Analysis

  • max time kernel
    301s
  • max time network
    303s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30/08/2021, 13:44

General

  • Target

    svchost.exe

  • Size

    272KB

  • MD5

    35ebfdabce6eac99d7849916182486d1

  • SHA1

    ea77ddfb8947e5145928937170e8eb29973d05fd

  • SHA256

    84d9ef8cb92d57b178cce655f3f7808c6f5cf42f15c468f741b253f37ffc39fc

  • SHA512

    ea7e7303fa17634c635fa7f0f9a3c3957c52f74bd871d98c54df9ebb1237fa917c6b09293327b815c9793e9374a6d4b92342fc8c0b5f80954797b77ebaa158c6

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Family

lockbit

Ransom Note
All your important files are encrypted! There is only one way to get your files back: 1. Contact with us 2. Send us 1 any encrypted your file and your personal id 3. We will decrypt 1 file for test(maximum file size - 2MG), it is guarantee what we can decrypt your files 4. Pay 5. We send for you decryptor software We accept Bitcoin Attention! Do not rename encrypted files. Do not try to decrypt using third party software, it may cause permanent data loss. Decryption of your files with the help if third parties may cause increase price(they add their fee to our) Contact information: [email protected] Be sure to duplicate your message on the e-mail: [email protected] Your personal id: 2991A971

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\info.hta

Ransom Note
Loki locker All your important files have been encrypted If you want to restore them, write us to the e-mail [email protected] Write this ID in the title of your message 2991A971 In case of no answer in 24 hours write us to this e-mail: [email protected] Free decryption as guarantee Before paying you can send us 1 file for free decryption. The total size of files must be less than 2Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) How to obtain Bitcoins The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Drops desktop.ini file(s) 29 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4648
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C vssadmin delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:4220
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C wmic shadowcopy delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3940
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4092
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C wbadmin delete catalog -quiet
      2⤵
        PID:3216
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
        2⤵
          PID:640
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C bcdedit /set {default} recoveryenabled no
          2⤵
            PID:860
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C netsh advfirewall set currentprofile state off
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:676
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall set currentprofile state off
              3⤵
                PID:1108
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C netsh firewall set opmode mode=disable
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1420
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall set opmode mode=disable
                3⤵
                  PID:1620
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                2⤵
                  PID:4640
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                  2⤵
                    PID:4500
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                    2⤵
                      PID:4320
                    • C:\Windows\SysWOW64\mshta.exe
                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                      2⤵
                        PID:4480
                      • C:\Windows\SysWOW64\mshta.exe
                        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                        2⤵
                          PID:3164
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4268
                      • C:\Windows\system32\NOTEPAD.EXE
                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\Restore-My-Files.txt
                        1⤵
                          PID:4360

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/4648-136-0x0000000000590000-0x0000000000594000-memory.dmp

                          Filesize

                          16KB

                        • memory/4648-121-0x0000000005B00000-0x0000000005B01000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-134-0x0000000006580000-0x0000000006581000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-116-0x0000000002680000-0x00000000026BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/4648-114-0x0000000002540000-0x000000000257E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4648-122-0x0000000005305000-0x0000000005306000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-118-0x0000000005303000-0x0000000005304000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-120-0x0000000002A70000-0x0000000002A71000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-119-0x0000000005304000-0x0000000005305000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-115-0x0000000005400000-0x0000000005401000-memory.dmp

                          Filesize

                          4KB

                        • memory/4648-117-0x0000000005301000-0x0000000005302000-memory.dmp

                          Filesize

                          4KB