Analysis
-
max time kernel
233s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
conti/locker.exe
Resource
win7-20230220-en
General
-
Target
conti/locker.exe
-
Size
1.4MB
-
MD5
f9f2b0dca4ff4365b98599afb5c1e14e
-
SHA1
9cac04b31f29b81c89cfd840e160a1185768c699
-
SHA256
2b19e130390bf1a65c40a909a3dc5ce2af96d921d2bb4949724be9085e0abbe7
-
SHA512
52d586efaeea2e3350e08ce53b3b8fef63c4cd22eab757aa7d42a6534011d505ad14c39b59d70f45a17ed0035bc234fd0dffef209739a81cae8841b214d1308a
-
SSDEEP
12288:GZH7AAO2VRbDEsLC3L79iiauuxJ8QahIha4B7ByfdoiUriupSezaVm:GZH7Hc3L7yJGhIha4B1yfui8b2m
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
locker.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\R3ADM3.txt locker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
locker.exedescription ioc process File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-sl\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Common Files\Services\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\it-it\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fi-fi\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-gb\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ca-es\R3ADM3.txt locker.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-sl\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fr-fr\R3ADM3.txt locker.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\R3ADM3.txt locker.exe File created C:\Program Files\Internet Explorer\images\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-si\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\R3ADM3.txt locker.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\tr-tr\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\uk-ua\R3ADM3.txt locker.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\R3ADM3.txt locker.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pl\R3ADM3.txt locker.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\R3ADM3.txt locker.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\R3ADM3.txt locker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\R3ADM3.txt locker.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
locker.exepid process 2360 locker.exe 2360 locker.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
vssvc.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2440 vssvc.exe Token: SeRestorePrivilege 2440 vssvc.exe Token: SeAuditPrivilege 2440 vssvc.exe Token: SeIncreaseQuotaPrivilege 4024 WMIC.exe Token: SeSecurityPrivilege 4024 WMIC.exe Token: SeTakeOwnershipPrivilege 4024 WMIC.exe Token: SeLoadDriverPrivilege 4024 WMIC.exe Token: SeSystemProfilePrivilege 4024 WMIC.exe Token: SeSystemtimePrivilege 4024 WMIC.exe Token: SeProfSingleProcessPrivilege 4024 WMIC.exe Token: SeIncBasePriorityPrivilege 4024 WMIC.exe Token: SeCreatePagefilePrivilege 4024 WMIC.exe Token: SeBackupPrivilege 4024 WMIC.exe Token: SeRestorePrivilege 4024 WMIC.exe Token: SeShutdownPrivilege 4024 WMIC.exe Token: SeDebugPrivilege 4024 WMIC.exe Token: SeSystemEnvironmentPrivilege 4024 WMIC.exe Token: SeRemoteShutdownPrivilege 4024 WMIC.exe Token: SeUndockPrivilege 4024 WMIC.exe Token: SeManageVolumePrivilege 4024 WMIC.exe Token: 33 4024 WMIC.exe Token: 34 4024 WMIC.exe Token: 35 4024 WMIC.exe Token: 36 4024 WMIC.exe Token: SeIncreaseQuotaPrivilege 4024 WMIC.exe Token: SeSecurityPrivilege 4024 WMIC.exe Token: SeTakeOwnershipPrivilege 4024 WMIC.exe Token: SeLoadDriverPrivilege 4024 WMIC.exe Token: SeSystemProfilePrivilege 4024 WMIC.exe Token: SeSystemtimePrivilege 4024 WMIC.exe Token: SeProfSingleProcessPrivilege 4024 WMIC.exe Token: SeIncBasePriorityPrivilege 4024 WMIC.exe Token: SeCreatePagefilePrivilege 4024 WMIC.exe Token: SeBackupPrivilege 4024 WMIC.exe Token: SeRestorePrivilege 4024 WMIC.exe Token: SeShutdownPrivilege 4024 WMIC.exe Token: SeDebugPrivilege 4024 WMIC.exe Token: SeSystemEnvironmentPrivilege 4024 WMIC.exe Token: SeRemoteShutdownPrivilege 4024 WMIC.exe Token: SeUndockPrivilege 4024 WMIC.exe Token: SeManageVolumePrivilege 4024 WMIC.exe Token: 33 4024 WMIC.exe Token: 34 4024 WMIC.exe Token: 35 4024 WMIC.exe Token: 36 4024 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
locker.execmd.exedescription pid process target process PID 2360 wrote to memory of 3456 2360 locker.exe cmd.exe PID 2360 wrote to memory of 3456 2360 locker.exe cmd.exe PID 3456 wrote to memory of 4024 3456 cmd.exe WMIC.exe PID 3456 wrote to memory of 4024 3456 cmd.exe WMIC.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\conti\locker.exe"C:\Users\Admin\AppData\Local\Temp\conti\locker.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{01268568-5513-4879-B5BA-55AAC12E84B7}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{01268568-5513-4879-B5BA-55AAC12E84B7}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5c8a54401701d688fe98cdcddded2cfd7
SHA1a0edc8f3d7478982def3b3ccd68ee5deba023d00
SHA2569d780d55213a7d38022a3a2431f69192724606f32ebe27e181989f4ee1cafa4f
SHA5127e5caedbc912f7c677c700a83566025841e1665b70da99e9031f533f2b346f0b8a7ceb51704803ea761bb95374d4cfc9ae296659fd11b42ce0027c0092fbf41e