Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 04:18
Behavioral task
behavioral1
Sample
50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe
Resource
win10v2004-20240611-en
General
-
Target
50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe
-
Size
149KB
-
MD5
de02e4309c6c0e95b1413e57602ec400
-
SHA1
1ef11a6c9fdf4fe23234a009a2bc498ec6e817ec
-
SHA256
50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0
-
SHA512
596a106fc6bedcf33ad2615739e484f4a6944d0cf2712918a978d4905f2ee086d770be89953e3209f501bb78283d852bcf471cb87c95f8a407db7834682cbb2b
-
SSDEEP
3072:EYKRc6flrbkgjDCv8vOl1hdOiQxju5tv5ZeUtcC+UQmTxWyD7mASv2u0KXCK7BEe:NGN1bkgjDC0WVI9x6bBZeY5TxWyDaSun
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-0-0x0000000000400000-0x0000000000429000-memory.dmp family_lockbit -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2184 2432 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exedescription pid Process procid_target PID 2432 wrote to memory of 2184 2432 50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe 28 PID 2432 wrote to memory of 2184 2432 50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe 28 PID 2432 wrote to memory of 2184 2432 50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe 28 PID 2432 wrote to memory of 2184 2432 50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe"C:\Users\Admin\AppData\Local\Temp\50ad6829b8eb91fa518bb7ca8a41422afcf94a0965e8d8ddcfb0e235b30e33a0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 882⤵
- Program crash
PID:2184
-