Analysis

  • max time kernel
    8s
  • max time network
    11s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-02-2022 22:29

General

  • Target

    LegionLocker.exe

  • Size

    3.4MB

  • MD5

    ff781960baad7ac1974e254bbc7d8044

  • SHA1

    263450e71b84d608d40448c73add2719875c4732

  • SHA256

    9d13fde85da13d3c9533ace39fdfb71c95419f002c946265e6d12030890d8b9d

  • SHA512

    fc572d058d0c4782621d069cc9d16b575363bdd51a3d50bedc4b91b12c0e6ac6d93256ae9266c5cac17878dd0da474477bc283735e8d4decf206e68150495d8a

Malware Config

Signatures

  • Detected LegionLocker ransomware 2 IoCs

    Sample contains strings associated with the LegionLocker family.

  • LegionLocker

    Ransomware family active in 2021.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LegionLocker.exe
    "C:\Users\Admin\AppData\Local\Temp\LegionLocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe
      "C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe

    MD5

    904434f10fefb2cdfe574f6fcd2573d7

    SHA1

    fda429015089c1f3d60ec1cca0248ed0bc51ee5b

    SHA256

    33c4f35afa5f31459379029f461b3f3eeb1794f3b54972f7482adf414ea81196

    SHA512

    bd91d6ba75fb8e2cf6e28d0aa6eb0df814213edc0e10a5e687602945b13193528015d83820dfda5f33b2bd41d5ea02ecf3c4959c3957a784f32578d2a68fe50a

  • C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe

    MD5

    904434f10fefb2cdfe574f6fcd2573d7

    SHA1

    fda429015089c1f3d60ec1cca0248ed0bc51ee5b

    SHA256

    33c4f35afa5f31459379029f461b3f3eeb1794f3b54972f7482adf414ea81196

    SHA512

    bd91d6ba75fb8e2cf6e28d0aa6eb0df814213edc0e10a5e687602945b13193528015d83820dfda5f33b2bd41d5ea02ecf3c4959c3957a784f32578d2a68fe50a

  • memory/1940-130-0x0000000000380000-0x00000000006F0000-memory.dmp

    Filesize

    3.4MB

  • memory/1940-131-0x0000000005610000-0x0000000005BB4000-memory.dmp

    Filesize

    5.6MB

  • memory/1940-132-0x0000000005100000-0x0000000005192000-memory.dmp

    Filesize

    584KB

  • memory/1940-133-0x00000000050A0000-0x00000000050AA000-memory.dmp

    Filesize

    40KB

  • memory/1940-134-0x0000000005060000-0x0000000005604000-memory.dmp

    Filesize

    5.6MB

  • memory/4580-140-0x0000000000D00000-0x00000000015D4000-memory.dmp

    Filesize

    8.8MB

  • memory/4580-141-0x0000000000D00000-0x00000000015D4000-memory.dmp

    Filesize

    8.8MB