Resubmissions

07/02/2023, 14:41

230207-r2r3vafd7x 10

02/02/2023, 23:16

230202-29e4csgh28 10

Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 14:41

General

  • Target

    c442383af4a3bb13538949702c54304c60167cd9dccf3cb2a356895572f161d9.dll

  • Size

    148KB

  • MD5

    8aa31303568c6cff3e3759cc08f548ac

  • SHA1

    5cf23b5b264a2c7302a2b6e9b3cf92897fcb61a8

  • SHA256

    c442383af4a3bb13538949702c54304c60167cd9dccf3cb2a356895572f161d9

  • SHA512

    1d6301f5d953ede442c0d8db0efe4a0fc27b5291706b5baff656c2ec94c33e3ddc41435671578d4f3799a5160e9ce239dfe3f8841026140e2995749e4008f4a4

  • SSDEEP

    3072:gYlD/mN2iSGcSq9t//E/KFoQzW2P6nLxWKGwzqEt/I45a6ohMPS3mpDvDWAWyBPr:gYJ/O3ST9xPt62PaIwjw45joSpD7qUr

Score
10/10

Malware Config

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c442383af4a3bb13538949702c54304c60167cd9dccf3cb2a356895572f161d9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c442383af4a3bb13538949702c54304c60167cd9dccf3cb2a356895572f161d9.dll,#1
      2⤵
        PID:4840

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4840-133-0x0000000010000000-0x0000000010029000-memory.dmp

            Filesize

            164KB