Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 10:08

General

  • Target

    e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe

  • Size

    389KB

  • MD5

    e23b6a4a3f9a691aa57140829b735dec

  • SHA1

    b3c8ae5a874edee651364aa876822dd4f334e7ae

  • SHA256

    650d7fdcda7e9fd5e63dbf129286101684f74824062e13dede5c6812c58cfe43

  • SHA512

    a2ba559420885f969889bf970e37fd2d00da0f4cfeea9ae85ea7a0c1bb1431ef5c1d25a8c94443c92fcadedd8f7ff485a8cc9d84051cc54eb0db7fe0e2e7f2bd

  • SSDEEP

    3072:WYmct0HIParaYwR18hNGmNsulHtbeNB0kD2Urx0L0ktMal5RJduMPZXzx:Qct00iqRu3NGD0k6Urxq9zdvPZXzx

Malware Config

Extracted

Family

lokibot

C2

http://ipqbook.com/bouf/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e23b6a4a3f9a691aa57140829b735dec_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\52ajjbnv\52ajjbnv.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD428.tmp" "c:\Users\Admin\AppData\Local\Temp\52ajjbnv\CSCC423084BE38445FA88A8643BB6B027F5.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:396
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\52ajjbnv\52ajjbnv.dll

    Filesize

    6KB

    MD5

    56b272e2a846e01e45d670e2a17801ee

    SHA1

    6e4703db2e2e7c312dd93ec0e9452415db3e5acb

    SHA256

    9effc19cb574a96750652351a067911b11a1337608e6696f3ee5d0c171c15f0b

    SHA512

    e17c782dd0bff619c3851b9a965b95e37c41b3404db69b2c9c8275bdc2e0fc3de525e8ea262bb463aff99a0db144239bac2f259838dd0be38b367b1f0599a7c3

  • C:\Users\Admin\AppData\Local\Temp\52ajjbnv\52ajjbnv.pdb

    Filesize

    19KB

    MD5

    5d4a23efdce705a98f02ba65d9feef84

    SHA1

    cae90ec560f5f9eb76f3a79be3c911237984142f

    SHA256

    e047ed9d92375bec184fcd253592f8970921d5c3baa77760ac537682e836d08a

    SHA512

    83c3da9d127b34ca1a8ffc8cfc31a5199fdee5a17bfa9b468e178f328aff2d2bd0616617b42716aba94c46cf29f75ec8966cb9167217a117aa31def8c2360d97

  • C:\Users\Admin\AppData\Local\Temp\RESD428.tmp

    Filesize

    1KB

    MD5

    665ebedece6c02a8de2f5c093e5d6274

    SHA1

    c4c96f2c2de2a4ad499d728f93b5ec21324c4d9b

    SHA256

    e0df870f87496410b0cc43c49aec839f16ddc86fcb52d65b72965b9d6b5a524c

    SHA512

    171a8b8a20c1a7fc7368c9b472bb6feef9d918f8a10a2257f31f9031ba7ac40a50a59fb09a80a677ee4ecc2205baf081e18398254d54448a59407925b873a592

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2718105630-359604950-2820636825-1000\0f5007522459c86e95ffcc62f32308f1_32404286-a0b5-4a93-9620-6f13fd83251a

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2718105630-359604950-2820636825-1000\0f5007522459c86e95ffcc62f32308f1_32404286-a0b5-4a93-9620-6f13fd83251a

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • \??\c:\Users\Admin\AppData\Local\Temp\52ajjbnv\52ajjbnv.0.cs

    Filesize

    4KB

    MD5

    1db49232363ab973c220f69639e516e8

    SHA1

    d4a532d118f6ed97d5165a96c003fd6c0c3285c2

    SHA256

    b36cd18b7224eab2c4af0500dd5c1a690c3db849e10a8f774fb6afbbd08a40d0

    SHA512

    07551a80c26d1690e8dd0c651a7171c3249ae49b6edc997f9c6ae11c3c2ff4f5c6134dabeb80c9051b29c68c6140c798e7537a176a4898ffeb58aa4459509bcb

  • \??\c:\Users\Admin\AppData\Local\Temp\52ajjbnv\52ajjbnv.cmdline

    Filesize

    312B

    MD5

    eb6fdc79e597fd50a53e9bff308dba61

    SHA1

    dcafa80db14073e95d5c7d9ba81b328b8286b997

    SHA256

    a6db6e164d5a572d8b3d100f03ac5fbf37358988e70686fa118f31c72a502ab3

    SHA512

    6fdf48fcb4c4b9423f920512ec3523a94362067d8760cfff457a7cd0f3f2a3808176f3acdf1b4e61822e6e339c409dbca5b438bf7da79a5b07c0539c4e2570f6

  • \??\c:\Users\Admin\AppData\Local\Temp\52ajjbnv\CSCC423084BE38445FA88A8643BB6B027F5.TMP

    Filesize

    1KB

    MD5

    58b10c6637cd49f3d5bffce7434def30

    SHA1

    f0cb5bec219ab90bc2758e5f0900b31e06e023b3

    SHA256

    dc158c19b2845e77bf2d48cf01be60fbf63897e67faf4561cc4177c910a25a2e

    SHA512

    694720538504e6ca4716bfa2d2f911fcf5be3fb468c7a5653cb91ea22b2d9274a85f95477e0e8b16fbf8fd5caeb6c6e9446ab68dbfa69af0af36be67d04b4fea

  • memory/2280-25-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2280-74-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2280-30-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2280-28-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2560-19-0x0000000005140000-0x0000000005148000-memory.dmp

    Filesize

    32KB

  • memory/2560-22-0x0000000005410000-0x000000000541C000-memory.dmp

    Filesize

    48KB

  • memory/2560-23-0x0000000005430000-0x00000000054D2000-memory.dmp

    Filesize

    648KB

  • memory/2560-24-0x00000000056A0000-0x000000000573C000-memory.dmp

    Filesize

    624KB

  • memory/2560-21-0x00000000053E0000-0x000000000540A000-memory.dmp

    Filesize

    168KB

  • memory/2560-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

    Filesize

    4KB

  • memory/2560-4-0x0000000074D70000-0x0000000075520000-memory.dmp

    Filesize

    7.7MB

  • memory/2560-29-0x0000000074D70000-0x0000000075520000-memory.dmp

    Filesize

    7.7MB

  • memory/2560-3-0x0000000005100000-0x0000000005108000-memory.dmp

    Filesize

    32KB

  • memory/2560-2-0x0000000004F60000-0x0000000004FF2000-memory.dmp

    Filesize

    584KB

  • memory/2560-1-0x00000000005E0000-0x0000000000614000-memory.dmp

    Filesize

    208KB