Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2024 01:31

General

  • Target

    71bc06523eff20bda9197d0020b751cf_JaffaCakes118.msi

  • Size

    656KB

  • MD5

    71bc06523eff20bda9197d0020b751cf

  • SHA1

    3215635a506e4c538daa7adcd1606d348d25e0b5

  • SHA256

    165f271fb293701f0b6ab71033eeb9568c18aefcdd847060a3d57475eae2aeed

  • SHA512

    a29e3852395e9fdfc74686b648394ae811eb4b3e14c2592273a765539d844f419a7c505868beb57a858f39f9ae296b16e97ba87562d0662e955fbc73566d6ee0

  • SSDEEP

    6144:EE7TMenVqe/eD8zNa0ILko3H5M1T5DsApiRCDE6YG320A5E7cYDvhRNQ0OBjtguZ:EEXnVqKeDI/ID3HxBuGurTNr2

Malware Config

Extracted

Family

lokibot

C2

http://spimagesinc.com/images/ImgDump_04-25-16/picture/gallery/newfoldwer/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\71bc06523eff20bda9197d0020b751cf_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2948
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4188
    • C:\Windows\Installer\MSI9E35.tmp
      "C:\Windows\Installer\MSI9E35.tmp"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\Installer\MSI9E35.tmp
        "C:\Windows\Installer\MSI9E35.tmp"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Executes dropped EXE
        • outlook_office_path
        • outlook_win_path
        PID:1540
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e579d0e.rbs

    Filesize

    663B

    MD5

    08c4b04f9ab2d4c2e679da226e113f5a

    SHA1

    d4bd26696b62514d1c9c43725bc8f16af33ad4ea

    SHA256

    7fe3fdcdd3421cfcb5d4320425867ccb6cf53591b5ae6d88474b2b1c1bc48d18

    SHA512

    f695e75e65efbf2d69010fe3b6d24999c4f8aeda1fe1b8b5045590c666b115c213c99d8d50a56dc99c6901225de3d0a01182563915e44c534f9a832a240499c1

  • C:\Windows\Installer\MSI9E35.tmp

    Filesize

    632KB

    MD5

    24d6ee30e47dc5886977b78f26fae187

    SHA1

    70b855b7756bc66d94b0ba6f78f4c15542df4c81

    SHA256

    71a00fcf74a3d6b9390e289f50b80ad5bd41b9ed64e1a924c8ea7a851ecccf36

    SHA512

    d2701478d951266a1e32432926a02c3b72e3d852b2f5ad07410ab62e3c9a9c6074fdc131ff6853a54f368e9e857a2dbfe9ce80ddedbf7ecceac23a88d9b36893

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    2dbb1b0b5d96b31b4a9c6390161bb036

    SHA1

    7f15325db5a1f8c52b0dd996a255b55d8fbb5488

    SHA256

    837444ac51003a6242ad21a61a9b32b0589a84b3779dd21de0c48ff35222faa2

    SHA512

    1f6a19ea8fc7346de325dcd84e69043baff8b2124e82ec6f1c950df5e4777ebb68854f33cdd2825233191222ac1ff9e76a0775057330865979131477a86b5374

  • \??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{67acee5c-9d0b-4196-8e47-91eeb3c70f3e}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    80b0bdf1211767a473abcbb0e8bc3f52

    SHA1

    4878814f24aaffc86b4b5c824f013b04bf085e0e

    SHA256

    7615e6b752bcbdcc3796d995fc7d6024942060a25377d36f91232e563ff03e86

    SHA512

    2a5d10cdbfa0cc870897a93466780e1f401cf3b0d95c3cf1cf8ec072692d5a2a32d10618c779e184b6bdd7466c962c7e969bff0ac1b28a86d680a78d68ab85d2

  • memory/1540-13-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1540-12-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1540-18-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1540-15-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1540-14-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB