Overview
overview
10Static
static
10Build.bat
windows7-x64
1Build.bat
windows10-2004-x64
1Build/LB3.exe
windows7-x64
10Build/LB3.exe
windows10-2004-x64
10Build/LB3D...or.exe
windows7-x64
5Build/LB3D...or.exe
windows10-2004-x64
5Build/LB3_...in.dll
windows7-x64
10Build/LB3_...in.dll
windows10-2004-x64
7Build/LB3_...32.dll
windows7-x64
1Build/LB3_...32.dll
windows10-2004-x64
1Build/LB3_...ss.dll
windows7-x64
10Build/LB3_...ss.dll
windows10-2004-x64
10Build/LB3_pass.exe
windows7-x64
10Build/LB3_pass.exe
windows10-2004-x64
10builder.exe
windows7-x64
1builder.exe
windows10-2004-x64
1keygen.exe
windows7-x64
1keygen.exe
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 02:47
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Build/LB3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Build/LB3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Build/LB3Decryptor.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Build/LB3Decryptor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Build/LB3_ReflectiveDll_DllMain.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Build/LB3_ReflectiveDll_DllMain.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Build/LB3_Rundll32.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Build/LB3_Rundll32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Build/LB3_Rundll32_pass.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Build/LB3_Rundll32_pass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Build/LB3_pass.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Build/LB3_pass.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
builder.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
builder.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
keygen.exe
Resource
win10v2004-20240226-en
General
-
Target
Build/LB3.exe
-
Size
153KB
-
MD5
a77aa09d078b9380029e6100edbe2c83
-
SHA1
6fbb43a72056d7432434e123e77234cafafdf6ea
-
SHA256
4af96f0de6c0c89158c41974b4323869343e169b1f2a95a7960646d6b0edc3ea
-
SHA512
596c290ac55641df4220e8821bc51cc24f08552cca8e36c37c6ce641e8e3b8e9fa4ff56d0497e64e6bca92ca4bef07fca8ce3442297d2c17b829e7281a239153
-
SSDEEP
3072:96glyuxE4GsUPnliByocWepfd1D5nZ42zYWkD:96gDBGpvEByocWeFzE+rk
Malware Config
Extracted
C:\Users\Admin\HHuYRxB06.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
https://tox.chat/download.html
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Renames multiple (348) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 584 BBE0.tmp -
Executes dropped EXE 1 IoCs
pid Process 584 BBE0.tmp -
Loads dropped DLL 1 IoCs
pid Process 1692 LB3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini LB3.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini LB3.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\HHuYRxB06.bmp" LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\HHuYRxB06.bmp" LB3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 584 BBE0.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\WallpaperStyle = "10" LB3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HHuYRxB06\DefaultIcon LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HHuYRxB06 LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HHuYRxB06\DefaultIcon\ = "C:\\ProgramData\\HHuYRxB06.ico" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.HHuYRxB06 LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.HHuYRxB06\ = "HHuYRxB06" LB3.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe 1692 LB3.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp 584 BBE0.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeDebugPrivilege 1692 LB3.exe Token: 36 1692 LB3.exe Token: SeImpersonatePrivilege 1692 LB3.exe Token: SeIncBasePriorityPrivilege 1692 LB3.exe Token: SeIncreaseQuotaPrivilege 1692 LB3.exe Token: 33 1692 LB3.exe Token: SeManageVolumePrivilege 1692 LB3.exe Token: SeProfSingleProcessPrivilege 1692 LB3.exe Token: SeRestorePrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSystemProfilePrivilege 1692 LB3.exe Token: SeTakeOwnershipPrivilege 1692 LB3.exe Token: SeShutdownPrivilege 1692 LB3.exe Token: SeDebugPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeBackupPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe Token: SeSecurityPrivilege 1692 LB3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1692 wrote to memory of 584 1692 LB3.exe 30 PID 1692 wrote to memory of 584 1692 LB3.exe 30 PID 1692 wrote to memory of 584 1692 LB3.exe 30 PID 1692 wrote to memory of 584 1692 LB3.exe 30 PID 1692 wrote to memory of 584 1692 LB3.exe 30 PID 584 wrote to memory of 1788 584 BBE0.tmp 31 PID 584 wrote to memory of 1788 584 BBE0.tmp 31 PID 584 wrote to memory of 1788 584 BBE0.tmp 31 PID 584 wrote to memory of 1788 584 BBE0.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe"C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\ProgramData\BBE0.tmp"C:\ProgramData\BBE0.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\BBE0.tmp >> NUL3⤵PID:1788
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1541⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD54ee2bd94fb3dd4d62f58c6a293ee7ba5
SHA10e0ca7f9b31c9236d45d1e8f15b15c32567c5b5f
SHA256c1ac4cd51023b4b163431ccd25729e5ae2a67e5e15e2f7a27376663b64c23d65
SHA512c60ad988f71570b10879e82425b416d3fd597f0ef933d825bc748940488442bd4925ba8c20c14de4c9cbef2a6a609cb15a909bfa4065d3daa948fa2d9ce49236
-
Filesize
153KB
MD544a60f9487ef6b63e157abd4e4a4d556
SHA1597794bce55974c514a669fa219d9377c9e537e8
SHA25602af42cde702b45c13961c02667567b800f5559412d5fa01b0d94449133f414f
SHA5123aae1dc7b0831e108b0179a3f5cb7bc728ebb4856996ac3fcb3ee944e322d702ea589d2a27fc2d5c8d90fc7cce3f8f1c79fb34152d0870d40eaec8b158261442
-
Filesize
6KB
MD591e6515d792bb411fd33d6ba77538d33
SHA1fa79afcb40955ff87a773a2bf9cab164ee1b8832
SHA256cb4da6121c1ab49f2c7d95fa3bda59a86176980a00551ae3c629c0bad3cf3993
SHA5121bfadf225d4d5c7e5bcd8c0d57d24488264208290698cb9ec88069e9a4100d038b8a696abb3deb0dac2e4b8ce9431fccb2284c4838f251237433118104b1c5d0
-
Filesize
129B
MD5a3fea75c968e356270b05ac57c382a7f
SHA1fc0f4bfe90479936e3cb0ecf853b6bb59c217874
SHA256d11ac2aab81396448ff0a3982bf5ff2eba2d9a8f6b8899681ac7b36168845048
SHA512bc8a722c324d106de335aad9beb5e8adb8b0245ebbe32023d76c36c5bffb2681510555e9b2efc4b6c9a0a2eda13b239efec54e9249b6af9e79af0f0ff25b94d8
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf