Overview
overview
10Static
static
10LockBit-ma...ld.bat
windows7-x64
1LockBit-ma...ld.bat
windows10-2004-x64
1LockBit-ma...ME.vbs
windows7-x64
1LockBit-ma...ME.vbs
windows10-2004-x64
1LockBit-ma...er.exe
windows7-x64
1LockBit-ma...er.exe
windows10-2004-x64
1LockBit-ma...en.exe
windows7-x64
1LockBit-ma...en.exe
windows10-2004-x64
1Analysis
-
max time kernel
29s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 11:09
Behavioral task
behavioral1
Sample
LockBit-main/Build.bat
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
LockBit-main/Build.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
LockBit-main/README.vbs
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
LockBit-main/README.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
LockBit-main/builder.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
LockBit-main/builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
LockBit-main/keygen.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
LockBit-main/keygen.exe
Resource
win10v2004-20240508-en
General
-
Target
LockBit-main/Build.bat
-
Size
1KB
-
MD5
b8f24efd1d30aac9d360db90c8717aee
-
SHA1
7d31372560f81ea24db57bb18d56143251a8b266
-
SHA256
95df1d82137315708931f1fc3411e891cd42d1cab413d4380b479788729248ed
-
SHA512
14ebf7905f15983593164d1c093bb99d098daf3963f1b7a913c1a9763acb950075a0d2cceab3558cce3e7269c2a2d5dacc2b3c6c55807b0b6bda6bfad62dd032
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 2948 keygen.exe 2332 builder.exe 3040 builder.exe 2340 builder.exe 2524 builder.exe 2640 builder.exe 2656 builder.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2948 1704 cmd.exe 29 PID 1704 wrote to memory of 2948 1704 cmd.exe 29 PID 1704 wrote to memory of 2948 1704 cmd.exe 29 PID 1704 wrote to memory of 2948 1704 cmd.exe 29 PID 1704 wrote to memory of 2332 1704 cmd.exe 30 PID 1704 wrote to memory of 2332 1704 cmd.exe 30 PID 1704 wrote to memory of 2332 1704 cmd.exe 30 PID 1704 wrote to memory of 2332 1704 cmd.exe 30 PID 1704 wrote to memory of 3040 1704 cmd.exe 31 PID 1704 wrote to memory of 3040 1704 cmd.exe 31 PID 1704 wrote to memory of 3040 1704 cmd.exe 31 PID 1704 wrote to memory of 3040 1704 cmd.exe 31 PID 1704 wrote to memory of 2340 1704 cmd.exe 32 PID 1704 wrote to memory of 2340 1704 cmd.exe 32 PID 1704 wrote to memory of 2340 1704 cmd.exe 32 PID 1704 wrote to memory of 2340 1704 cmd.exe 32 PID 1704 wrote to memory of 2524 1704 cmd.exe 33 PID 1704 wrote to memory of 2524 1704 cmd.exe 33 PID 1704 wrote to memory of 2524 1704 cmd.exe 33 PID 1704 wrote to memory of 2524 1704 cmd.exe 33 PID 1704 wrote to memory of 2640 1704 cmd.exe 34 PID 1704 wrote to memory of 2640 1704 cmd.exe 34 PID 1704 wrote to memory of 2640 1704 cmd.exe 34 PID 1704 wrote to memory of 2640 1704 cmd.exe 34 PID 1704 wrote to memory of 2656 1704 cmd.exe 35 PID 1704 wrote to memory of 2656 1704 cmd.exe 35 PID 1704 wrote to memory of 2656 1704 cmd.exe 35 PID 1704 wrote to memory of 2656 1704 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\LockBit-main\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\LockBit-main\keygen.exekeygen -path Build -pubkey pub.key -privkey priv.key2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type dec -privkey Build\priv.key -config config.json -ofile Build\LB3Decryptor.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type enc -exe -pubkey Build\pub.key -config config.json -ofile Build\LB3.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type enc -exe -pass -pubkey Build\pub.key -config config.json -ofile Build\LB3_pass.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type enc -dll -pubkey Build\pub.key -config config.json -ofile Build\LB3_Rundll32.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type enc -dll -pass -pubkey Build\pub.key -config config.json -ofile Build\LB3_Rundll32_pass.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\LockBit-main\builder.exebuilder -type enc -ref -pubkey Build\pub.key -config config.json -ofile Build\LB3_ReflectiveDll_DllMain.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2656
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD553ad903aaac54a82a93fc283fe7346fb
SHA1d0214db9ab2ad8a1813e176db9b71ef4a64d770d
SHA256d986fc84c54af6ef03c5bb4b525b9f85032a4486198387ba5f0b707c3c1a0a7b
SHA512b21cbad022a26848c1f72d17a4435c028998707d0bed72fae73a9c32358d459e4a7650f683afa292f949c44eda9b112ce3f8101aaf33284b25bcdba6fc40c386
-
Filesize
344B
MD5958c38b3c41bd3ca602d98156086052f
SHA19bf0f92cc5206376a57297ef2f1927057e8508be
SHA25689bcb4b2cb1fcaf397a02cee660b1f249a2719c75882607ec461fc241940f84b
SHA512b35e9d2eaacf8b607628f08f5e9faab7f58c909465ceb4e3514b34afb6f7c5c66b0fbf6fa2337e12dc0a9a8cd9ce3c76d49bb0fbb2d99429dca9e6222bbeb578