Static task
static1
Behavioral task
behavioral1
Sample
72e01b586ab34997588101cd134e1448_lockbit_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
72e01b586ab34997588101cd134e1448_lockbit_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
72e01b586ab34997588101cd134e1448_lockbit_JC.exe
-
Size
151KB
-
MD5
72e01b586ab34997588101cd134e1448
-
SHA1
920d41fb555fb0b263e1540d6286e56a87e1f341
-
SHA256
46d52bde09d8dd7e9927568c6bfcebbdd97db852dad1fcd0eeedafbe0c7d33dc
-
SHA512
eeea8bca844403bcfbc1b28ede42684cad5b2b4f8423b4c2e6b697bb6527270e764d5f4aa46e3bb3293e282d3e6758a5a90239d259aaddea68b2c890cb931fe6
-
SSDEEP
3072:NNCEZnzCsdQ5yYK/Qn5asbA3zpYl74Ni1b0MA:NosHdQUq5asGpOb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72e01b586ab34997588101cd134e1448_lockbit_JC.exe
Files
-
72e01b586ab34997588101cd134e1448_lockbit_JC.exe.exe windows x64
40f85cab1607615f5c95b3e060087b7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetFilePointer
GetFileInformationByHandle
GetTempPathA
CreateFileA
DeleteFileA
FileTimeToLocalFileTime
WideCharToMultiByte
GetTempFileNameA
FileTimeToDosDateTime
HeapCreate
HeapAlloc
HeapDestroy
CreateDirectoryW
CompareFileTime
TerminateProcess
RemoveDirectoryW
SetEndOfFile
CreateFileW
ResumeThread
DeleteFileW
MoveFileExW
CreateProcessW
GetFileTime
GetExitCodeProcess
CopyFileW
GetFileAttributesW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
TerminateThread
CreateThread
SetThreadPriority
VirtualFree
FreeLibrary
LocalAlloc
GetCurrentThreadId
OpenProcess
SetEvent
LocalFree
GetStringTypeW
ReadFile
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindClose
FindNextFileW
FindFirstFileW
GetTickCount
GetModuleHandleW
GetProcAddress
Sleep
CloseHandle
GetLastError
CreateEventW
WaitForSingleObject
SetLastError
GetModuleFileNameW
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
WriteFile
ExitProcess
GetCommandLineW
LoadLibraryExW
GetCurrentProcess
VirtualAlloc
MultiByteToWideChar
user32
SendMessageTimeoutW
GetShellWindow
GetThreadDesktop
CharPrevW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowThreadProcessId
advapi32
RegCloseKey
QueryServiceStatusEx
RegSetKeyValueW
CreateWellKnownSid
RegFlushKey
RegEnumKeyExW
RegOpenKeyW
CreateProcessAsUserW
RegRenameKey
RegDeleteKeyW
RegCreateKeyW
RegEnumValueW
RegQueryInfoKeyW
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegDeleteValueW
OpenServiceW
shell32
SHGetSpecialFolderPathW
SHAssocEnumHandlersForProtocolByApplication
SHGetKnownFolderPath
ShellExecuteExW
SHCreateItemFromParsingName
ole32
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoGetObject
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoInitializeEx
oleaut32
VariantInit
SysStringLen
SysAllocString
SysFreeString
rpcrt4
RpcBindingSetAuthInfoExW
RpcStringFreeW
RpcRaiseException
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
RpcBindingFree
NdrAsyncClientCall
UuidCreateNil
UuidCompare
NdrClientCall2
RpcBindingFromStringBindingW
RpcStringBindingComposeW
ntdll
NtDeleteKey
RtlNtStatusToDosErrorNoTeb
NtFreeVirtualMemory
RtlInitializeSid
RtlDestroyHeap
RtlAllocateHeap
NtQuerySystemInformation
RtlSubAuthoritySid
RtlCreateBoundaryDescriptor
LdrGetDllHandle
NtQueryInformationProcess
RtlDeleteBoundaryDescriptor
NtOpenProcess
LdrFindResource_U
NtReadFile
NtQueryInformationToken
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlPrefixUnicodeString
NtDeleteValueKey
RtlLengthRequiredSid
RtlAcquirePebLock
RtlImageNtHeader
RtlPushFrame
RtlAppendUnicodeStringToString
RtlGetCurrentPeb
NtCreatePrivateNamespace
DbgUiSetThreadDebugObject
NtDeletePrivateNamespace
RtlFreeHeap
RtlRaiseStatus
RtlSetHeapInformation
RtlCreateHeap
LdrFindEntryForAddress
RtlAddSIDToBoundaryDescriptor
RtlReleasePebLock
RtlExpandEnvironmentStrings_U
NtQueryValueKey
LdrAccessResource
RtlUnwindEx
RtlImageDirectoryEntryToData
NtDeleteFile
NtMapViewOfSection
NtUnmapViewOfSection
NtCreateEvent
NtClose
RtlInitUnicodeString
RtlRandomEx
RtlPopFrame
NtNotifyChangeDirectoryFile
RtlGetFrame
NtWaitForSingleObject
NtCreateFile
NtSetEvent
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
RtlGetVersion
NtTerminateProcess
RtlEqualUnicodeString
NtCreateSection
RtlComputeCrc32
RtlQueryElevationFlags
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
LdrGetDllHandleEx
NtCompressKey
RtlExitUserProcess
RtlFreeSid
NtDuplicateObject
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetInformationToken
NtRemoveProcessDebug
NtDuplicateToken
NtSetValueKey
NtCreateKey
RtlFormatCurrentUserKeyPath
NtOpenProcessToken
NtOpenKey
NtQueryInformationFile
RtlAppendUnicodeToString
NtFsControlFile
comctl32
ord17
cabinet
ord13
ord14
ord11
ord10
msdelta
ApplyDeltaB
DeltaFree
bcrypt
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptDecrypt
BCryptGetProperty
BCryptDestroyKey
BCryptGenerateSymmetricKey
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ