Analysis
-
max time kernel
151s -
max time network
61s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 04:55
Static task
static1
Behavioral task
behavioral1
Sample
LegionLocker4.1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
LegionLocker4.1.exe
Resource
win10v20210408
General
-
Target
LegionLocker4.1.exe
-
Size
3.2MB
-
MD5
563059c1ba238fb233200b053327313d
-
SHA1
c50908fe140fe127a6c2168ad7a07df6b9836186
-
SHA256
a4e002898d11ea511868a11a43dd29011dbe97bcbd9ee4b9fbcb0520d860f975
-
SHA512
9bbfe87044543ecf7fc6c865fad533ce864309c63cbff070c7f69ec1373392d149628c58bc7312bf72aae2aaecd6874c5ec95542042df6f34d65570da5d810bb
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt
131fjhrB4wH8j6adZXudp1Wn23pR33tpAh
http://mail2tor2zyjdctd.onion/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" LegionLocker4.1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Disables Task Manager via registry modification
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertToClear.crw => C:\Users\Admin\Pictures\ConvertToClear.crw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe -
Possible privilege escalation attempt 5 IoCs
pid Process 2004 takeown.exe 1992 icacls.exe 432 takeown.exe 1684 takeown.exe 1928 icacls.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LegionLocker4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LegionLocker4.1.exe -
Modifies file permissions 1 TTPs 5 IoCs
pid Process 1928 icacls.exe 2004 takeown.exe 1992 icacls.exe 432 takeown.exe 1684 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1972-62-0x00000000013B0000-0x00000000013B1000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LegionLocker4.1.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wp.bmp" LegionLocker4.1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1972 LegionLocker4.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1876 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe 1972 LegionLocker4.1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1972 LegionLocker4.1.exe Token: SeDebugPrivilege 1972 LegionLocker4.1.exe Token: SeTakeOwnershipPrivilege 1684 takeown.exe Token: SeTakeOwnershipPrivilege 2004 takeown.exe Token: SeTakeOwnershipPrivilege 432 takeown.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1840 1972 LegionLocker4.1.exe 30 PID 1972 wrote to memory of 1840 1972 LegionLocker4.1.exe 30 PID 1972 wrote to memory of 1840 1972 LegionLocker4.1.exe 30 PID 1972 wrote to memory of 1840 1972 LegionLocker4.1.exe 30 PID 1840 wrote to memory of 1684 1840 cmd.exe 32 PID 1840 wrote to memory of 1684 1840 cmd.exe 32 PID 1840 wrote to memory of 1684 1840 cmd.exe 32 PID 1840 wrote to memory of 1684 1840 cmd.exe 32 PID 1840 wrote to memory of 1928 1840 cmd.exe 33 PID 1840 wrote to memory of 1928 1840 cmd.exe 33 PID 1840 wrote to memory of 1928 1840 cmd.exe 33 PID 1840 wrote to memory of 1928 1840 cmd.exe 33 PID 1840 wrote to memory of 2004 1840 cmd.exe 34 PID 1840 wrote to memory of 2004 1840 cmd.exe 34 PID 1840 wrote to memory of 2004 1840 cmd.exe 34 PID 1840 wrote to memory of 2004 1840 cmd.exe 34 PID 1840 wrote to memory of 1992 1840 cmd.exe 35 PID 1840 wrote to memory of 1992 1840 cmd.exe 35 PID 1840 wrote to memory of 1992 1840 cmd.exe 35 PID 1840 wrote to memory of 1992 1840 cmd.exe 35 PID 1840 wrote to memory of 432 1840 cmd.exe 36 PID 1840 wrote to memory of 432 1840 cmd.exe 36 PID 1840 wrote to memory of 432 1840 cmd.exe 36 PID 1840 wrote to memory of 432 1840 cmd.exe 36 PID 1972 wrote to memory of 1644 1972 LegionLocker4.1.exe 39 PID 1972 wrote to memory of 1644 1972 LegionLocker4.1.exe 39 PID 1972 wrote to memory of 1644 1972 LegionLocker4.1.exe 39 PID 1972 wrote to memory of 1644 1972 LegionLocker4.1.exe 39 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1644 wrote to memory of 864 1644 cmd.exe 41 PID 1972 wrote to memory of 1876 1972 LegionLocker4.1.exe 42 PID 1972 wrote to memory of 1876 1972 LegionLocker4.1.exe 42 PID 1972 wrote to memory of 1876 1972 LegionLocker4.1.exe 42 PID 1972 wrote to memory of 1876 1972 LegionLocker4.1.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies extensions of user files
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant %username%:F && takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant %username%:F && takeown /f C:\Windows\System32\LogonUI.exe && icacls C:\Windows\System32\LogonUI.exe /grant %username%:F && takeown /f C:\bootmgr && icacls C:\bootmgr /grant %username%:F && attrib -s -r -h C:\bootmgr && del C:\bootmgr && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1928
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\drivers3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\drivers /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\LogonUI.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k rundll32 user32.dll,UpdatePerUserSystemParameters && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32 user32.dll,UpdatePerUserSystemParameters3⤵PID:864
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1876
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:1012