Analysis
-
max time kernel
132s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe
Resource
win10v2004-20220414-en
General
-
Target
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe
-
Size
445KB
-
MD5
1a7eb7fc0b6c28388e1f1e3beab03892
-
SHA1
0fdbdc0e8aa192f245ce68888012313c81a95be0
-
SHA256
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d
-
SHA512
b08ad87c757236e1eaa3669c185610aae19c83ed51248d9bbeb7c5ded936d6ce45f7fe7fc71b9fdbec1fb2ace9bac397d0e72b3b885917a9f6f0030c8ecddc1d
Malware Config
Extracted
C:\Program Files\7-Zip\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?DFB941278EE2558CAFF12CE3F728BA43
http://lockbitks2tvnmwk.onion/?DFB941278EE2558CAFF12CE3F728BA43
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
http://lockbit-decryptor.top/?DFB941278EE2558CAFF12CE3F728BA43
http://lockbitks2tvnmwk.onion/?DFB941278EE2558CAFF12CE3F728BA43
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 556 bcdedit.exe 1332 bcdedit.exe -
Processes:
wbadmin.exepid process 1384 wbadmin.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exedescription ioc process File renamed C:\Users\Admin\Pictures\LockMove.png => C:\Users\Admin\Pictures\LockMove.png.lockbit c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File renamed C:\Users\Admin\Pictures\DismountRename.raw => C:\Users\Admin\Pictures\DismountRename.raw.lockbit c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3056 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe\"" c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\Users\\Admin\\Desktop\\LockBit-note.hta" c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DF39.tmp.bmp" c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exepid process 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Drops file in Program Files directory 64 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-compat.xml c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\channel-prefs.js c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\settings.html c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\21.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\InfoPathWelcomeImage.jpg c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_divider_right.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\settings.html c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\settings.css c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-plaf.xml c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\Sidebar.exe.mui c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215070.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_few-showers.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\weather.js c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0233512.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Cape_Verde c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_down.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10890_.GIF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01852_.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single_bkg.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\settings.js c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_down.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Marquesas c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00641_.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01300_.GIF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0196164.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\BackupTrace.M2T c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Godthab c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\jaccess.jar c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234000.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_left.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301050.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\triangle.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\settings.html c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\msmdsrv.rll c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099147.JPG c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01221K.JPG c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0215086.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\Restore-My-Files.txt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\203x8subpicture.png c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\currency.js c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\1 Right.accdt c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.XLS c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Lima c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\file_obj.gif c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\appletrailers.luac c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\sbdrop.dll.mui c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01631_.WMF c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 816 vssadmin.exe -
Modifies Control Panel 2 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\WallpaperStyle = "2" c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\TileWallpaper = "0" c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exepid process 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exevssvc.exeWMIC.exewbengine.exedescription pid process Token: SeTakeOwnershipPrivilege 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Token: SeDebugPrivilege 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe Token: SeBackupPrivilege 1240 vssvc.exe Token: SeRestorePrivilege 1240 vssvc.exe Token: SeAuditPrivilege 1240 vssvc.exe Token: SeIncreaseQuotaPrivilege 2036 WMIC.exe Token: SeSecurityPrivilege 2036 WMIC.exe Token: SeTakeOwnershipPrivilege 2036 WMIC.exe Token: SeLoadDriverPrivilege 2036 WMIC.exe Token: SeSystemProfilePrivilege 2036 WMIC.exe Token: SeSystemtimePrivilege 2036 WMIC.exe Token: SeProfSingleProcessPrivilege 2036 WMIC.exe Token: SeIncBasePriorityPrivilege 2036 WMIC.exe Token: SeCreatePagefilePrivilege 2036 WMIC.exe Token: SeBackupPrivilege 2036 WMIC.exe Token: SeRestorePrivilege 2036 WMIC.exe Token: SeShutdownPrivilege 2036 WMIC.exe Token: SeDebugPrivilege 2036 WMIC.exe Token: SeSystemEnvironmentPrivilege 2036 WMIC.exe Token: SeRemoteShutdownPrivilege 2036 WMIC.exe Token: SeUndockPrivilege 2036 WMIC.exe Token: SeManageVolumePrivilege 2036 WMIC.exe Token: 33 2036 WMIC.exe Token: 34 2036 WMIC.exe Token: 35 2036 WMIC.exe Token: SeIncreaseQuotaPrivilege 2036 WMIC.exe Token: SeSecurityPrivilege 2036 WMIC.exe Token: SeTakeOwnershipPrivilege 2036 WMIC.exe Token: SeLoadDriverPrivilege 2036 WMIC.exe Token: SeSystemProfilePrivilege 2036 WMIC.exe Token: SeSystemtimePrivilege 2036 WMIC.exe Token: SeProfSingleProcessPrivilege 2036 WMIC.exe Token: SeIncBasePriorityPrivilege 2036 WMIC.exe Token: SeCreatePagefilePrivilege 2036 WMIC.exe Token: SeBackupPrivilege 2036 WMIC.exe Token: SeRestorePrivilege 2036 WMIC.exe Token: SeShutdownPrivilege 2036 WMIC.exe Token: SeDebugPrivilege 2036 WMIC.exe Token: SeSystemEnvironmentPrivilege 2036 WMIC.exe Token: SeRemoteShutdownPrivilege 2036 WMIC.exe Token: SeUndockPrivilege 2036 WMIC.exe Token: SeManageVolumePrivilege 2036 WMIC.exe Token: 33 2036 WMIC.exe Token: 34 2036 WMIC.exe Token: 35 2036 WMIC.exe Token: SeBackupPrivilege 1228 wbengine.exe Token: SeRestorePrivilege 1228 wbengine.exe Token: SeSecurityPrivilege 1228 wbengine.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.execmd.execmd.exedescription pid process target process PID 968 wrote to memory of 1428 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 1428 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 1428 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 1428 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 1428 wrote to memory of 816 1428 cmd.exe vssadmin.exe PID 1428 wrote to memory of 816 1428 cmd.exe vssadmin.exe PID 1428 wrote to memory of 816 1428 cmd.exe vssadmin.exe PID 1428 wrote to memory of 2036 1428 cmd.exe WMIC.exe PID 1428 wrote to memory of 2036 1428 cmd.exe WMIC.exe PID 1428 wrote to memory of 2036 1428 cmd.exe WMIC.exe PID 1428 wrote to memory of 556 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 556 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 556 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 1332 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 1332 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 1332 1428 cmd.exe bcdedit.exe PID 1428 wrote to memory of 1384 1428 cmd.exe wbadmin.exe PID 1428 wrote to memory of 1384 1428 cmd.exe wbadmin.exe PID 1428 wrote to memory of 1384 1428 cmd.exe wbadmin.exe PID 968 wrote to memory of 3040 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe mshta.exe PID 968 wrote to memory of 3040 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe mshta.exe PID 968 wrote to memory of 3040 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe mshta.exe PID 968 wrote to memory of 3040 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe mshta.exe PID 968 wrote to memory of 3056 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 3056 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 3056 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 968 wrote to memory of 3056 968 c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe cmd.exe PID 3056 wrote to memory of 2848 3056 cmd.exe PING.EXE PID 3056 wrote to memory of 2848 3056 cmd.exe PING.EXE PID 3056 wrote to memory of 2848 3056 cmd.exe PING.EXE PID 3056 wrote to memory of 2848 3056 cmd.exe PING.EXE PID 3056 wrote to memory of 1276 3056 cmd.exe fsutil.exe PID 3056 wrote to memory of 1276 3056 cmd.exe fsutil.exe PID 3056 wrote to memory of 1276 3056 cmd.exe fsutil.exe PID 3056 wrote to memory of 1276 3056 cmd.exe fsutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe"C:\Users\Admin\AppData\Local\Temp\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\LockBit-note.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe" & Del /f /q "C:\Users\Admin\AppData\Local\Temp\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\c66519665d397eafb24e44f562e822fc7c98f02afe44f9ab179ee8048af7596d.exe"3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\LockBit-note.htaFilesize
17KB
MD5d0dbcefd9d09b281aac111b695854370
SHA133a9a2c5177ce4a00300dd6e1de8bc6010bcefbe
SHA256de1ec9f1c0b95d7163e042f7a03817c7e2b37edb5eac39d97204b93fa75a45f2
SHA512f785aee13f7e1955ed9582c06a346152d95be40ae357af2e64140939e099b487f4bd61b74eeacdea2e2a6550acb44d84f690657fe9ddd91219ecd83af3c87151
-
memory/556-61-0x0000000000000000-mapping.dmp
-
memory/816-56-0x0000000000000000-mapping.dmp
-
memory/968-54-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/968-58-0x00000000001B0000-0x00000000001D6000-memory.dmpFilesize
152KB
-
memory/968-57-0x00000000002B7000-0x00000000002CE000-memory.dmpFilesize
92KB
-
memory/968-59-0x0000000000400000-0x000000000232C000-memory.dmpFilesize
31.2MB
-
memory/1276-76-0x0000000000000000-mapping.dmp
-
memory/1332-62-0x0000000000000000-mapping.dmp
-
memory/1384-63-0x0000000000000000-mapping.dmp
-
memory/1384-64-0x000007FEFB721000-0x000007FEFB723000-memory.dmpFilesize
8KB
-
memory/1428-55-0x0000000000000000-mapping.dmp
-
memory/2036-60-0x0000000000000000-mapping.dmp
-
memory/2848-67-0x0000000000000000-mapping.dmp
-
memory/3040-65-0x0000000000000000-mapping.dmp
-
memory/3056-66-0x0000000000000000-mapping.dmp