df0895f5913587ac249c7df7853a8aa5bac1b40b61321aacd4dd694294094e3dd7fe5b441b9d7390cd96484ff90a6e370adf847deab55ac

  • C:\Users\Admin\AppData\Local\Temp\o3oyghf1\o3oyghf1.pdb

    Filesize

    19KB

    MD5

    ae5bb7e464c9a24dc93943a0c001ede8

    SHA1

    2f4a5b6abba01e083fd42982176371affab071b9

    SHA256

    0d41fdebd30b52748667bb4fe5084c6315d8a652e55a44cfa4f15ceefc2b5559

    SHA512

    a8ffa6209cc4d9ab01c792c697cbf22a3952f9a1e7322f415c4b1eb6180511f67462a08647bc792c3c13707aeb390b6c1f94d16d8ce5d056aac9a8a70d22d798

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2872745919-2748461613-2989606286-1000\0f5007522459c86e95ffcc62f32308f1_4d69f9e1-559c-46cf-82ac-67913db47c55

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2872745919-2748461613-2989606286-1000\0f5007522459c86e95ffcc62f32308f1_4d69f9e1-559c-46cf-82ac-67913db47c55

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • \??\c:\Users\Admin\AppData\Local\Temp\o3oyghf1\CSC720532B4806C41579494DCFF65C78978.TMP

    Filesize

    1KB

    MD5

    5396221b48624db716a5e1f458abf1d5

    SHA1

    00cf5c41e06fc0fba6ecc954d5339182fc10abe5

    SHA256

    10e7d5f4a053b502a96b5121f99cea6f53c9571fcfaed81ceac25cf7c406fb54

    SHA512

    43c88d16b6c028a857b55cc434fa5eb9742954e8d173606bc68e008c7363e23005ca0640553431a8e276f4f42de077c75cb93ceb20b2750439abba71b88bd6dc

  • \??\c:\Users\Admin\AppData\Local\Temp\o3oyghf1\o3oyghf1.0.cs

    Filesize

    4KB

    MD5

    1db49232363ab973c220f69639e516e8

    SHA1

    d4a532d118f6ed97d5165a96c003fd6c0c3285c2

    SHA256

    b36cd18b7224eab2c4af0500dd5c1a690c3db849e10a8f774fb6afbbd08a40d0

    SHA512

    07551a80c26d1690e8dd0c651a7171c3249ae49b6edc997f9c6ae11c3c2ff4f5c6134dabeb80c9051b29c68c6140c798e7537a176a4898ffeb58aa4459509bcb

  • \??\c:\Users\Admin\AppData\Local\Temp\o3oyghf1\o3oyghf1.cmdline

    Filesize

    312B

    MD5

    603fdc8545d3604ab638a31bc9e65b0f

    SHA1

    ac13afe2499b4ed862ead909a96c888a220975fc

    SHA256

    e949cb3bd7a4ec1acba75be1a300227cf349d48e3158c4faa1747b1266f1825f

    SHA512

    72bacbaf397f5f1008fd818fb4a8b2b3d012c5e8f080b3b21ffee076b07d237aee204be54bcc5f850bbce74eda1dcb6721f5ce2a68c3056a8a4c936570387452

  • memory/2184-23-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-34-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-75-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-74-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-29-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-25-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-27-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2184-32-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-28-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2184-35-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2408-22-0x00000000010D0000-0x0000000001172000-memory.dmp

    Filesize

    648KB

  • memory/2408-36-0x0000000074A70000-0x000000007515E000-memory.dmp

    Filesize

    6.9MB

  • memory/2408-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

    Filesize

    4KB

  • memory/2408-18-0x00000000005E0000-0x00000000005E8000-memory.dmp

    Filesize

    32KB

  • memory/2408-21-0x0000000000600000-0x000000000060C000-memory.dmp

    Filesize

    48KB

  • memory/2408-2-0x0000000000580000-0x0000000000588000-memory.dmp

    Filesize

    32KB

  • memory/2408-1-0x0000000001120000-0x0000000001154000-memory.dmp

    Filesize

    208KB

  • memory/2408-20-0x0000000000D50000-0x0000000000D7A000-memory.dmp

    Filesize

    168KB

  • memory/2408-3-0x0000000074A70000-0x000000007515E000-memory.dmp

    Filesize

    6.9MB