Overview
overview
10Static
static
10LockBit30/Build.bat
windows7-x64
1LockBit30/Build.bat
windows10-1703-x64
1LockBit30/Build.bat
windows10-2004-x64
1LockBit30/builder.exe
windows7-x64
1LockBit30/builder.exe
windows10-1703-x64
1LockBit30/builder.exe
windows10-2004-x64
1LockBit30/keygen.exe
windows7-x64
1LockBit30/keygen.exe
windows10-1703-x64
1LockBit30/keygen.exe
windows10-2004-x64
1Resubmissions
13-11-2022 18:00
221113-wll9wacb66 1022-09-2022 05:49
220922-gjgt2sabf4 1021-09-2022 18:45
220921-xefn7aghd5 10Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-11-2022 18:00
Behavioral task
behavioral1
Sample
LockBit30/Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LockBit30/Build.bat
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
LockBit30/Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
LockBit30/builder.exe
Resource
win7-20220901-en
Behavioral task
behavioral5
Sample
LockBit30/builder.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
LockBit30/builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
LockBit30/keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
LockBit30/keygen.exe
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
LockBit30/keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
LockBit30/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 1472 keygen.exe 1144 builder.exe 760 builder.exe 888 builder.exe 800 builder.exe 1620 builder.exe 1724 builder.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1472 1504 cmd.exe 27 PID 1504 wrote to memory of 1472 1504 cmd.exe 27 PID 1504 wrote to memory of 1472 1504 cmd.exe 27 PID 1504 wrote to memory of 1472 1504 cmd.exe 27 PID 1504 wrote to memory of 1144 1504 cmd.exe 28 PID 1504 wrote to memory of 1144 1504 cmd.exe 28 PID 1504 wrote to memory of 1144 1504 cmd.exe 28 PID 1504 wrote to memory of 1144 1504 cmd.exe 28 PID 1504 wrote to memory of 760 1504 cmd.exe 29 PID 1504 wrote to memory of 760 1504 cmd.exe 29 PID 1504 wrote to memory of 760 1504 cmd.exe 29 PID 1504 wrote to memory of 760 1504 cmd.exe 29 PID 1504 wrote to memory of 888 1504 cmd.exe 30 PID 1504 wrote to memory of 888 1504 cmd.exe 30 PID 1504 wrote to memory of 888 1504 cmd.exe 30 PID 1504 wrote to memory of 888 1504 cmd.exe 30 PID 1504 wrote to memory of 800 1504 cmd.exe 31 PID 1504 wrote to memory of 800 1504 cmd.exe 31 PID 1504 wrote to memory of 800 1504 cmd.exe 31 PID 1504 wrote to memory of 800 1504 cmd.exe 31 PID 1504 wrote to memory of 1620 1504 cmd.exe 32 PID 1504 wrote to memory of 1620 1504 cmd.exe 32 PID 1504 wrote to memory of 1620 1504 cmd.exe 32 PID 1504 wrote to memory of 1620 1504 cmd.exe 32 PID 1504 wrote to memory of 1724 1504 cmd.exe 33 PID 1504 wrote to memory of 1724 1504 cmd.exe 33 PID 1504 wrote to memory of 1724 1504 cmd.exe 33 PID 1504 wrote to memory of 1724 1504 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\LockBit30\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\LockBit30\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\LockBit30\Build -pubkey pub.key -privkey priv.key2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3Decryptor.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_pass.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32_pass.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD50cf778dbdc46e5312713ca80f87d11fa
SHA17cefdee8da3e66c9bb9b200bb2970b2817aee51a
SHA256a2c53ba07122066aa8a6aa2e1a28b1b6ed30c104768d2919e2fdc40ecb841936
SHA51289b4e425a0b6d5c981f08bd11fa72194bea64a9fadc7d9beae419da1eafac6ecef36d69ba779421ae9d9b22c3fe4f76f9d9587bd35ec9119cc921bb007f612dc
-
Filesize
344B
MD5c50ba2951e2b688a7f3949ffb19295f2
SHA13a62ebd8889e66beedcb735348420187f75b56c8
SHA256af8a0399819e5bcf357c68be7749a28e76c6b1faf9807a660e0261395a488a0e
SHA512815bf0b182b63f94750239989458ca2d9d644473e14b24f5d1aefe79eaedae4a261a8b192d217128105ccb99b4ef6fb32fda976dda540efa92b9675a17123d35