Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 07:00

General

  • Target

    LB3.exe

  • Size

    145KB

  • MD5

    2a704c78d287be6fb1a9324dd3bbd780

  • SHA1

    2f79d2d07b33be225d3d333477c2d2159a471e0e

  • SHA256

    dec9845622a1996d768b0f38b7d7d16e6c76b2572b7e2eac55f678e686d4dc6f

  • SHA512

    a2681bdb05ecb2636958b37a65c32bfd27467b241052133ad7f02bb634ad6e5539718ba810c3568f9cf3d10996cdd255e6632c75565ec40b278cff88713a812d

  • SSDEEP

    3072:S6glyuxE4GsUPnliByocWepLk+B2Rq+V8Lmp:S6gDBGpvEByocWelKq8T

Malware Config

Signatures

  • Renames multiple (590) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LB3.exe
    "C:\Users\Admin\AppData\Local\Temp\LB3.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:1852
    • C:\ProgramData\7EE5.tmp
      "C:\ProgramData\7EE5.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\7EE5.tmp >> NUL
        3⤵
          PID:4308
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:908
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\AjrMf9Fb5.README.txt
        1⤵
        • Opens file in notepad (likely ransom note)
        • Suspicious use of FindShellTrayWindow
        PID:3548
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{ABF1B251-5774-44A0-AA68-AFDEFD6892BA}.xps" 133642044506730000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:4444

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        7abbf5b8b456ce9da76972a49d561c2f

        SHA1

        0e94ab4186fb68d70bbe33d8f4ec9c16f2ce7df8

        SHA256

        caeb4e113f9d044ddded88598fea8c6ecac8c214dd5cf10c421e89f345a1ca68

        SHA512

        a450b27e7764311caef334dee1ba34fcdf15045fab31e545a6149697d0ea333c58dcc2e047f1e4f3624d54058d70494661e1d68ebf534d4dca3f7f2a5411b972

      • C:\AjrMf9Fb5.README.txt

        Filesize

        19B

        MD5

        7edb66f1ed51a03a8b381c2307756c3c

        SHA1

        60fbdfcefe96843c077b66f7df2f89cbb3bd0312

        SHA256

        0fb417b326d101acbdbb29f1a10c8cfea19b6ce313c17f970ecbfd318c5015dd

        SHA512

        f65dc6c8a1494c267b217f562a6c98fa4b8d7ee9a77127d4062a6fba5e26879b9a4adb5649b3777d26f95ba491f29cde343fc4353e9ef6c8648ed51332a87dff

      • C:\ProgramData\7EE5.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{ABF1B251-5774-44A0-AA68-AFDEFD6892BA}.xps

        Filesize

        13.1MB

        MD5

        12425c74efece685191fab9f5b44543a

        SHA1

        8a5b85d5f9ce8508d4cd2e710b51cdee1f214b45

        SHA256

        0f81e552cab5574f0d26536e5d6bf2152d111a95413f76b859d687041b153521

        SHA512

        21263cc8fe1294a01720fc2e24140dc21658dc9ebb123b3d743a83ececc75bf579f1152cf73d67041144245b0b1f812aeaa7d620285ab7c7d9205bad34ca4cf1

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDD

        Filesize

        145KB

        MD5

        32dad7843baa0861c0f7267c4af5d320

        SHA1

        01008f6facfd8ae818a1698fbc39bdc9b755083f

        SHA256

        c68706acac67647327230fe75709370de69f9e8b6f90fc9c5a8c8e35aa8110cb

        SHA512

        451e44691b30ebe042b3497b88ee598bf26e38b7076d2ee837feab0fd5c3ebc6e9736b8fb8e91a46bd2e723b5a8580cd4b82e0f2f697895006ce423f7aa9ebca

      • C:\Users\Admin\AppData\Local\Temp\{00C31653-1C3C-41F5-9A33-96F1FEF8160C}

        Filesize

        4KB

        MD5

        09adbabfe488b5075fae3cfc0c7ffaa6

        SHA1

        6c4f3751f7df1080b4f0ddd5e9a0174635a835f7

        SHA256

        f2ac15d708441d82bc71200bb2a09e09b73add7f8e9651a82b367b8c3cc6416e

        SHA512

        09da458e6524fee60c7bdd277ce80c98540bbd14ee74dc9b8f91ed64e85fc4a2151fd3ccf62df3ba31386735fe33949b2525d2f613095cc22fc98a5ae74e5c5d

      • C:\Users\Admin\AppData\Local\Temp\{D7B20C83-53C2-4C3B-89B0-AF9A451D3072}

        Filesize

        4KB

        MD5

        6dba6dee738a78266b6d1d2f4e6a40ab

        SHA1

        6b954e6b33e317e83390cb0b869553a2a7b0ea38

        SHA256

        ec755e88a2fecdf1a18f758cab4fefa5b167f5c7065eb044bda3bdad79cbedad

        SHA512

        3471db8100eaba1469ca997e7f4ca23314f2ff16562ab79217de0db830b6869b7e24a877a7e90280ae2bd3b28e07c21bbfa6ab5d104010e1887a2432c731470e

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        2862629fe9ffd9ff1255a39570475a90

        SHA1

        81061fea98104c95064897f260c070a72613eb35

        SHA256

        4de5971fe125dccb929e654ed98512526d90eeb7b463ae4cf774b015df1dd595

        SHA512

        c6e48c980696c3f2e0a30ae00d8aaf5d57de438b74a489b3f10335fb65e5dba7bbfcc8792a84780505f4ed049847658c3f738768e723d0969307663412a28036

      • F:\$RECYCLE.BIN\S-1-5-21-2539840389-1261165778-1087677076-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        0e440eb06eb4ba65d9245e76c7dfa3af

        SHA1

        0989610dd604a1da1f74e246bc1036178901cd73

        SHA256

        dc0acec169625142f297b998276d7bf4ed8b0039d6431c69b8b05ebf732f53d4

        SHA512

        ada226ce359c98c82fb2893b2f8e6a77a0bb992998aa6b6527ab20504873464a3dc079b842a200acbfbc1eaf88d55ed14ea993f398834218e50419411c141810

      • memory/2324-2-0x00000000031E0000-0x00000000031F0000-memory.dmp

        Filesize

        64KB

      • memory/2324-1-0x00000000031E0000-0x00000000031F0000-memory.dmp

        Filesize

        64KB

      • memory/2324-0-0x00000000031E0000-0x00000000031F0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2730-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2762-0x00007FF7C5A80000-0x00007FF7C5A90000-memory.dmp

        Filesize

        64KB

      • memory/4444-2761-0x00007FF7C5A80000-0x00007FF7C5A90000-memory.dmp

        Filesize

        64KB

      • memory/4444-2731-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2729-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2732-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2728-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2858-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2859-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2861-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB

      • memory/4444-2860-0x00007FF7C7DB0000-0x00007FF7C7DC0000-memory.dmp

        Filesize

        64KB