Resubmissions

23-05-2024 09:35

240523-lkmh5scb37 10

28-04-2024 14:29

240428-rth5zahg49 10

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:35

General

  • Target

    LockBit-Black-Builder-main/LockBit-Black-Builder-main/LockBit30/Build/LB3_ReflectiveDll_DllMain.dll

  • Size

    106KB

  • MD5

    2ecc319574b76994e76c4f971c820362

  • SHA1

    8f3d04cab7c6be2220860ec391d75ba2f8f17b33

  • SHA256

    123797c18b044fb5aeba5dcccaf9ef1df0b7553413e9433876f1f94b8cd0584f

  • SHA512

    39c63668d424ff9efa625a82312edf5a30f7ca3edd896bd6ef1857ced02e5462cf191af54b6e55388b844fa5e50f77e3a6ce5b5983f61eb57a45c4b2fbb3567e

  • SSDEEP

    1536:LzICS4A30TY1kUS/U2ztdS1I6DdL9Ta16CX4VtgYfC3zHZbhuMGCS:0J0TYyUS/U2RgGWL9+joVtHfilfd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit-Black-Builder-main\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit-Black-Builder-main\LockBit30\Build\LB3_ReflectiveDll_DllMain.dll,#1
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\ProgramData\5592.tmp
        "C:\ProgramData\5592.tmp"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:3992
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\5592.tmp >> NUL
          4⤵
            PID:3572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\5592.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\LockBit-Black-Builder-main\LockBit-Black-Builder-main\LockBit30\Build\DDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      106KB

      MD5

      03bce846961d8e75813bc26a07daf2f7

      SHA1

      2c29df36f52445942644f28a5a68e63ce17a2e6d

      SHA256

      5786cdb135fb938c518a60dc099bcc4e96a56241b0a1dc0d20f7256b194ca2af

      SHA512

      5610684024175545a692dabd3afcf4416fcd66ff8ff950187fcb16a804aa214f2407eb4603cbcae5f19c09beca62e61d33d1f19755ade83bdf88e727ad57eba0

    • memory/2596-4-0x0000000003490000-0x00000000034A0000-memory.dmp

      Filesize

      64KB

    • memory/2596-0-0x0000000002C60000-0x0000000002C70000-memory.dmp

      Filesize

      64KB

    • memory/2596-5-0x0000000003490000-0x00000000034A0000-memory.dmp

      Filesize

      64KB

    • memory/2596-6-0x0000000003490000-0x00000000034A0000-memory.dmp

      Filesize

      64KB

    • memory/2596-2-0x0000000002C60000-0x0000000002C70000-memory.dmp

      Filesize

      64KB

    • memory/2596-1-0x0000000002C60000-0x0000000002C70000-memory.dmp

      Filesize

      64KB

    • memory/3992-29-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

      Filesize

      4KB

    • memory/3992-27-0x000000007FE20000-0x000000007FE21000-memory.dmp

      Filesize

      4KB

    • memory/3992-25-0x0000000000490000-0x00000000004A0000-memory.dmp

      Filesize

      64KB

    • memory/3992-20-0x0000000000490000-0x00000000004A0000-memory.dmp

      Filesize

      64KB

    • memory/3992-13-0x000000007FE40000-0x000000007FE41000-memory.dmp

      Filesize

      4KB

    • memory/3992-46-0x000000007FE00000-0x000000007FE01000-memory.dmp

      Filesize

      4KB

    • memory/3992-45-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

      Filesize

      4KB