Analysis

  • max time kernel
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 17:40

General

  • Target

    90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91.exe

  • Size

    276KB

  • MD5

    0f98b7b43ab1b3e2a957c5361fc403cd

  • SHA1

    6afc0ae820991afcf9d6eeab0cbb68378b2f8d00

  • SHA256

    90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91

  • SHA512

    f56b1fbf9ec6c63807882166fd8845ba4660eb16403706d4d0b3c4ee3de8a86549771e516d017058da9a023f787b997855733b975ad98569975655d92101ffb3

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������AA 23 40 5F EE 8A A8 A9 79 BB 81 DB A2 4A BE 68 C6 78 B2 66 E3 1E 2F 04 26 5C 9D 0B 67 0C 13 89 65 37 69 85 5C 3F 31 89 26 CE 8F 9B 79 9B 93 2D C2 DB 6C 04 68 65 D4 F2 1B 5B CA 21 6C 24 98 E3 E2 E8 F7 0F AB 26 07 7F C4 18 80 A4 7D 43 23 6B 0C 25 A7 5E 8E BD 7B F1 1A 7C BF BC 33 35 6D DE F8 F5 5C 1D 0F BE 9A 43 87 92 79 8D E5 EC E4 4A 77 6D 5E 71 B1 9C 4D AE 26 93 FD 36 90 94 B2 ED CE 82 22 37 3B 12 72 CD 64 E3 57 96 83 C2 06 CB 70 2D 63 8E DD 75 4D 0C E5 1E 5D E3 A0 0B 73 69 49 62 59 41 F4 2C 6F 71 A6 A9 79 19 25 07 8B C1 7D 66 67 43 07 24 83 80 E5 12 9F 2E 52 0A E7 22 49 A2 03 0E 26 40 C6 6A EE D8 BE 97 58 C8 12 AC 22 C4 93 08 1F 59 12 34 5D 09 5D BC 81 49 1F 5A 77 EA 07 BC 4C 65 C9 D1 E4 F8 BC 0C C2 5F 80 5A FA 26 D9 F5 53 86 45 C5 2A FF D9 5D 9C 24 C1 62 ###�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 24 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91.exe
    "C:\Users\Admin\AppData\Local\Temp\90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Users\Admin\AppData\Local\Temp\90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91.exe
      "C:\Users\Admin\AppData\Local\Temp\90f277b97d30399367a7e56551bbf2135c4968ade64100863095dc7031f34c91.exe"
      2⤵
      • Modifies extensions of user files
      • Drops desktop.ini file(s)
      PID:3972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3972-135-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4320-132-0x0000000000380000-0x00000000003CA000-memory.dmp

    Filesize

    296KB

  • memory/4320-134-0x0000000000380000-0x00000000003CA000-memory.dmp

    Filesize

    296KB