Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 13:03

General

  • Target

    VirusShare_a47562ddb085ab39b821c1d8ab078edf.exe

  • Size

    1.8MB

  • MD5

    a47562ddb085ab39b821c1d8ab078edf

  • SHA1

    0d4e8e5549105ee8527c058dce6c390616ad14a3

  • SHA256

    f70006713d13499db25cb78e7831a300457f83248cc8a245de67b180c607713e

  • SHA512

    18b3ff273024fdd98f2eacc9825316a97ae9809d127ae4d16a6613a9093fa94804c736cdb4edef814ef76c92a2f8c5b640ce4d2b7b76e339fe581667189a29f7

  • SSDEEP

    24576:dnA1KgRYWHEvtd8LHhFJpxjMnA1KgRYWHEvtd8LHhFJpxjJ:m1K5ve1K5v

Malware Config

Signatures

  • LockFile

    LockFile is a new ransomware that emerged in July 2021 with ProxyShell vulnerabilties.

  • Renames multiple (507) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 7 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_a47562ddb085ab39b821c1d8ab078edf.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_a47562ddb085ab39b821c1d8ab078edf.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops startup file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    PID:3632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\ÄÅÁËÎÊÈÐÎÂÊÀ ÔÀÉËÎÂ.txt

    Filesize

    630B

    MD5

    97d61dd38158163712ff1f93b02185dc

    SHA1

    aeeff9e4e9c82b7093cb222e038c1a6fcfcf06a3

    SHA256

    87c7671f844922e5d75372ff60271462c1f19105dce05c36a49bcbb6f93284d9

    SHA512

    23b9a3da5c54e3528e79ef2529619e9a3828eb049baa59a0f67c6102179f134fcde03f30d8d36b2078e89fd6a28fc107a9c03814cd0ceb32e70495f36eb1655d

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

    Filesize

    340KB

    MD5

    5f08f9df18f64da4f044bad065818000

    SHA1

    e9325b3aad6fb618de8be9b4a5beb46380cfcb56

    SHA256

    e2834020cb008ae22e83b2bf7c684e46e595d4a00383dc751d2564363f3a529a

    SHA512

    f2a65faff709487a33131107de3972e9e46a8575cf24a8fe79a6e565037264281e04f4729f869b8e538f5ae241066d4fddbcbfe2ea734a0e42de3d813ec29d6f

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\App_Data\GroupedProviders.xml

    Filesize

    317B

    MD5

    5a0b4dd3d8f6fdf54103fd0001816f63

    SHA1

    a988ebbe0d7c2c876680defbd253b1975457fc7d

    SHA256

    f3f39acd473189ab9295d2dcf2e6197ba0ab850a82c4aa1ade5592ce1892c38a

    SHA512

    6bd930896090b729ba992d21481c200cde2177a9dbcd5b7444356d694557f5ee518264f232fff6316fe6f824c1e107c54c330e3823e9f811a39e36f5c0b30d12

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\ASPdotNET_logo.jpg

    Filesize

    21KB

    MD5

    82c6ac5e46c85206837e131eddfddd83

    SHA1

    034737421748e5bfafd4e854534f3ad9fc9770c7

    SHA256

    55cf8a93e707fb1962dcc46766d7c5f0f71b64f332a6117118f94d7cb95ff322

    SHA512

    914b0c8f1d06e3b0b8c00bda75f227ed3864d048c2f69f0a331cbecef925ce68705afc53cdd041e430ccda931fd2605f5dc579ffe8beaa0acffdf4c51b162eb1

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg

    Filesize

    8KB

    MD5

    bbef149c3dcde06a394ba512422af3a9

    SHA1

    34b0e982f4d5d731de39b322d4824b6af6472627

    SHA256

    f4097368dc6b67514f2991640d563bb52fc01c7fcda1c29566b9ed7208954cd2

    SHA512

    595989ecf2d2bea0939dbf57faaa3bfb690166c17fb1d1da27b58871d54b3209d71c6e5489e983e5d6d3ad05fd97bf847a6e11bc9cbc9fcfc9535818b07e08be

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\help.jpg

    Filesize

    1KB

    MD5

    9ceb184e2a266d3bd7ee49d69f60c0b1

    SHA1

    85d584f08463901541033025c42cdc2d718f0bf6

    SHA256

    b7e00794735ca81c2966cc03e93b5880504c98764ad9af3bd273c48c684218c5

    SHA512

    f9f46dad610a9b033300c22a8373d30165cdfb3175800c4837232f98c6fbcc843b8666b6c3ae313931457b0576b1891cd3a2f9437aa68933d70d52a3751463b6

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\security_watermark.jpg

    Filesize

    49B

    MD5

    bd6fc9ca96698344936b22ccef4ba428

    SHA1

    49fc5c771601ed5e3897908cf8b83b546821a6be

    SHA256

    1003f1a53667e28e7952335498bdedd3377eae435189df01235b6602a5654823

    SHA512

    095c01770b4f4e9f9fcb29c0ce290043f5c1de9c7b9767e7dd889aa25f3c103ac2dc8de5258a639aea477f649aaeb14687767a9912d6326503019369a1ed8ba6

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg

    Filesize

    8KB

    MD5

    546aaf9ef3bd5a5d57584730e8aa12da

    SHA1

    009188fede09461fdeb7b7138bd47b4bce60a6c2

    SHA256

    fdd0d7552e874aa61d24a097fd9c297616d4e0ef684906a17c8c9425bed52c00

    SHA512

    5d6fd8a6332055afa3fcbc74a08638184bd322fc0d3da5180314438a6eb6e120b5d09c9fa0b89cea949a562522b16b9b7d49fa9a30438f0501a589c1d2f7bd2c

  • C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml

    Filesize

    62KB

    MD5

    d63dfe04f005ed75846cf5e822057ae7

    SHA1

    e4f817021c63e6c585358fcfca32a107a4abeedd

    SHA256

    582a60a60390cd7b078c158226ca897b02274d0d826c8749b3a38b7b0ac7cd77

    SHA512

    e421f18414950423704fea20e5cfc4f87e47f5182c76873050aa0e985bb9e867b36d0d8aac778a986aec71718f223c75183fb92aa12b6d300e67b1eb5775990f