File name:

2018-01-08-Lokibot-malspam-1531-UTC.eml

Full analysis: https://app.any.run/tasks/cd902626-1054-4876-966d-c1ba5a4a667c
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: April 29, 2025, 01:45:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
susp-attachments
attachments
attc-unc
stealer
lokibot
trojan
delphi
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, Non-ISO extended-ASCII text, with CRLF, LF line terminators
MD5:

85D7F9D71171105B737214C4566BF146

SHA1:

11888CE07BCD93905BA9085B5C99F93EB6891A8F

SHA256:

D03FE7D3BDC432912B563363BC1BE8CF1FED8A923B5859DF73DF696B1CDB0178

SSDEEP:

12288:UnUu4pBlzPKk3O3uLU25SbFeU/J7/0RYB6M2vrWuwqp4B35hO7L94n:Zut4OR2KeU/F0Rc4vjwqSB35hO7L9I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • swift copia rapida.exe (PID: 7804)
    • LOKIBOT mutex has been found

      • swift copia rapida.exe (PID: 7900)
    • Actions looks like stealing of personal data

      • swift copia rapida.exe (PID: 7900)
    • Scans artifacts that could help determine the target

      • swift copia rapida.exe (PID: 7900)
    • Lokibot is detected

      • swift copia rapida.exe (PID: 7900)
    • LOKIBOT has been detected (SURICATA)

      • swift copia rapida.exe (PID: 7900)
    • Connects to the CnC server

      • swift copia rapida.exe (PID: 7900)
  • SUSPICIOUS

    • Email with suspicious attachment

      • OUTLOOK.EXE (PID: 2600)
    • Reads security settings of Internet Explorer

      • swift copia rapida.exe (PID: 7900)
    • Application launched itself

      • swift copia rapida.exe (PID: 7804)
    • Executable content was dropped or overwritten

      • swift copia rapida.exe (PID: 7804)
      • swift copia rapida.exe (PID: 7900)
    • Contacting a server suspected of hosting an CnC

      • swift copia rapida.exe (PID: 7900)
  • INFO

    • Email with attachments

      • OUTLOOK.EXE (PID: 2600)
    • Creates files or folders in the user directory

      • swift copia rapida.exe (PID: 7804)
      • swift copia rapida.exe (PID: 7900)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 7448)
      • swift copia rapida.exe (PID: 7900)
    • Compiled with Borland Delphi (YARA)

      • swift copia rapida.exe (PID: 7804)
    • Checks supported languages

      • swift copia rapida.exe (PID: 7900)
      • swift copia rapida.exe (PID: 7804)
    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 7448)
    • Reads the computer name

      • swift copia rapida.exe (PID: 7900)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7628)
    • Reads the machine GUID from the registry

      • swift copia rapida.exe (PID: 7900)
    • Manual execution by a user

      • swift copia rapida.exe (PID: 7804)
    • Checks proxy server information

      • slui.exe (PID: 7852)
    • Reads the software policy settings

      • slui.exe (PID: 7852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe sppextcomobj.exe no specs ai.exe no specs openwith.exe no specs winrar.exe swift copia rapida.exe slui.exe #LOKIBOT swift copia rapida.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2432C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
2600"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml C:\Users\admin\AppData\Local\Temp\2018-01-08-Lokibot-malspam-1531-UTC.emlC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\program files\microsoft office\root\office16\vcruntime140_1.dll
c:\program files\microsoft office\root\office16\outlookservicing.dll
4620"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "B2355F3A-D191-47D2-A806-A6027E4F1839" "2F67B904-AB56-4DF1-B1C3-F47244C4246F" "2600"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
7448C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7628"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\7VLHGGFK\swift copia rapida.Ace"C:\Program Files\WinRAR\WinRAR.exe
OpenWith.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7804"C:\Users\admin\Desktop\swift copia rapida.exe" C:\Users\admin\Desktop\swift copia rapida.exe
explorer.exe
User:
admin
Company:
Heaventools Software
Integrity Level:
MEDIUM
Description:
PE Explorer
Exit code:
0
Version:
1.99.6.1400
Modules
Images
c:\users\admin\desktop\swift copia rapida.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7852C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7900"C:\Users\admin\Desktop\swift copia rapida.exe"C:\Users\admin\Desktop\swift copia rapida.exe
swift copia rapida.exe
User:
admin
Company:
Heaventools Software
Integrity Level:
MEDIUM
Description:
PE Explorer
Exit code:
3221225477
Version:
1.99.6.1400
Modules
Images
c:\users\admin\desktop\swift copia rapida.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
18 060
Read events
17 746
Write events
222
Delete events
92

Modification events

(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:6
Value:
01941A000000001000B24E9A3E06000000000000000600000000000000
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\2600
Operation:writeName:0
Value:
0B0E10BA4623E23E1E7A44AF2F0BB32A969984230046B1D1E7D78595EEED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511A814D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootCommand
Value:
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootFailureCount
Value:
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:delete keyName:(default)
Value:
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:CantBootResolution
Value:
BootSuccess
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:ProfileBeingOpened
Value:
Outlook
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:SessionId
Value:
C3D8E96E-C1AF-4750-8D52-F4E28119C131
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:BootDiagnosticsLogFile
Value:
C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl
(PID) Process:(2600) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:ProfileBeingOpened
Value:
Executable files
4
Suspicious files
10
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2600OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
2600OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:83AF8F1461C60C99919AF5517715810E
SHA256:1DEBA8B0FC5BDBAEC058471A93CD04AEB4BFDD27C317870B309112F79548EBD9
2600OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:E3849791A923E733AA0C1086E3367E73
SHA256:5AD3BA1BAD79068970FA92D97C0C88C99BA10EC48B6F878006C3C7FD2EB9907E
2600OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TableViewPreviewPrefs_2_DDAA0B17A770A745B93B3AC4CD2A0F0F.datxml
MD5:0E092DB99AEE99FDFF9B5B222C732CFD
SHA256:D1614AD99ADED9F6F5C1BE7FE7FFA5124BD04A526580DA3818EA8A954E852AA6
2600OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:D2E4FDC32C7D3CEA55699E4E80461FB7
SHA256:15BB89236F5B0D969169F190FF304FEE2EEEFD3586A1862404CC62C91BD4D9F2
2600OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\olkCBBE.tmpbinary
MD5:913CE2A554859E3A43A79D788B1185A3
SHA256:9EEDD4B809448F823EF111E51324A9091FB0F48352A8E0A7F73FBB12890EF439
7804swift copia rapida.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swift copia rapida.exeexecutable
MD5:32F3A45B1DC134A94341DDAEE0364505
SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE
7900swift copia rapida.exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.hdbbinary
MD5:1013079A9BF8FFA458C230EA6AAF8A89
SHA256:1B1F3BCE8DF0FC7E33B518DAB09D09AF3680E39BCC3C760DADCC50C931007BE8
7804swift copia rapida.exeC:\Users\admin\AppData\Roaming\swift copia rapida.exeexecutable
MD5:32F3A45B1DC134A94341DDAEE0364505
SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE
7628WinRAR.exeC:\Users\admin\Desktop\swift copia rapida.exeexecutable
MD5:32F3A45B1DC134A94341DDAEE0364505
SHA256:5931DF88879E9F85851591A26D2B14FAD0C4F3599A5222F06C154414CDCF79FE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
66
DNS requests
24
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7900
swift copia rapida.exe
POST
404
49.13.77.253:80
http://18panels.info/jemp/fre.php
unknown
malicious
7900
swift copia rapida.exe
POST
404
49.13.77.253:80
http://18panels.info/jemp/fre.php
unknown
malicious
7900
swift copia rapida.exe
POST
404
49.13.77.253:80
http://18panels.info/jemp/fre.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2600
OUTLOOK.EXE
52.109.28.46:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
2600
OUTLOOK.EXE
52.123.129.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2600
OUTLOOK.EXE
52.109.76.243:443
roaming.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2600
OUTLOOK.EXE
2.16.168.119:443
omex.cdn.office.net
Akamai International B.V.
RU
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.238
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
ecs.office.com
  • 52.123.129.14
  • 52.123.128.14
whitelisted
roaming.officeapps.live.com
  • 52.109.76.243
whitelisted
login.live.com
  • 40.126.32.136
  • 20.190.160.128
  • 20.190.160.2
  • 40.126.32.133
  • 20.190.160.5
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.132
whitelisted
omex.cdn.office.net
  • 2.16.168.119
  • 2.16.168.101
whitelisted
nleditor.osi.office.net
  • 52.111.243.41
  • 52.111.243.43
  • 52.111.243.40
  • 52.111.243.42
whitelisted
odc.officeapps.live.com
  • 52.109.76.144
whitelisted

Threats

PID
Process
Class
Message
7900
swift copia rapida.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
7900
swift copia rapida.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
7900
swift copia rapida.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
7900
swift copia rapida.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
7900
swift copia rapida.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
7900
swift copia rapida.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
7900
swift copia rapida.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
7900
swift copia rapida.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M1
7900
swift copia rapida.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M2
7900
swift copia rapida.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
No debug info