Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 05:48

General

  • Target

    bbfbda085e25a916cd854b912c821147_JaffaCakes118.exe

  • Size

    362KB

  • MD5

    bbfbda085e25a916cd854b912c821147

  • SHA1

    ae56c17a8a8e42b810e9aa91c6ae841719008245

  • SHA256

    1ca9fafe21bb096346d74200fe9857efbdc14c2fc69574d61926c5f8f2a92ac9

  • SHA512

    bd0702f4771717632641eef18b508ab686c035b9dfcce7d6112373a78e5e5d8744c87dd344ec13268b9f4943d68358e7b5e516ba3f728f4c196e43a1b411fc1f

  • SSDEEP

    6144:V99p6q1Eo/Ne0GL49Vl1jeHZyL4b8yvuDbLwVqCy6q+yxU/LVlNzNVQY+UG:V99p6q1Eo/N9GkPDGmDbyq7jU5lxNOY

Malware Config

Extracted

Family

lokibot

C2

https://ammachegroup.com/wap/wp-content/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Drops startup file 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbfbda085e25a916cd854b912c821147_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bbfbda085e25a916cd854b912c821147_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qhfp4vlf\qhfp4vlf.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE198.tmp" "c:\Users\Admin\AppData\Local\Temp\qhfp4vlf\CSCBE8A091FFC774C19AE9E48D6F2A88F30.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2132
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESE198.tmp

    Filesize

    1KB

    MD5

    66c2a67b412d2b191e6672fac4ea6459

    SHA1

    1edf150a1748f133b815e04592c73655ca08b66e

    SHA256

    b93a75de57f00ee3516bb57cb97fdb32360096ec109e8643fd8a3506118f07c7

    SHA512

    b308c89d712cbd37113cdf0a71b8389f58a1a092bdb09384ae8f1a7f2d2bfdd90ab99de2c4e8467986e8fb33376627a538c70235bec8867460fa3d977aac20bd

  • C:\Users\Admin\AppData\Local\Temp\qhfp4vlf\qhfp4vlf.dll

    Filesize

    13KB

    MD5

    de580b997ca4162e16f7bd43bbcb4722

    SHA1

    ccd73ed3ed15dbe28911370eb247d06258c3a32c

    SHA256

    0027419335dd0d086daea71e6147b662ffb36d2b860dfb8ab939f3fcfef4fb38

    SHA512

    c4583096b958650892c5ab0884e331f0d62bde1402a5b22f0c789b66edee0afd54da786295967c9b7e0606a09b9078dd5af516fc73209b5ef19cd8b28ee6f9a0

  • C:\Users\Admin\AppData\Local\Temp\qhfp4vlf\qhfp4vlf.pdb

    Filesize

    43KB

    MD5

    190bc93339445f3cba4ffa38b477227c

    SHA1

    00417665c1a471760babbfbc6c28b4e0982a8ab0

    SHA256

    a23f8a2c66c47292e07d754eb3344f5a50528de0d3be9a86b8fc107121cd308c

    SHA512

    333ff47fbde545742ac23319478f843c56c2fa7b1308de564390ec8cf1b7fd7823cbafbc884cc2f42d7348fc0b7283b1c4e38462beb380fd2e53039a1e6b3cf2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    46B

    MD5

    d898504a722bff1524134c6ab6a5eaa5

    SHA1

    e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

    SHA256

    878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

    SHA512

    26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\0f5007522459c86e95ffcc62f32308f1_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269

    Filesize

    46B

    MD5

    c07225d4e7d01d31042965f048728a0a

    SHA1

    69d70b340fd9f44c89adb9a2278df84faa9906b7

    SHA256

    8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a

    SHA512

    23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

  • \??\c:\Users\Admin\AppData\Local\Temp\qhfp4vlf\CSCBE8A091FFC774C19AE9E48D6F2A88F30.TMP

    Filesize

    1KB

    MD5

    598af19a163e283d52332fa2fb437a0d

    SHA1

    18110467a1729cbd587454c70202713e0140ba6b

    SHA256

    c1d0b7ef73f0a06175fc4ec34548ff302b3a59b173f33a60ed178fc876bdf6df

    SHA512

    a411e782b6a555a3f3ed296748f0f510786f56dd8a0d1811d0f6fe95df7c76db3598ba40e6b36f6e34e08d0954eef0b48d669bea881f3b84f4b3ab92e40173e7

  • \??\c:\Users\Admin\AppData\Local\Temp\qhfp4vlf\qhfp4vlf.0.cs

    Filesize

    26KB

    MD5

    d092cc5a0c7cc79600dd1204caf54846

    SHA1

    1b36d2bf6a900832ea6779f50bab706c949365bd

    SHA256

    f0b2335406e08fd9a90b2ae614d6d99e4e967f34c9e79dc3e29e0f5f729b8708

    SHA512

    4b3d8c86196eeaae6ffef228a1998b14be0d9a7d3f379f2936c27c50fcd2058b4cee16b41e930901e58f66e7a547932d6b0658ec7d40950a6de4f96a9625d547

  • \??\c:\Users\Admin\AppData\Local\Temp\qhfp4vlf\qhfp4vlf.cmdline

    Filesize

    312B

    MD5

    18bd240d2d7f1f326f579f3d6f83dd7f

    SHA1

    77742851174edc810b35f011dd916520a3dbeffc

    SHA256

    36fcc97ce7c5489d7c231bfecef59ea5154ad4b6fbba78d1027393cc50583a41

    SHA512

    d002b93d91ffd05d4db2e1f713449d24a55b9737250ba6a2e5c56f28c729ff3793b0ffd418b7677f6ddb406e30cecbfea13521ddcda9609528665a5aa39650f5

  • memory/1980-22-0x0000000000A60000-0x0000000000B02000-memory.dmp

    Filesize

    648KB

  • memory/1980-38-0x0000000074BE0000-0x00000000752CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1980-19-0x00000000009E0000-0x0000000000A0A000-memory.dmp

    Filesize

    168KB

  • memory/1980-20-0x0000000000600000-0x000000000060C000-memory.dmp

    Filesize

    48KB

  • memory/1980-0-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

    Filesize

    4KB

  • memory/1980-1-0x0000000000BA0000-0x0000000000C00000-memory.dmp

    Filesize

    384KB

  • memory/1980-5-0x0000000074BE0000-0x00000000752CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1980-17-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2676-37-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-29-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-27-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-23-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-34-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2676-31-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-25-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-36-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/2676-82-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB