Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 16:14

General

  • Target

    LockBit-Black-Builder-main/LockBit30/Build/LB3_ReflectiveDll_DllMain.dll

  • Size

    106KB

  • MD5

    2ecc319574b76994e76c4f971c820362

  • SHA1

    8f3d04cab7c6be2220860ec391d75ba2f8f17b33

  • SHA256

    123797c18b044fb5aeba5dcccaf9ef1df0b7553413e9433876f1f94b8cd0584f

  • SHA512

    39c63668d424ff9efa625a82312edf5a30f7ca3edd896bd6ef1857ced02e5462cf191af54b6e55388b844fa5e50f77e3a6ce5b5983f61eb57a45c4b2fbb3567e

  • SSDEEP

    1536:LzICS4A30TY1kUS/U2ztdS1I6DdL9Ta16CX4VtgYfC3zHZbhuMGCS:0J0TYyUS/U2RgGWL9+joVtHfilfd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll,#1
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\ProgramData\5A84.tmp
        "C:\ProgramData\5A84.tmp"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\5A84.tmp >> NUL
          4⤵
            PID:5228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\5A84.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit30\Build\DDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      106KB

      MD5

      159c889292571e8ae68e172ea79e413a

      SHA1

      dc9d9cb72c659de4b9be169d243d1f57c191d5cc

      SHA256

      5f030566383f0c869da21eb10d81238cd6f9b588e8ec50adc8e268bf5337bc0d

      SHA512

      960afa600db924c25d858a0ed285c5ddaf912d096ff4bb1e5cb5934e42bcc68a96b454661b49581a7b95184d8bfaf006be945280e06c6ad0c9a4886964ebe68e

    • memory/2920-2-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/2920-1-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/2920-0-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/2920-4-0x00000000028F0000-0x0000000002900000-memory.dmp

      Filesize

      64KB

    • memory/4396-12-0x0000000002460000-0x0000000002470000-memory.dmp

      Filesize

      64KB

    • memory/4396-10-0x000000007FE40000-0x000000007FE41000-memory.dmp

      Filesize

      4KB

    • memory/4396-41-0x000000007FE20000-0x000000007FE21000-memory.dmp

      Filesize

      4KB

    • memory/4396-34-0x0000000002460000-0x0000000002470000-memory.dmp

      Filesize

      64KB

    • memory/4396-44-0x000000007FE00000-0x000000007FE01000-memory.dmp

      Filesize

      4KB

    • memory/4396-43-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

      Filesize

      4KB

    • memory/4396-42-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

      Filesize

      4KB