Analysis
-
max time kernel
107s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2022 18:23
Static task
static1
Behavioral task
behavioral1
Sample
hi.ps1
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
hi.ps1
Resource
win10v2004-20220812-en
General
-
Target
hi.ps1
-
Size
1.5MB
-
MD5
a89167e3878eb3c1d77e6aa0503eb108
-
SHA1
7a377cbacdb226209e4a0b8e266183c344707275
-
SHA256
a497aca3c4321e9ed7b437aca33b823a5905b1a6dcc0e52da8f5a5ad38ef48d7
-
SHA512
33272d9bd5557ec18cbddec936f040460c69b94421f60fcf0eb0b1e52a439207e2fc60e8dcd09b93ad789cdc633f80403ccfd9d3f1f4cd47387f111658ef901d
-
SSDEEP
24576:mC8RxPoWBiohwATmAvDVu8XrP+H9AXa9rh:GRZJ1Pm8ZA
Malware Config
Extracted
C:\8Fp4QiPet.README.txt
lockbit
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion.ly
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion.ly
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion.ly
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion
https://gdpr.eu/what-is-gdpr/
https://gdpr-info.eu/
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Executes dropped EXE 1 IoCs
Processes:
F5D9.tmppid process 3872 F5D9.tmp -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
powershell.exedescription ioc process File renamed C:\Users\Admin\Pictures\CompressRead.tiff => C:\Users\Admin\Pictures\CompressRead.tiff.8Fp4QiPet powershell.exe File renamed C:\Users\Admin\Pictures\InvokeSplit.png => C:\Users\Admin\Pictures\InvokeSplit.png.8Fp4QiPet powershell.exe File renamed C:\Users\Admin\Pictures\RedoComplete.crw => C:\Users\Admin\Pictures\RedoComplete.crw.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\StopBlock.tif.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\CompressRead.tiff powershell.exe File opened for modification C:\Users\Admin\Pictures\CompressRead.tiff.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\InvokeSplit.png.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\ResolveResize.tiff powershell.exe File renamed C:\Users\Admin\Pictures\PublishConnect.png => C:\Users\Admin\Pictures\PublishConnect.png.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\PublishConnect.png.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\ResolveResize.tiff.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\UnblockRedo.png.8Fp4QiPet powershell.exe File opened for modification C:\Users\Admin\Pictures\RedoComplete.crw.8Fp4QiPet powershell.exe File renamed C:\Users\Admin\Pictures\ResolveResize.tiff => C:\Users\Admin\Pictures\ResolveResize.tiff.8Fp4QiPet powershell.exe File renamed C:\Users\Admin\Pictures\StopBlock.tif => C:\Users\Admin\Pictures\StopBlock.tif.8Fp4QiPet powershell.exe File renamed C:\Users\Admin\Pictures\UnblockRedo.png => C:\Users\Admin\Pictures\UnblockRedo.png.8Fp4QiPet powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\8Fp4QiPet.bmp" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\8Fp4QiPet.bmp" powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
powershell.exeF5D9.tmppid process 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp -
Modifies registry class 5 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\8Fp4QiPet\DefaultIcon powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\8Fp4QiPet powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\8Fp4QiPet\DefaultIcon\ = "C:\\ProgramData\\8Fp4QiPet.ico" powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.8Fp4QiPet powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.8Fp4QiPet\ = "8Fp4QiPet" powershell.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exepid process 4972 powershell.exe 4972 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe 4136 powershell.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
F5D9.tmppid process 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp 3872 F5D9.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 4136 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeDebugPrivilege 4136 powershell.exe Token: 36 4136 powershell.exe Token: SeImpersonatePrivilege 4136 powershell.exe Token: SeIncBasePriorityPrivilege 4136 powershell.exe Token: SeIncreaseQuotaPrivilege 4136 powershell.exe Token: 33 4136 powershell.exe Token: SeManageVolumePrivilege 4136 powershell.exe Token: SeProfSingleProcessPrivilege 4136 powershell.exe Token: SeRestorePrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSystemProfilePrivilege 4136 powershell.exe Token: SeTakeOwnershipPrivilege 4136 powershell.exe Token: SeShutdownPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeDebugPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe Token: SeBackupPrivilege 4136 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 4972 wrote to memory of 4136 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 4136 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 4136 4972 powershell.exe powershell.exe PID 4136 wrote to memory of 3872 4136 powershell.exe F5D9.tmp PID 4136 wrote to memory of 3872 4136 powershell.exe F5D9.tmp PID 4136 wrote to memory of 3872 4136 powershell.exe F5D9.tmp PID 4136 wrote to memory of 3872 4136 powershell.exe F5D9.tmp
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\hi.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\hi.ps12⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\ProgramData\F5D9.tmp"C:\ProgramData\F5D9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
PID:3872
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
1KB
MD53cbb28a8f1f8a27e783477941d14b23c
SHA133954a514b48e37d15d0257b5a8d04cf5097e083
SHA2563c121a0b0e2b9a6a262db98c3f3375f4b5a1a72c766426ffff4269954317348b
SHA5124f3415b0ac959a58ebfcfbee0997c1d2be4d0856c359e76f1be7006341c43e336cead25a33b9912fa7c6fdcdefb90e918c6223e748db4134135a7d9536f9c671