| File name: | 2018-01-08-Lokibot-malspam-1531-UTC.eml |
| Full analysis: | https://app.any.run/tasks/cd902626-1054-4876-966d-c1ba5a4a667c |
| Verdict: | Malicious activity |
| Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
| Analysis date: | April 29, 2025, 01:45:06 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | message/rfc822 |
| File info: | RFC 822 mail, Non-ISO extended-ASCII text, with CRLF, LF line terminators |
| MD5: | 85D7F9D71171105B737214C4566BF146 |
| SHA1: | 11888CE07BCD93905BA9085B5C99F93EB6891A8F |
| SHA256: | D03FE7D3BDC432912B563363BC1BE8CF1FED8A923B5859DF73DF696B1CDB0178 |
| SSDEEP: | 12288:UnUu4pBlzPKk3O3uLU25SbFeU/J7/0RYB6M2vrWuwqp4B35hO7L94n:Zut4OR2KeU/F0Rc4vjwqSB35hO7L9I |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2432 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) | |||||||||||||||
| 2600 | "C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml C:\Users\admin\AppData\Local\Temp\2018-01-08-Lokibot-malspam-1531-UTC.eml | C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 4620 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "B2355F3A-D191-47D2-A806-A6027E4F1839" "2F67B904-AB56-4DF1-B1C3-F47244C4246F" "2600" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | OUTLOOK.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Version: 0.12.2.0 Modules
| |||||||||||||||
| 7448 | C:\WINDOWS\system32\OpenWith.exe -Embedding | C:\Windows\System32\OpenWith.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7628 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\7VLHGGFK\swift copia rapida.Ace" | C:\Program Files\WinRAR\WinRAR.exe | OpenWith.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7804 | "C:\Users\admin\Desktop\swift copia rapida.exe" | C:\Users\admin\Desktop\swift copia rapida.exe | explorer.exe | ||||||||||||
User: admin Company: Heaventools Software Integrity Level: MEDIUM Description: PE Explorer Exit code: 0 Version: 1.99.6.1400 Modules
| |||||||||||||||
| 7852 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7900 | "C:\Users\admin\Desktop\swift copia rapida.exe" | C:\Users\admin\Desktop\swift copia rapida.exe | swift copia rapida.exe | ||||||||||||
User: admin Company: Heaventools Software Integrity Level: MEDIUM Description: PE Explorer Exit code: 3221225477 Version: 1.99.6.1400 Modules
| |||||||||||||||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling |
| Operation: | write | Name: | 6 |
Value: 01941A000000001000B24E9A3E06000000000000000600000000000000 | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\2600 |
| Operation: | write | Name: | 0 |
Value: 0B0E10BA4623E23E1E7A44AF2F0BB32A969984230046B1D1E7D78595EEED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511A814D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300 | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | BootCommand |
Value: | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | BootFailureCount |
Value: | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | CantBootResolution |
Value: BootSuccess | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | ProfileBeingOpened |
Value: Outlook | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | SessionId |
Value: C3D8E96E-C1AF-4750-8D52-F4E28119C131 | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession |
| Operation: | write | Name: | BootDiagnosticsLogFile |
Value: C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl | |||
| (PID) Process: | (2600) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics |
| Operation: | delete value | Name: | ProfileBeingOpened |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2600 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\Outlook1.pst | — | |
MD5:— | SHA256:— | |||
| 2600 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:83AF8F1461C60C99919AF5517715810E | SHA256:1DEBA8B0FC5BDBAEC058471A93CD04AEB4BFDD27C317870B309112F79548EBD9 | |||
| 2600 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | binary | |
MD5:E3849791A923E733AA0C1086E3367E73 | SHA256:5AD3BA1BAD79068970FA92D97C0C88C99BA10EC48B6F878006C3C7FD2EB9907E | |||
| 2600 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TableViewPreviewPrefs_2_DDAA0B17A770A745B93B3AC4CD2A0F0F.dat | xml | |
MD5:0E092DB99AEE99FDFF9B5B222C732CFD | SHA256:D1614AD99ADED9F6F5C1BE7FE7FFA5124BD04A526580DA3818EA8A954E852AA6 | |||
| 2600 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:D2E4FDC32C7D3CEA55699E4E80461FB7 | SHA256:15BB89236F5B0D969169F190FF304FEE2EEEFD3586A1862404CC62C91BD4D9F2 | |||
| 2600 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\olkCBBE.tmp | binary | |
MD5:913CE2A554859E3A43A79D788B1185A3 | SHA256:9EEDD4B809448F823EF111E51324A9091FB0F48352A8E0A7F73FBB12890EF439 | |||
| 7804 | swift copia rapida.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swift copia rapida.exe | executable | |
MD5:32F3A45B1DC134A94341DDAEE0364505 | SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE | |||
| 7900 | swift copia rapida.exe | C:\Users\admin\AppData\Roaming\F3F363\3C28B3.hdb | binary | |
MD5:1013079A9BF8FFA458C230EA6AAF8A89 | SHA256:1B1F3BCE8DF0FC7E33B518DAB09D09AF3680E39BCC3C760DADCC50C931007BE8 | |||
| 7804 | swift copia rapida.exe | C:\Users\admin\AppData\Roaming\swift copia rapida.exe | executable | |
MD5:32F3A45B1DC134A94341DDAEE0364505 | SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE | |||
| 7628 | WinRAR.exe | C:\Users\admin\Desktop\swift copia rapida.exe | executable | |
MD5:32F3A45B1DC134A94341DDAEE0364505 | SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7900 | swift copia rapida.exe | POST | 404 | 49.13.77.253:80 | http://18panels.info/jemp/fre.php | unknown | — | — | malicious |
7900 | swift copia rapida.exe | POST | 404 | 49.13.77.253:80 | http://18panels.info/jemp/fre.php | unknown | — | — | malicious |
7900 | swift copia rapida.exe | POST | 404 | 49.13.77.253:80 | http://18panels.info/jemp/fre.php | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2600 | OUTLOOK.EXE | 52.109.28.46:443 | officeclient.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | GB | whitelisted |
2600 | OUTLOOK.EXE | 52.123.129.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2600 | OUTLOOK.EXE | 52.109.76.243:443 | roaming.officeapps.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 40.126.32.136:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2600 | OUTLOOK.EXE | 2.16.168.119:443 | omex.cdn.office.net | Akamai International B.V. | RU | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
roaming.officeapps.live.com |
| whitelisted |
login.live.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
nleditor.osi.office.net |
| whitelisted |
odc.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7900 | swift copia rapida.exe | A Network Trojan was detected | ET MALWARE LokiBot User-Agent (Charon/Inferno) |
7900 | swift copia rapida.exe | A Network Trojan was detected | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 |
7900 | swift copia rapida.exe | Malware Command and Control Activity Detected | ET MALWARE LokiBot Checkin |
7900 | swift copia rapida.exe | A Network Trojan was detected | ET MALWARE LokiBot User-Agent (Charon/Inferno) |
7900 | swift copia rapida.exe | Malware Command and Control Activity Detected | ET MALWARE LokiBot Checkin |
7900 | swift copia rapida.exe | A Network Trojan was detected | ET MALWARE LokiBot User-Agent (Charon/Inferno) |
7900 | swift copia rapida.exe | Malware Command and Control Activity Detected | ET MALWARE LokiBot Checkin |
7900 | swift copia rapida.exe | Malware Command and Control Activity Detected | ET MALWARE LokiBot Request for C2 Commands Detected M1 |
7900 | swift copia rapida.exe | Malware Command and Control Activity Detected | ET MALWARE LokiBot Request for C2 Commands Detected M2 |
7900 | swift copia rapida.exe | A Network Trojan was detected | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 |