Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 12:02

General

  • Target

    lockbit3.exe

  • Size

    162KB

  • MD5

    44e8c23bfb649ecf4cb753ec332899dd

  • SHA1

    465f5b6de78ee184f1ee3400e4edaa0e85558d9e

  • SHA256

    0d38f8bf831f1dbbe9a058930127171f24c3df8dae81e6aa66c430a63cbe0509

  • SHA512

    81f369f044e3b403aae8789c741cbf16e167a38386ef38c49d57a3c8e568b5b75d881f92881aeb10a918ed449ab89b27d70c2809cd956883660ed0202c0caf51

  • SSDEEP

    3072:NEWBPJgr1sgLFXdJ6Xx7OchgXC6TESq072WHI4nL2knI+eT:N71J4sgLBd0Ocz6TEBmHFnLm+eT

Score
10/10

Malware Config

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lockbit3.exe
    "C:\Users\Admin\AppData\Local\Temp\lockbit3.exe"
    1⤵
      PID:2764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 272
        2⤵
        • Program crash
        PID:1932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2764 -ip 2764
      1⤵
        PID:4932
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 548 -p 2112 -ip 2112
        1⤵
          PID:688
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2112 -s 1748
          1⤵
          • Program crash
          PID:3900
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SDRSVC
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1496

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2764-133-0x0000000000400000-0x000000000042C000-memory.dmp
          Filesize

          176KB