Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 02:58
Behavioral task
behavioral1
Sample
a5434b72fa80d4ed2bef826a36542dbc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5434b72fa80d4ed2bef826a36542dbc.exe
Resource
win10v2004-20240221-en
General
-
Target
a5434b72fa80d4ed2bef826a36542dbc.exe
-
Size
15.7MB
-
MD5
a5434b72fa80d4ed2bef826a36542dbc
-
SHA1
d4e3c16a2ffbfc3ed46adeea2f13d21edc332b85
-
SHA256
e32dc551a721b43da44a068f38928d3e363435ce0e4d2e0479c0dfdb27563c82
-
SHA512
f00307416dd0343a605b270dfb2915c50e794d6c56f5245f144a77b8d44a288e4a5da2e8cec8ec47050f71c3a01e8f52ca625bccabce4c119c977530b93f2a07
-
SSDEEP
196608:DtigKrxQonhPMhfhJfBo1lcWxPclmBtGV7:AgK1QIZUHo2Kz27
Malware Config
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\Desktop\LockBit_Ransomware.hta
https://decoding.at/
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or
https://decoding.at
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral2/files/0x000600000002324c-328.dat family_babadeda -
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE is not expected to spawn this process 4712 2792 OfficeC2RClient.exe 107 -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3848 bcdedit.exe 3524 bcdedit.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation a5434b72fa80d4ed2bef826a36542dbc.exe Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation sharpsvn.exe -
Executes dropped EXE 1 IoCs
pid Process 4324 sharpsvn.exe -
Loads dropped DLL 1 IoCs
pid Process 4324 sharpsvn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{4461224A-7171-AB9C-E118-E1E7D9586D2C} = "\"C:\\Users\\Admin\\AppData\\Roaming\\SharpSvn Project\\Advanced SharpSvn\\sharpsvn.exe\"" sharpsvn.exe Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\Users\\Admin\\Desktop\\LockBit_Ransomware.hta" sharpsvn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: sharpsvn.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL sharpsvn.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL sharpsvn.exe File created C:\Windows\system32\spool\PRINTERS\PP000aryxv0okrary5vh4zdahm.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPjr49xrq3gyhq97g7tofyl5x0.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PP_z70b_80yvs_3ez0aaoze2pn.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FCCA.tmp.bmp" sharpsvn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\aicuc\js\nls\de-de\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\exportpdfupsell-app\js\plugins\rhp\exportpdfupsell-app-selector.js sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\on-boarding\js\nls\da-dk\ui-strings.js sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\s_sortedby_18.svg sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\sample-files\js\nls\hu-hu\ui-strings.js sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\send-for-sign\css\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\visiopromsdnr_retail-ppd.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\office16\sdxs\fa000000027\assets\icons\cancelfluent.png sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\unified-share\images\themes\dark\completecheckmark.png sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\combinepdf\js\nls\hu-hu\ui-strings.js sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-computer-select\css\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\java\jdk-1.8\jre\legal\jdk\freebxml.md sharpsvn.exe File opened for modification C:\program files\java\jdk-1.8\jre\legal\jdk\xerces.md sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\win8-scrollbar\themes\dark\arrow-up-pressed.gif sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\aicuc\images\themes\dark\rhp_world_icon.png sharpsvn.exe File created C:\program files\videolan\vlc\locale\bg\lc_messages\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\root\office16\logoimages\onenotelogosmall.contrast-white_scale-180.png sharpsvn.exe File opened for modification C:\program files\microsoft office\root\vfs\programfilesx64\microsoft analysis services\as oledb\140\cartridges\trdtv2r41.xsl sharpsvn.exe File opened for modification C:\program files\microsoft office\root\vfs\programfilesx86\microsoft analysis services\as oledb\140\resources\1033\msolui.rll sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\s_nothumbnail_34.svg sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\homebusiness2019r_trial-ul-oob.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\visiostdco365r_subscription-ppd.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\office16\proof\msth8es.lex sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\root\office16\bibliography\sort\author.xsl sharpsvn.exe File created C:\program files\videolan\vlc\locale\tet\lc_messages\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\on-boarding\images\themeless\download_on_the_app_store_badge_ja_135x40.svg sharpsvn.exe File created C:\program files\java\jdk-1.8\jre\lib\deploy\Restore-My-Files.txt sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\combinepdf\js\nls\sk-sk\Restore-My-Files.txt sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\app-center\js\nls\nl-nl\Restore-My-Files.txt sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\scan-files\js\nls\sv-se\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\ui-strings.js sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\mondor_viewonly_zerograce-ppd.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\visiostdxc2rvl_kms_clientc2r-ul-oob.xrm-ms sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\win-scrollbar\themes\dark\arrow-right.png sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\scan-files\js\plugin.js sharpsvn.exe File opened for modification C:\program files\7-zip\lang\hr.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\packagemanifests\appxmanifest.90160000-00e1-0000-1000-0000000ff1ce.xml sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\combinepdf\js\nls\fi-fi\ui-strings.js sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\digsig\js\selector.js sharpsvn.exe File opened for modification C:\program files\java\jre-1.8\lib\ext\cldrdata.jar sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\homebusiness2019r_oem_perp3-ul-phn.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\word2019vl_mak_ae-pl.xrm-ms sharpsvn.exe File created C:\program files\dotnet\swidtag\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\search-summary\js\nls\sl-sl\ui-strings.js sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-computer\js\nls\ru-ru\Restore-My-Files.txt sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\reviews\js\nls\hr-hr\Restore-My-Files.txt sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\root\vfs\programfilesx86\microsoft office\office16\dcf\en\databasecompare_k_col.hxk sharpsvn.exe File opened for modification C:\program files\mozilla firefox\browser\visualelements\visualelements_150.png sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\themes\dark\s_reject_18.svg sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\activity-badge\js\nls\fi-fi\ui-strings.js sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-recent-files\js\nls\sk-sk\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\java\jdk-1.8\jre\lib\ext\zipfs.jar sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\o365businessdemor_bypasstrial365-ppd.xrm-ms sharpsvn.exe File opened for modification C:\program files\microsoft office\root\licenses16\o365proplusr_subscription4-ul-oob.xrm-ms sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\app-center\js\nls\ru-ru\ui-strings.js sharpsvn.exe File opened for modification C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\signatures\images\illustrations.png sharpsvn.exe File created C:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\task-handler\js\nls\de-de\Restore-My-Files.txt sharpsvn.exe File opened for modification C:\program files\microsoft office\root\office16\sdxs\fa000000027\assets\icons\[email protected] sharpsvn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4600 304 WerFault.exe 109 -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2560 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\Desktop\WallpaperStyle = "2" sharpsvn.exe Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\Desktop\TileWallpaper = "0" sharpsvn.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lockbit\shell\Open\Command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"C:\\Users\\Admin\\Desktop\\LockBit_Ransomware.hta\"" sharpsvn.exe Key created \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000_Classes\Local Settings sharpsvn.exe Key created \Registry\Machine\Software\Classes\.lockbit sharpsvn.exe Key created \Registry\Machine\Software\Classes\Lockbit\DefaultIcon sharpsvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lockbit\ = "LockBit Class" sharpsvn.exe Key created \Registry\Machine\Software\Classes\Lockbit\shell\Open\Command sharpsvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lockbit\ = "LockBit" sharpsvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lockbit\DefaultIcon\ = "C:\\windows\\SysWow64\\C761DC.ico" sharpsvn.exe Key created \Registry\Machine\Software\Classes\Lockbit\shell\Open sharpsvn.exe Key created \Registry\Machine\Software\Classes\Lockbit sharpsvn.exe Key created \Registry\Machine\Software\Classes\Lockbit\shell sharpsvn.exe Key created \Registry\Machine\Software\Classes\htafile\DefaultIcon sharpsvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htafile\DefaultIcon\ = "C:\\windows\\SysWow64\\C761DC.ico" sharpsvn.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe 4324 sharpsvn.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4324 sharpsvn.exe Token: SeDebugPrivilege 4324 sharpsvn.exe Token: SeBackupPrivilege 1192 vssvc.exe Token: SeRestorePrivilege 1192 vssvc.exe Token: SeAuditPrivilege 1192 vssvc.exe Token: SeIncreaseQuotaPrivilege 5092 WMIC.exe Token: SeSecurityPrivilege 5092 WMIC.exe Token: SeTakeOwnershipPrivilege 5092 WMIC.exe Token: SeLoadDriverPrivilege 5092 WMIC.exe Token: SeSystemProfilePrivilege 5092 WMIC.exe Token: SeSystemtimePrivilege 5092 WMIC.exe Token: SeProfSingleProcessPrivilege 5092 WMIC.exe Token: SeIncBasePriorityPrivilege 5092 WMIC.exe Token: SeCreatePagefilePrivilege 5092 WMIC.exe Token: SeBackupPrivilege 5092 WMIC.exe Token: SeRestorePrivilege 5092 WMIC.exe Token: SeShutdownPrivilege 5092 WMIC.exe Token: SeDebugPrivilege 5092 WMIC.exe Token: SeSystemEnvironmentPrivilege 5092 WMIC.exe Token: SeRemoteShutdownPrivilege 5092 WMIC.exe Token: SeUndockPrivilege 5092 WMIC.exe Token: SeManageVolumePrivilege 5092 WMIC.exe Token: 33 5092 WMIC.exe Token: 34 5092 WMIC.exe Token: 35 5092 WMIC.exe Token: 36 5092 WMIC.exe Token: SeIncreaseQuotaPrivilege 5092 WMIC.exe Token: SeSecurityPrivilege 5092 WMIC.exe Token: SeTakeOwnershipPrivilege 5092 WMIC.exe Token: SeLoadDriverPrivilege 5092 WMIC.exe Token: SeSystemProfilePrivilege 5092 WMIC.exe Token: SeSystemtimePrivilege 5092 WMIC.exe Token: SeProfSingleProcessPrivilege 5092 WMIC.exe Token: SeIncBasePriorityPrivilege 5092 WMIC.exe Token: SeCreatePagefilePrivilege 5092 WMIC.exe Token: SeBackupPrivilege 5092 WMIC.exe Token: SeRestorePrivilege 5092 WMIC.exe Token: SeShutdownPrivilege 5092 WMIC.exe Token: SeDebugPrivilege 5092 WMIC.exe Token: SeSystemEnvironmentPrivilege 5092 WMIC.exe Token: SeRemoteShutdownPrivilege 5092 WMIC.exe Token: SeUndockPrivilege 5092 WMIC.exe Token: SeManageVolumePrivilege 5092 WMIC.exe Token: 33 5092 WMIC.exe Token: 34 5092 WMIC.exe Token: 35 5092 WMIC.exe Token: 36 5092 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4712 OfficeC2RClient.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4324 4492 a5434b72fa80d4ed2bef826a36542dbc.exe 88 PID 4492 wrote to memory of 4324 4492 a5434b72fa80d4ed2bef826a36542dbc.exe 88 PID 4492 wrote to memory of 4324 4492 a5434b72fa80d4ed2bef826a36542dbc.exe 88 PID 4324 wrote to memory of 1404 4324 sharpsvn.exe 96 PID 4324 wrote to memory of 1404 4324 sharpsvn.exe 96 PID 1404 wrote to memory of 2560 1404 cmd.exe 98 PID 1404 wrote to memory of 2560 1404 cmd.exe 98 PID 1404 wrote to memory of 5092 1404 cmd.exe 101 PID 1404 wrote to memory of 5092 1404 cmd.exe 101 PID 1404 wrote to memory of 3848 1404 cmd.exe 102 PID 1404 wrote to memory of 3848 1404 cmd.exe 102 PID 1404 wrote to memory of 3524 1404 cmd.exe 103 PID 1404 wrote to memory of 3524 1404 cmd.exe 103 PID 5096 wrote to memory of 2792 5096 printfilterpipelinesvc.exe 107 PID 5096 wrote to memory of 2792 5096 printfilterpipelinesvc.exe 107 PID 2792 wrote to memory of 4712 2792 ONENOTE.EXE 108 PID 2792 wrote to memory of 4712 2792 ONENOTE.EXE 108 PID 4324 wrote to memory of 304 4324 sharpsvn.exe 109 PID 4324 wrote to memory of 304 4324 sharpsvn.exe 109 PID 4324 wrote to memory of 304 4324 sharpsvn.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5434b72fa80d4ed2bef826a36542dbc.exe"C:\Users\Admin\AppData\Local\Temp\a5434b72fa80d4ed2bef826a36542dbc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\sharpsvn.exe"C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\sharpsvn.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2560
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:3848
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:3524
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\LockBit_Ransomware.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 304 -s 17764⤵
- Program crash
PID:4600
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1824
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{F59245F8-FAEB-4BC0-ADC2-FFAFB1D4E134}.xps" 1335339002305200002⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exeOfficeC2RClient.exe /error PID=2792 ProcessName="Microsoft OneNote" UIType=3 ErrorSource=0x8b10082a ErrorCode=0x80004005 ShowUI=13⤵
- Process spawned unexpected child process
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 304 -ip 3041⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD51950ffdbbf7c6aa25bbab0a4dab7d2f2
SHA1002d9c5c46971ab7e4388fb22c7253c7d504d4b7
SHA2564349bb95519bf6ee4b3f28e059917d3a1cad2fb0fd6f54d8e2da706ed20c1476
SHA5120045479fd22b73e062e5b48225957504ce8de439354d07fb7f015bbfdf8967f06545da56938801563f20bfc3c39edbf27f71ca104aa24818bdb3b89570225126
-
Filesize
2.5MB
MD5413618ca437d7831df51303188cd207b
SHA185ea80cfb5db25c756da7ba5992665ea80aee560
SHA256f2d0e13a6ec546f169d45ad5b62ced1bcc3a4e01ae6dc3666239defc959e2baa
SHA512f70dab7aca530bd5013903e050bd974c8ad991c5d8d5ef8b5f6f4efba8acc6d37014b8bc63e3e73679a8229a9e33fd4c0ed3c8b6d5b9628a8735cb32210b30e6
-
Filesize
3.4MB
MD5852ba853bb6e9fc1476a7907a17be760
SHA121ef22a3dd2e4b32fbe8f56b7d87510fd9529d5c
SHA256b98b6b7e4ca7f5827d8d5cb34b39a3f4ca8c3dac5d7751d64876d944301084ff
SHA51279bdc1fc374d2cb147237d5e34bc95ba1744ed111d1bd861c28124732e4c179442aec9f7b0ee33d65eef0c9e4eb939d3a5392b9f81cb518ce3ca47ccd86f6c12
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_banner.html
Filesize490B
MD55d1f7da1c3d95020a0708118145364d0
SHA102f630e7ac8b8d400af219bd8811aa3a22f7186e
SHA256d2d828c2c459b72ee378db6c5ac295315b8a783b7049032f92ed4fcb2a89684a
SHA5126bbdaaef1478ffd9e9d3a95d300f35b9ac6f3ce6564e80734445a827ad8761233db36c679fac117f363bae27918983520f0e2f408205d3549b001fc4ae4c920c
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_connect_to_data_no_mru.html
Filesize1KB
MD520bbd307866f19a5af3ae9ebd5104018
SHA18e03c9b18b9d27e9292ee154b773553493df1157
SHA256e4fe51c170e02a01f30a4db8b458fb9b8dee13a7740f17765ba4873fac62c5f7
SHA512420a132ad4ba3a67f5b66a3e463c4fa495b7941d58d6d669a8c984380607a03f0afa1c92bcf1f8d1fc5d93838ea611f7f9cf439bb3ada0142431b119ddfad40d
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_connect_to_data_with_mru.html
Filesize1KB
MD5e6bc0d078616dd5d5f72d46ab2216e89
SHA1f70534bb999bcb8f1db0cf25a7279757e794499f
SHA256e8f50f17c994f394239350951a40c3454e9b52b0ca95cf342f2577828f390a54
SHA5126ccd6e19ec63f20c86a28ccaffa609a2d0de7991a8eb2d6ea016bcc5d0e9f2fc28c33a15c4af891f28a9e1e4131f38f84f8e1a8859e020d6f267977075f7c66a
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_landing.html
Filesize720B
MD50a5b47256c14570b80ef77ecfd2129b7
SHA169210a7429c991909c70b6b6b75fe4bc606048ae
SHA2561934657d800997dedba9f4753150f7d8f96dd5903a9c47ed6885aabf563bf73d
SHA5125ca22260d26ec5bb1d65c4af3e2f05356d7b144836790ac656bf8c1687dd5c7d67a8a46c7bde374ec9e59a1bedc0298a4609f229d997409a0cc5453ef102ecb2
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_topstrip_no_mru.html
Filesize659B
MD5eced86c9d5b8952ac5fb817c3ce2b8ba
SHA13ca24e69df7a4b81f799527a97282799fcd3f1e2
SHA2563988afa43d3c716ecbe4e261ff13c32fe67baaaf1718eac790040cff2aa4e44d
SHA512a21e88968c30f14363a73dfd7801cea34255acb968160fad59d813bb64352583c8c4f6cd9d45811676ca5ca90a4250601a53e80b6f41d6727465f3a57e7423a1
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\html\startpage_topstrip_with_mru.html
Filesize798B
MD5cc4d8a787ab1950c4e3aac5751c9fcde
SHA1d026a156723a52c34927b5a951a2bb7d23aa2c45
SHA25613683e06e737e83ca94505b1cd1cd70f4f8b2cc5e7560f121a6e02ed1a06e7ee
SHA512e0b01f5ee4da60e35a4eb94490bed815aea00382f3b9822b7c29294cf86a2fe480dba704f086a38f9d7aaf39e8160f49cf806b6b6c44651de56e290249dd9ebe
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\stylesheets\start_page.css
Filesize2KB
MD5f2ab3e5fb61293ae8656413dbb6e5dc3
SHA153b3c3c4b57c3d5e2d9a36272b27786cd60f0eb5
SHA25606db4d53adf4a1ecbc03ed9962af7f46fd3a54668d45907dc1737125e38ec192
SHA5122c31cad868e1e5149a4308a149104ac3d88907894699fb0413860c8f578de32f6814b08d518de7a7fe3782f0cea173cb1766da7c25f2bcdddaffae7bc0da927c
-
C:\Users\Admin\AppData\Roaming\SharpSvn Project\Advanced SharpSvn\res\public\en\stylesheets\start_page_landing.css
Filesize282B
MD549617add7303a8fbd24e1ad16ba715d8
SHA131772218ccf51fe5955625346c12e00c0f2e539a
SHA256b3a99eea19c469dab3b727d1324ed87d10999133d3268ed0fadd5a5c8d182907
SHA5129d1198ca13a0c1f745b01aabc23b60b8e0df4f12d7fdf17e87e750f021fc3800ea808af6c875848b3850061070dfd54c2e34d92cea4e8a2bf4736fbcfd129d1e
-
Filesize
534KB
MD562d380039dbd4583cb503e5e42c28ecb
SHA187e60217dfe6496083ba458fa4292d2a65c0a0c1
SHA2561f18a6384b6992bd479de73434103c79d1f115e2e9444de6b9a927892f938cb3
SHA51242f5eccf470325044e6501e84e185b85614496fd2638dd63d7cc16c85620a9d5b21c47a5c7283734675fb36c2ae691ff5a6f6a680c62a392b76d55d260c12516
-
Filesize
4.5MB
MD5ef50ef3042c0dc0bd690169425e4fc48
SHA1594e4b5f9c0b89ce83ff02923bf4df74c51df79e
SHA256799b8493ba4a618094833d5a0d9af0d16d66b2666073bf7a08d82315ecb04205
SHA512f6f7ae5ebc825aaabe2192e11338fae1fa2bcba552cd0de253ef45db17f862f7d821df29a246df262c2557d4944c7457634a79da58e9772cfe803b557c2f7987
-
Filesize
4.2MB
MD5f62104ffbaf3d93046a0321700305c57
SHA1557623e42015fab8e7ed5ecbae748e8abce075ff
SHA2562094fff49ee013aa1c30102faaa41a4a7d2418fe6b7ca482fe395b0da05e4cc5
SHA512d5702e4d010158010151d0f47a551b1922fd64470f2bf3ef98d63445929c76db9bf1bedfbefe2c46e0f2481521e69648df4ae4e0e7422f26b6ccdcaeb460a1fa
-
Filesize
46KB
MD5c15c6adc8c923ad87981f289025c37b2
SHA1bfe6533f4afe3255046f7178f289a4c75ad89e76
SHA25690f3a33919fdd766e90fd96f8f20a92c2d1376b7cfdc8b738c2f8e7e6c7498b1
SHA51231dd03b208e00ac012fbe4189d5af1306cc8e3640d40efefab4aa1cabab3c4735eef0cb65e7750c3c77021934e145398e5e26389975cf36b193c8f622a5fde83