Overview
overview
10Static
static
10LockBit30/Build.bat
windows7-x64
1LockBit30/Build.bat
windows10-1703-x64
1LockBit30/Build.bat
windows10-2004-x64
1LockBit30/builder.exe
windows7-x64
1LockBit30/builder.exe
windows10-1703-x64
1LockBit30/builder.exe
windows10-2004-x64
1LockBit30/keygen.exe
windows7-x64
1LockBit30/keygen.exe
windows10-1703-x64
1LockBit30/keygen.exe
windows10-2004-x64
1Resubmissions
13-11-2022 18:00
221113-wll9wacb66 1022-09-2022 05:49
220922-gjgt2sabf4 1021-09-2022 18:45
220921-xefn7aghd5 10Analysis
-
max time kernel
49s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2022 18:00
Behavioral task
behavioral1
Sample
LockBit30/Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LockBit30/Build.bat
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
LockBit30/Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
LockBit30/builder.exe
Resource
win7-20220901-en
Behavioral task
behavioral5
Sample
LockBit30/builder.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
LockBit30/builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
LockBit30/keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
LockBit30/keygen.exe
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
LockBit30/keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
LockBit30/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 392 wrote to memory of 3084 392 cmd.exe 67 PID 392 wrote to memory of 3084 392 cmd.exe 67 PID 392 wrote to memory of 3084 392 cmd.exe 67 PID 392 wrote to memory of 2260 392 cmd.exe 68 PID 392 wrote to memory of 2260 392 cmd.exe 68 PID 392 wrote to memory of 2260 392 cmd.exe 68 PID 392 wrote to memory of 4580 392 cmd.exe 69 PID 392 wrote to memory of 4580 392 cmd.exe 69 PID 392 wrote to memory of 4580 392 cmd.exe 69 PID 392 wrote to memory of 1524 392 cmd.exe 70 PID 392 wrote to memory of 1524 392 cmd.exe 70 PID 392 wrote to memory of 1524 392 cmd.exe 70 PID 392 wrote to memory of 4600 392 cmd.exe 71 PID 392 wrote to memory of 4600 392 cmd.exe 71 PID 392 wrote to memory of 4600 392 cmd.exe 71 PID 392 wrote to memory of 4908 392 cmd.exe 72 PID 392 wrote to memory of 4908 392 cmd.exe 72 PID 392 wrote to memory of 4908 392 cmd.exe 72 PID 392 wrote to memory of 3276 392 cmd.exe 73 PID 392 wrote to memory of 3276 392 cmd.exe 73 PID 392 wrote to memory of 3276 392 cmd.exe 73
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LockBit30\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\LockBit30\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\LockBit30\Build -pubkey pub.key -privkey priv.key2⤵PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3Decryptor.exe2⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3.exe2⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_pass.exe2⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32.dll2⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32_pass.dll2⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:3276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5c132f4862c68786dfba9743ff4d06006
SHA12fbdaa3d52a43610fb9691ad9751180d86eef876
SHA25645ac057fbfef18b23dcec0dd88271f7f87107716881c576e440eaaaa85f81021
SHA51206d9b4cfcbe7cbaf28e8cb0d689224c60e5601b7b35488d6ea373e5583bcbf28ea15cf5af138fa64d4938cb8b72c05e85d74351900dc558bdc475f818e8f2c16
-
Filesize
344B
MD5f6ff95aab9fc53175163c1fcdac05691
SHA137ebedd9325260277deca69636996082d45a5c69
SHA25681eb8c4fbac9245a36af6d15e220fc392283dca7b3571e394c072ec6a2aa8421
SHA51288b08c1cb1c9d241f46dbf54633361c9042d8f206839cb5794da5ed7f2996fa721c90db338e20e0e94c19854d2b5b73c72f2d252cbe209894000967ec43685e6