Overview
overview
10Static
static
10LockBit30/Build.bat
windows7-x64
1LockBit30/Build.bat
windows10-1703-x64
1LockBit30/Build.bat
windows10-2004-x64
1LockBit30/builder.exe
windows7-x64
1LockBit30/builder.exe
windows10-1703-x64
1LockBit30/builder.exe
windows10-2004-x64
1LockBit30/keygen.exe
windows7-x64
1LockBit30/keygen.exe
windows10-1703-x64
1LockBit30/keygen.exe
windows10-2004-x64
1Resubmissions
13-11-2022 18:00
221113-wll9wacb66 1022-09-2022 05:49
220922-gjgt2sabf4 1021-09-2022 18:45
220921-xefn7aghd5 10Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2022 18:00
Behavioral task
behavioral1
Sample
LockBit30/Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LockBit30/Build.bat
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
LockBit30/Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
LockBit30/builder.exe
Resource
win7-20220901-en
Behavioral task
behavioral5
Sample
LockBit30/builder.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
LockBit30/builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
LockBit30/keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
LockBit30/keygen.exe
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
LockBit30/keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
LockBit30/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2544 2280 cmd.exe 81 PID 2280 wrote to memory of 2544 2280 cmd.exe 81 PID 2280 wrote to memory of 2544 2280 cmd.exe 81 PID 2280 wrote to memory of 1844 2280 cmd.exe 82 PID 2280 wrote to memory of 1844 2280 cmd.exe 82 PID 2280 wrote to memory of 1844 2280 cmd.exe 82 PID 2280 wrote to memory of 1556 2280 cmd.exe 83 PID 2280 wrote to memory of 1556 2280 cmd.exe 83 PID 2280 wrote to memory of 1556 2280 cmd.exe 83 PID 2280 wrote to memory of 3972 2280 cmd.exe 84 PID 2280 wrote to memory of 3972 2280 cmd.exe 84 PID 2280 wrote to memory of 3972 2280 cmd.exe 84 PID 2280 wrote to memory of 3400 2280 cmd.exe 85 PID 2280 wrote to memory of 3400 2280 cmd.exe 85 PID 2280 wrote to memory of 3400 2280 cmd.exe 85 PID 2280 wrote to memory of 3256 2280 cmd.exe 86 PID 2280 wrote to memory of 3256 2280 cmd.exe 86 PID 2280 wrote to memory of 3256 2280 cmd.exe 86 PID 2280 wrote to memory of 3728 2280 cmd.exe 87 PID 2280 wrote to memory of 3728 2280 cmd.exe 87 PID 2280 wrote to memory of 3728 2280 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LockBit30\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\LockBit30\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\LockBit30\Build -pubkey pub.key -privkey priv.key2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3Decryptor.exe2⤵PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3.exe2⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_pass.exe2⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32.dll2⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_Rundll32_pass.dll2⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit30\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:3728
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD55946bf575aeea7f2fba6050e25af3803
SHA128d78f48c0d00996df41f7b6326e6d7bd3b7df0c
SHA256aaa353efc6cd20bcc25d080b4bb1d39f46193967982c0d55079c18519a3b41b3
SHA51292c0a5dc8adbaa2af86c5662c3749292d926ad5b123e88c75db3a79a7f403e76deea326d20d228b8a226b672cd60a8b9c58e0115b0247c9bd168d94984d6d2eb
-
Filesize
344B
MD5515c832372cebdbf67d1c6e5cd4cb0dc
SHA113a125d2567b70989b9f42e3125ff8846acb16f0
SHA256abd76a3834aee7c9450786f85ff7a6e04629809a219a3a2d83bb558885157958
SHA512fd39e61c75ba9f63e5de92621f25914798e7fb9990851d2af48ae67e9120cc0acbb1e22526936ceb004023da0438bb13f3f481e3e9bb3b30a7ec0c86cf312606