Analysis
-
max time kernel
76s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
30-01-2024 15:58
Behavioral task
behavioral1
Sample
lockbit_1.exe
Resource
win10-20231215-en
General
-
Target
lockbit_1.exe
-
Size
160KB
-
MD5
fdd9f9ae1d24dcc709cd0abcea638ed0
-
SHA1
2fe29b620b51d2258373b12d926a91d0a3720a60
-
SHA256
4134d5d8f7b038e23e7887db56bb3ad295341a1aaf0bebe6be21d901d06dd662
-
SHA512
db995ac8fa51a49e3b9550b0bb4069bbef08a9157d942cffcae24cabb720be01e17afffc9bfb54e95d4883adc6af27c5cb78291d408d0137591eff690669c3ef
-
SSDEEP
3072:5uJ9OlKolUa1U197bzhVsmftsoo4jE8AI8vOMvjEF0Q:5ufj0zi1dNVsmfttjY8LLej40Q
Malware Config
Extracted
C:\uQK11TJ9E.README.txt
lockbit
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion.ly
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion.ly
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion.ly
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion
https://gdpr.eu/what-is-gdpr/
https://gdpr-info.eu/
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Deletes itself 1 IoCs
pid Process 2552 FB87.tmp -
Executes dropped EXE 1 IoCs
pid Process 2552 FB87.tmp -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1968775928-2924269989-3510977013-1000\desktop.ini lockbit_1.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1968775928-2924269989-3510977013-1000\desktop.ini lockbit_1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PP3urwwxsrpg459x7gky_yb10y.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPkhe011c04fe0vqx6javykt_8d.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPl7lndiup3qtpezd6f730ctb3b.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\uQK11TJ9E.bmp" lockbit_1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\uQK11TJ9E.bmp" lockbit_1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000\Control Panel\Desktop lockbit_1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000\Control Panel\Desktop\WallpaperStyle = "10" lockbit_1.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uQK11TJ9E lockbit_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uQK11TJ9E\DefaultIcon\ = "C:\\ProgramData\\uQK11TJ9E.ico" lockbit_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.uQK11TJ9E lockbit_1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uQK11TJ9E\ = "uQK11TJ9E" lockbit_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uQK11TJ9E\DefaultIcon lockbit_1.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 3648 lockbit_1.exe 920 ONENOTE.EXE 920 ONENOTE.EXE -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp 2552 FB87.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeDebugPrivilege 3648 lockbit_1.exe Token: 36 3648 lockbit_1.exe Token: SeImpersonatePrivilege 3648 lockbit_1.exe Token: SeIncBasePriorityPrivilege 3648 lockbit_1.exe Token: SeIncreaseQuotaPrivilege 3648 lockbit_1.exe Token: 33 3648 lockbit_1.exe Token: SeManageVolumePrivilege 3648 lockbit_1.exe Token: SeProfSingleProcessPrivilege 3648 lockbit_1.exe Token: SeRestorePrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSystemProfilePrivilege 3648 lockbit_1.exe Token: SeTakeOwnershipPrivilege 3648 lockbit_1.exe Token: SeShutdownPrivilege 3648 lockbit_1.exe Token: SeDebugPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeBackupPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe Token: SeSecurityPrivilege 3648 lockbit_1.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE 920 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3648 wrote to memory of 368 3648 lockbit_1.exe 75 PID 3648 wrote to memory of 368 3648 lockbit_1.exe 75 PID 4144 wrote to memory of 920 4144 printfilterpipelinesvc.exe 78 PID 4144 wrote to memory of 920 4144 printfilterpipelinesvc.exe 78 PID 3648 wrote to memory of 2552 3648 lockbit_1.exe 79 PID 3648 wrote to memory of 2552 3648 lockbit_1.exe 79 PID 3648 wrote to memory of 2552 3648 lockbit_1.exe 79 PID 3648 wrote to memory of 2552 3648 lockbit_1.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\lockbit_1.exe"C:\Users\Admin\AppData\Local\Temp\lockbit_1.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:368
-
-
C:\ProgramData\FB87.tmp"C:\ProgramData\FB87.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
PID:2552
-
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{65C228B9-8DC4-46C8-B12F-D6A77E8F7D9F}.xps" 1335110395393600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5dcc29c59afa0adc4dbf054aa615ddca7
SHA1cb0d004efabf76cf1db018ecf57f68b439ea7945
SHA256197bd7fb1c24e8be005dd20ab0b26206df3d2687f20537b8d3c80e04db0c5c75
SHA51281fdd31e710280d3432eb57a8a09ec306e7bf980506e88ba8674fc3ca004a4832a3073ff13ebaef018fa0e53b35dfef14466a1781087d309d7da084d63fcd08e
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
160KB
MD5ea87150b14e3bfa7d0e194eb38be971b
SHA10d7c7bf7ee6017f0aa5afd448fbc0ecded938e38
SHA256a05960824921125318936da102d31fbea6cfba94fb1e54fa075b559873388fc8
SHA5126de50fe6e036be185fe10317c883f0c839e74536822bc912022640ecc4b805869ec8d1b24a5ef0ea4b1889ea0ecc8fadf3afc052dd5cfee3aae16eaa46814438
-
Filesize
10KB
MD5aa94797b810c43df484e81c32399c8ff
SHA1f8122e29b8a5a89221bfef697adc271c41615efc
SHA256b87bcde2dba51de97f7ac6b7604f9386903ec8941cb95187f32815378fe8b8a0
SHA51246491eec231109ba305644973a994c01ff8c48ffb5b8b84cf7cef02774f16e513e742dcf6080a3d4eb02a7c330b81938ca63630587f832f7cce961114d9c6e6b
-
Filesize
129B
MD57ed9a7508aeaa491c4c68566aa0d4bb8
SHA1927b65b75d4872a574cf022240ec6059a6857242
SHA256b5a7a0ab13cb12435bf800b4259e8e145a05a9c2d90a0f480b006e4a9d36ee11
SHA5126c5aada9264563afc0931f02581ec8de70f5c3da1385432c963744f4d488b9926f7b3dbd212db15742bb2da63802cf9f513caa3e38fad423c2027ee85389e4b6