Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 09:10

General

  • Target

    lb4_svchost.exe

  • Size

    145KB

  • MD5

    0e7adc219b82b823214edc523797b83e

  • SHA1

    eb40b252523621aea48448efc0bf6b971cc906e7

  • SHA256

    5a3cc12e20a0ecc79f526cd28344d24f48ff4f6da89235293edd264f02f69404

  • SHA512

    44ab6ea43112e2c361c1303a4fb5e6edb9e0390c9c571ae0c8d7a87cb0a472d9fc2f034c98235db2676019bf025e09d5bfa7e783cfa4de5225be7acc9e51ba97

  • SSDEEP

    1536:izICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xD5bwnHm/1BviIdU/IqbNLu75RjJ:hqJogYkcSNm9V7D50nH2viI2xadRj1T

Malware Config

Signatures

  • Renames multiple (8243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lb4_svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\lb4_svchost.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\ProgramData\8066.tmp
      "C:\ProgramData\8066.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\8066.tmp >> NUL
        3⤵
          PID:2040
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x14c
      1⤵
        PID:2428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini

        Filesize

        129B

        MD5

        0fcf7d2c276749acd46f862b19a6791a

        SHA1

        d3f33bde74bec069fc9ef60c1f636ed448f9c97c

        SHA256

        dec22f3c41a0c0ab8c599c3cb2bf071473802626aa8bf1e928720e3242d5fb5a

        SHA512

        7258f533c07686519d1ef7a08e60a630d4b26426638e7f6f8d2061145ead45401a0f96c3535d7dd887a6c38847d8e1f78730ef99f0f67d8d5f26d054c9a75d73

      • C:\GO4nojG0Y.README.txt

        Filesize

        469B

        MD5

        a995b39840afec2c6eee9c9be6f613c0

        SHA1

        ebd213d1dd59c6efd723262cf3dfcbe62e1156f7

        SHA256

        e61fb152f1a9290c4814feadc8723879f7aec2cbd20d40d83095eff85451acc7

        SHA512

        01bf59aff64981911db25f307639b2b10b9a84b817df212c0a57ba9f9d987ecdfa4aaf7cd807948cd1f3756620535e1e212905c363b238023f80aa4f173adb33

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDD

        Filesize

        145KB

        MD5

        5c163c2c5194b1e6244c63e664570f5c

        SHA1

        f2d6bd0c5efed35ec8ff0b47a729083e5afd4576

        SHA256

        e85c72d1a3a7e6265e86b61f20a149b3a66341b8a1bbdd7d3601c31f6efc7300

        SHA512

        5dbb43077033113de5d24305878a4627b2071df32276b801db83341ddc3eb41653f67a3a94db94d8150e8b39ba5a3352be32991c01affeeb10043e182a5b576a

      • F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        2fe48687074d64b049341a907bfe6e3c

        SHA1

        d3274bbc964bb3923fb695e0ac74bb5293e12d87

        SHA256

        650daeb4af284e4c5a73898b2df1e04f484343d4363125095e8faedefe81fa83

        SHA512

        f9a08d6eb7e75c89c63434ae48eabb068eed5d36ddb58e3143ac5465e9675fbff79cff82dfdfe13b0baf1c53ed760d3ee7c3ac775d1679519bf5b853fd38e962

      • \ProgramData\8066.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • memory/2300-12502-0x00000000003B0000-0x00000000003F0000-memory.dmp

        Filesize

        256KB

      • memory/2300-12505-0x000000007EF20000-0x000000007EF21000-memory.dmp

        Filesize

        4KB

      • memory/2300-12504-0x000000007EF80000-0x000000007EF81000-memory.dmp

        Filesize

        4KB

      • memory/2300-12503-0x00000000003B0000-0x00000000003F0000-memory.dmp

        Filesize

        256KB

      • memory/2300-12501-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

        Filesize

        4KB

      • memory/2300-12534-0x000000007EF40000-0x000000007EF41000-memory.dmp

        Filesize

        4KB

      • memory/2300-12535-0x000000007EF60000-0x000000007EF61000-memory.dmp

        Filesize

        4KB

      • memory/3040-0-0x00000000022B0000-0x00000000022F0000-memory.dmp

        Filesize

        256KB