Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2024, 09:11

General

  • Target

    f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118.rtf

  • Size

    1.2MB

  • MD5

    f1b66d86344a6b7721cee9092bec9d69

  • SHA1

    880f0e144fe4ae8952a7318d5d4320b459c86ec2

  • SHA256

    c2237f9c8ee1a6ea3503bf86ac791a4a9ffeb27eaf2fb7ebe48ec39957499824

  • SHA512

    6351d57787f38e488c1d9fcb05dd09f3585a7d9b044d8476d13e9850cf15604738c9d1e55e405a1d6ebe22af40fcb384a07559faf02cc94c2124afa4a908a6e1

  • SSDEEP

    24576:xIRIvf2xOXNy63VkuisU4YyAeXqom4WnOCUsWQKleynbtl5s:0

Malware Config

Extracted

Family

lokibot

C2

http://globalogroup.com/group/bal/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118.rtf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tAsK.bAt
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\2nd.bat
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Windows\SysWOW64\timeout.exe
          TIMEOUT 1
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2768
        • C:\Users\Admin\AppData\Local\Temp\exe.exe
          C:\Users\Admin\AppData\Local\Temp\ExE.ExE
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1196
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\System32\explorer.exe" /c select, C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2164
        • C:\Windows\SysWOW64\taskkill.exe
          TASKKILL /F /IM winword.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:848
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3004
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2808
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3008
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2308
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1016
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1212
        • C:\Windows\SysWOW64\reg.exe
          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1952
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:324
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1964
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:380
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2600
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2716
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2076
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1740
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1736
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2352
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1208
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:692
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1404
          • C:\Windows\SysWOW64\reg.exe
            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:536
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\AssertUse.docx"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:1944
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            5⤵
              PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tAsK.bAt
        2⤵
        • Process spawned unexpected child process
        • System Location Discovery: System Language Discovery
        PID:2804
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
        PID:2156
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2940
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\system32\svchost.exe"
            3⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1284

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\2nd.bat

              Filesize

              2KB

              MD5

              57ff2666bfc47c63e05d5c182b0f89f3

              SHA1

              c88b20b249b8f4ff963c897e2ba0028e20b316e2

              SHA256

              74249727c5d760e91b9277be58b45a03fd89a587cc19e0b42503b50db2e00356

              SHA512

              a7edf48519bbdf46aee1c5f60e419b4e604d04e3066aa3501e5fe3e81396fc443a4cafe35bdd06770a59e2009d0405dd4c97d8c121cd1bc30987270ad119b8b1

            • C:\Users\Admin\AppData\Local\Temp\decoy.doc

              Filesize

              191B

              MD5

              5d65bac473774c66544cc2f4062c9b78

              SHA1

              b2b606f85dd95ff2ab5bcca43966a9c4cbb372b2

              SHA256

              7697184623cf1ffe94e69db38ca0821d3ff2df5826af38a9f7e244f3a725b042

              SHA512

              853ad5701b858fd350bbf2171955d84d551260f883ccc25eb403f4b2606b6694d34c62ade98db0761da8ac3cb3250e98e19e54c3ab7c927782a3a0ed10924cd2

            • C:\Users\Admin\AppData\Local\Temp\inteldriverupd1.sct

              Filesize

              432B

              MD5

              8decdcaeb92d9f628b6bf95de4c0597a

              SHA1

              19443ad64921ef01a77619350efcc97cd767a36b

              SHA256

              e4f6b9def338fe9aca9e8796e79c58c5e42168e697c41bfe149946513765036e

              SHA512

              d67fee80c9f4884331e476f53de7516d21e926cf2f00094bf310ccd6e875164740b31749ec1ea43c1015037590b9bfebe2bde0065d75e42343bfbd0c46bccf59

            • C:\Users\Admin\AppData\Local\Temp\task.bat

              Filesize

              153B

              MD5

              89896bf3dc684cb01d6c9bd8f2df3694

              SHA1

              cd34ddbfe29c70d100f506addf4a6f831079dc01

              SHA256

              429934a64c0d46c46c09c3ccdac2db6801f96e28d072d3dd72ac01c5f023460b

              SHA512

              0f5371dee4db471524b3d6abf8fa673555b9dc92d596e7f3d73d13f810e899d19741cfebd46b09dfde60b0aee9288e2fac3bb8ec5cba3190dabd3bd87a0a29d1

            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3533259084-2542256011-65585152-1000\0f5007522459c86e95ffcc62f32308f1_38b42d9b-3e83-45f4-8789-a30be34574b0

              Filesize

              46B

              MD5

              d898504a722bff1524134c6ab6a5eaa5

              SHA1

              e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

              SHA256

              878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

              SHA512

              26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3533259084-2542256011-65585152-1000\0f5007522459c86e95ffcc62f32308f1_38b42d9b-3e83-45f4-8789-a30be34574b0

              Filesize

              46B

              MD5

              c07225d4e7d01d31042965f048728a0a

              SHA1

              69d70b340fd9f44c89adb9a2278df84faa9906b7

              SHA256

              8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

              SHA512

              23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              19KB

              MD5

              d0e80de1eca42e3971997e0902f22d19

              SHA1

              8fc009cfc995e21f598380afada8e9ef6b7da1bf

              SHA256

              a462619e32c93a99eec64f682d8c8c3dcd5cb146cbe277cf92191141f0bdb0ca

              SHA512

              59705d7205916e6ede7f17adece9de619d0629f5739cb71486e7c7ac193f6f00f77fd88c78ce4e946a3b53d819324ea09fac9d1aa6da856137d9f7f5fbf98a92

            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

              Filesize

              392B

              MD5

              f2919796198e267a150ed86173156733

              SHA1

              5a5a5fb489bbb1c95d01b3f6aef234d9ca520be4

              SHA256

              af54491527986b27210c92e5e62cd0aa0605c49593b0d273a04af077af7aab17

              SHA512

              cc0b410b1b37ff41e2ad06b88cf12af424d022a8de5ceb267b3648f7a7bcd3e82314675652c0373181634a1003727e681f87c3e7d3ba253ef74fd4d35479804a

            • \Users\Admin\AppData\Local\Temp\exe.exe

              Filesize

              533KB

              MD5

              7a8f314ea10cdc072f9a5c6a1de1dcd8

              SHA1

              dfd403e4eb649843eb37fc420be34b011ad52468

              SHA256

              edb38bbbb6ed968038651534961efde38bbc65261a00b283fc990f02edcc3f0d

              SHA512

              f1b4972fcd2fc97f0bc12ba3b5af2c5b23f1906de49e16892d4baaff91d6281f124f2c539f45ad1b940663e7057f1c7056e414478427941cda4ec9d43c0a61ba

            • memory/276-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/276-0-0x000000002FFD1000-0x000000002FFD2000-memory.dmp

              Filesize

              4KB

            • memory/276-38-0x000000007174D000-0x0000000071758000-memory.dmp

              Filesize

              44KB

            • memory/276-2-0x000000007174D000-0x0000000071758000-memory.dmp

              Filesize

              44KB

            • memory/1284-75-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/1284-76-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/1944-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1944-153-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB