Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/02/2023, 18:48
Behavioral task
behavioral1
Sample
LB3_pass.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
LB3_pass.exe
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
LB3_pass.exe
-
Size
149KB
-
MD5
43e05ce9ffcf4948d7ee11ff17d5a596
-
SHA1
13d714a431fac8572b3e2b63f65fb067fd145293
-
SHA256
87184bbef239d3062c4af872fc5b43fb79622ce2e0c6072e40e3c3622b0e52d9
-
SHA512
1319c80c5bb77f046dc0fc2af8c669cceb5c80c3f633614da87c45918eef2eb58f8811e5617d32f9e8616d1b4ba48ae28ea81da84600afe5bafde6ae46d3fc27
-
SSDEEP
3072:oltWxaOXKDIzkpN7anX/YhbtX0V+GFkofkGDgAIYkyRgD+Pdt9:IIxaOXKDIzqN7oXAdtkvFk2kGDw2DT9
Score
10/10
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/memory/1684-55-0x0000000000400000-0x0000000000429000-memory.dmp family_lockbit -
Program crash 1 IoCs
pid pid_target Process procid_target 836 1684 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 836 1684 LB3_pass.exe 27 PID 1684 wrote to memory of 836 1684 LB3_pass.exe 27 PID 1684 wrote to memory of 836 1684 LB3_pass.exe 27 PID 1684 wrote to memory of 836 1684 LB3_pass.exe 27