Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_a7744905e9088df1f645501530a1a6e0_lockbit.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_a7744905e9088df1f645501530a1a6e0_lockbit.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_a7744905e9088df1f645501530a1a6e0_lockbit
-
Size
157KB
-
MD5
a7744905e9088df1f645501530a1a6e0
-
SHA1
b4615cbbe0c9e8d8f11c758ab35068f9d1983a95
-
SHA256
9cd1c16dc9b0b5bd4d834881d89f6330d44e62876036d023f830c5fbd0699c39
-
SHA512
d8492056d1e59d3980fee3fc1f33267ae67a48f5ecbd5841529699469ad217d5990295463376260fd3aa830f5c4037a64e8392e111380228f3f62ff1231111ad
-
SSDEEP
3072:PvQROcgIWNBM2YeF1ijkDzMdlDsDAQ2pYl7/P/r3BRMr:P4Kc2TZMdeDAlpOfl
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-16_a7744905e9088df1f645501530a1a6e0_lockbit
Files
-
2024-03-16_a7744905e9088df1f645501530a1a6e0_lockbit.exe windows:6 windows x64 arch:x64
d9e4615b3b865b518fccf94766fbf0cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetTempPathA
CreateFileA
DeleteFileA
FileTimeToLocalFileTime
WideCharToMultiByte
GetTempFileNameA
FileTimeToDosDateTime
HeapCreate
HeapAlloc
HeapDestroy
CreateFileW
DeleteFileW
CreateDirectoryW
CompareFileTime
TerminateProcess
RemoveDirectoryW
SetEndOfFile
ResumeThread
MoveFileExW
CreateProcessW
GetFileTime
GetExitCodeProcess
CopyFileW
GetFileAttributesW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
TerminateThread
CreateThread
SetThreadPriority
VirtualFree
GetCurrentProcess
GetCommandLineW
GetCurrentThreadId
OpenProcess
SetEvent
LocalFree
GetStringTypeW
GetCPInfo
SetFilePointer
GetACP
IsValidCodePage
LoadLibraryExW
FreeLibrary
FindClose
FindNextFileW
FindFirstFileW
GetTickCount
GetModuleHandleW
GetProcAddress
Sleep
CloseHandle
GetLastError
CreateEventW
WaitForSingleObject
SetLastError
GetModuleFileNameW
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
GetFileInformationByHandle
WriteFile
ReadFile
GetOEMCP
ExitProcess
LocalAlloc
VirtualAlloc
MultiByteToWideChar
user32
GetShellWindow
GetThreadDesktop
CharPrevW
GetUserObjectInformationW
GetProcessWindowStation
SendMessageTimeoutW
GetWindowThreadProcessId
advapi32
RegQueryInfoKeyW
RevertToSelf
RegSetKeyValueW
CreateWellKnownSid
RegFlushKey
RegEnumKeyExW
RegOpenKeyW
CreateProcessAsUserW
RegRenameKey
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
ImpersonateLoggedOnUser
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegDeleteValueW
OpenServiceW
QueryServiceStatusEx
RegEnumValueW
shell32
SHGetSpecialFolderPathW
SHGetKnownFolderPath
ShellExecuteExW
SHCreateItemFromParsingName
SHAssocEnumHandlersForProtocolByApplication
ole32
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoGetObject
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoInitializeEx
oleaut32
SysAllocString
SysStringLen
VariantInit
SysFreeString
rpcrt4
UuidCreateNil
NdrAsyncClientCall
RpcBindingFree
RpcStringBindingComposeW
RpcAsyncCompleteCall
RpcAsyncInitializeHandle
RpcRaiseException
UuidCompare
UuidFromStringW
RpcBindingFromStringBindingW
NdrClientCall2
RpcStringFreeW
RpcBindingSetAuthInfoExW
secur32
DeleteSecurityContext
QuerySecurityContextToken
InitializeSecurityContextW
FreeCredentialsHandle
AcquireCredentialsHandleW
AcceptSecurityContext
ntdll
NtDeleteKey
RtlNtStatusToDosErrorNoTeb
NtFreeVirtualMemory
RtlInitializeSid
RtlDestroyHeap
RtlAllocateHeap
NtQuerySystemInformation
RtlSubAuthoritySid
RtlCreateBoundaryDescriptor
LdrGetDllHandle
NtQueryInformationProcess
RtlDeleteBoundaryDescriptor
NtOpenProcess
LdrFindResource_U
NtReadFile
NtQueryInformationToken
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlPrefixUnicodeString
NtDeleteValueKey
RtlLengthRequiredSid
RtlAcquirePebLock
NtSetValueKey
RtlPushFrame
NtFsControlFile
RtlGetCurrentPeb
NtCreatePrivateNamespace
DbgUiSetThreadDebugObject
NtDeletePrivateNamespace
NtOpenThreadToken
RtlFreeHeap
RtlRaiseStatus
RtlSetHeapInformation
RtlCreateHeap
LdrFindEntryForAddress
RtlAddSIDToBoundaryDescriptor
RtlReleasePebLock
RtlExpandEnvironmentStrings_U
NtQueryValueKey
LdrAccessResource
RtlUnwindEx
RtlFreeSid
NtCreateKey
RtlFormatCurrentUserKeyPath
NtOpenKey
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
NtDeleteFile
NtMapViewOfSection
RtlPopFrame
NtNotifyChangeDirectoryFile
RtlGetFrame
NtWaitForSingleObject
NtCreateFile
NtSetEvent
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
RtlGetVersion
NtTerminateProcess
NtUnmapViewOfSection
NtCreateEvent
NtClose
RtlInitUnicodeString
RtlRandomEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlEqualUnicodeString
NtCreateSection
RtlComputeCrc32
NtDuplicateObject
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetInformationToken
NtRemoveProcessDebug
NtDuplicateToken
NtQueryInformationFile
NtOpenProcessToken
RtlImageDirectoryEntryToData
RtlExitUserProcess
RtlQueryElevationFlags
LdrGetDllHandleEx
NtCompressKey
RtlImageNtHeader
comctl32
ord17
cabinet
ord13
ord14
ord11
ord10
msdelta
ApplyDeltaB
DeltaFree
bcrypt
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptDecrypt
BCryptGetProperty
BCryptDestroyKey
BCryptGenerateSymmetricKey
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ