Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 04:23
Behavioral task
behavioral1
Sample
d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe
Resource
win10v2004-20231215-en
General
-
Target
d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe
-
Size
162KB
-
MD5
628e4a77536859ffc2853005924db2ef
-
SHA1
c2a321b6078acfab582a195c3eaf3fe05e095ce0
-
SHA256
d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee
-
SHA512
aae3e3e9b12ab7389e5f2eac89b2a306c4d2b91bb4204f83cc7308a83c3dea88bbc2d826546c886fd580c01245a6be5c0aefcd93936daeecb3614935248de5f1
-
SSDEEP
3072:o5uyulsHwDV1gFnTwn7zwJGJ+3t5kCI5Gzei3N2VzRmK:o5uZ1DPgFnk7EJwaI5gDN2VVm
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1696-0-0x0000000000400000-0x000000000042C000-memory.dmp family_lockbit behavioral2/memory/1696-1-0x0000000000400000-0x000000000042C000-memory.dmp family_lockbit -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4892 1696 WerFault.exe d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe"C:\Users\Admin\AppData\Local\Temp\d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee.exe"1⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 2722⤵
- Program crash
PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1696 -ip 16961⤵PID:3416