Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 05:03
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe
Resource
win10v2004-20220901-en
General
-
Target
HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe
-
Size
3.4MB
-
MD5
35acbf4b0e8cfe8b9c3c2d5da5eb0131
-
SHA1
bc2d3b96b8f5d227b41611f64216753a898e804c
-
SHA256
188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99
-
SHA512
381f3a0867207e9824a1382620c17d1b445e307512982279a285e7cb4ce2f79a7f48b549d5c78e0f1ef707ff10ec249784a1d6e88788eba1e861f492f19fe2ca
-
SSDEEP
98304:NUqA6Sp+ZIogCxfwijqisUzS5Q1J6KtqxxwwpJKILMW:JAOC/MINxxVpEp
Malware Config
Signatures
-
Detected LegionLocker ransomware 2 IoCs
Sample contains strings associated with the LegionLocker family.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe family_legionlocker C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe family_legionlocker -
LegionLocker
Ransomware family active in 2021.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
LegionL0cker.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LegionL0cker.exe -
Executes dropped EXE 1 IoCs
Processes:
LegionL0cker.exepid process 1192 LegionL0cker.exe -
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
LegionL0cker.exedescription ioc process File renamed C:\Users\Admin\Pictures\DisableCompress.raw => C:\Users\Admin\Pictures\DisableCompress.raw.lock LegionL0cker.exe File opened for modification C:\Users\Admin\Pictures\UnprotectSave.tiff LegionL0cker.exe File renamed C:\Users\Admin\Pictures\WaitCompress.tif => C:\Users\Admin\Pictures\WaitCompress.tif.lock LegionL0cker.exe File renamed C:\Users\Admin\Pictures\CheckpointSend.raw => C:\Users\Admin\Pictures\CheckpointSend.raw.lock LegionL0cker.exe File opened for modification C:\Users\Admin\Pictures\ConvertUnpublish.tiff LegionL0cker.exe File renamed C:\Users\Admin\Pictures\ReceiveMove.png => C:\Users\Admin\Pictures\ReceiveMove.png.lock LegionL0cker.exe File opened for modification C:\Users\Admin\Pictures\SearchCheckpoint.tiff LegionL0cker.exe File renamed C:\Users\Admin\Pictures\SearchCheckpoint.tiff => C:\Users\Admin\Pictures\SearchCheckpoint.tiff.lock LegionL0cker.exe File renamed C:\Users\Admin\Pictures\UnprotectSave.tiff => C:\Users\Admin\Pictures\UnprotectSave.tiff.lock LegionL0cker.exe File renamed C:\Users\Admin\Pictures\AssertOut.raw => C:\Users\Admin\Pictures\AssertOut.raw.lock LegionL0cker.exe File renamed C:\Users\Admin\Pictures\ConvertUnpublish.tiff => C:\Users\Admin\Pictures\ConvertUnpublish.tiff.lock LegionL0cker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LegionL0cker.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LegionL0cker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LegionL0cker.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exeLegionL0cker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation LegionL0cker.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe themida C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe themida behavioral2/memory/1192-144-0x0000000000D30000-0x000000000159C000-memory.dmp themida behavioral2/memory/1192-145-0x0000000000D30000-0x000000000159C000-memory.dmp themida -
Processes:
LegionL0cker.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LegionL0cker.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
LegionL0cker.exedescription ioc process File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini LegionL0cker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
LegionL0cker.exepid process 1192 LegionL0cker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 5092 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
LegionL0cker.exepid process 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe 1192 LegionL0cker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
LegionL0cker.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1192 LegionL0cker.exe Token: SeDebugPrivilege 5092 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exeLegionL0cker.execmd.exedescription pid process target process PID 1656 wrote to memory of 1192 1656 HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe LegionL0cker.exe PID 1656 wrote to memory of 1192 1656 HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe LegionL0cker.exe PID 1656 wrote to memory of 1192 1656 HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe LegionL0cker.exe PID 1192 wrote to memory of 1064 1192 LegionL0cker.exe cmd.exe PID 1192 wrote to memory of 1064 1192 LegionL0cker.exe cmd.exe PID 1192 wrote to memory of 1064 1192 LegionL0cker.exe cmd.exe PID 1064 wrote to memory of 5092 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 5092 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 5092 1064 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.Win32.Encoder.vho-188b2408a0b511905428f95eacc3b60f5c9db195fa8493891baf3db8a4de1e99.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe"C:\Users\Admin\AppData\Local\Temp\LegionL0cker.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Modifies extensions of user files
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k color 47 && taskkill /f /im explorer.exe && Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d48b80eadbbe9bfb68f3fbe11a6cf0e5
SHA1c099a07b701c1f06709e181481a5938f9b6e001a
SHA2564cfb6842146846fca052d82cc0f80e23c3a7b23bd5958aecfa6a21e28825a1f0
SHA51218aede3c47814d5a53dafaeab24da4a322ac8ed079640938cba4027903c07e524fee6f7746d0fdfc996bc9ad208441c6f11565fe56d603567d7cdefe4f8389ea
-
Filesize
3.1MB
MD5d48b80eadbbe9bfb68f3fbe11a6cf0e5
SHA1c099a07b701c1f06709e181481a5938f9b6e001a
SHA2564cfb6842146846fca052d82cc0f80e23c3a7b23bd5958aecfa6a21e28825a1f0
SHA51218aede3c47814d5a53dafaeab24da4a322ac8ed079640938cba4027903c07e524fee6f7746d0fdfc996bc9ad208441c6f11565fe56d603567d7cdefe4f8389ea