Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 04:11

General

  • Target

    LB3.exe

  • Size

    145KB

  • MD5

    f24e4d221c73ebf1c2fb12d15c13fde9

  • SHA1

    019ef3cbd70a0c4e3ea5c45ec4afdc28a655ed81

  • SHA256

    4f006379bbd3a2b2611346595ce373595031177d7043200591d81150aefc8ee0

  • SHA512

    1508ebf2cba481eda06707d133b994932688d6d3be6c1373e9e88bf8c36a02331df31dc1a575b6e4ed8a160294c88ae8767115af16af94e51b1589bdeedd1629

  • SSDEEP

    3072:H6glyuxE4GsUPnliByocWepMIO/oULmUHI:H6gDBGpvEByocWeGy6

Malware Config

Signatures

  • Renames multiple (321) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LB3.exe
    "C:\Users\Admin\AppData\Local\Temp\LB3.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\ProgramData\F289.tmp
      "C:\ProgramData\F289.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\F289.tmp >> NUL
        3⤵
          PID:1768
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x14c
      1⤵
        PID:2288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini

        Filesize

        129B

        MD5

        a8a886abdf8816fcc5b07c6044fe7813

        SHA1

        9265c1b315323c2b920fc14ff36900760f9309bd

        SHA256

        6d82d71eac64803cf06eb960311e649a96ed2e1f75bb5423c72ff17241aa9c08

        SHA512

        68c53d6e716e2979ec8bfddcdfcdadde797a81be004c080246b4ae3f9428c36db7fdab1dacada2a5efc99f9dbb812a109839353d56ad2940a4c8de8818603ee8

      • C:\N0IKX538u.README.txt

        Filesize

        19B

        MD5

        7edb66f1ed51a03a8b381c2307756c3c

        SHA1

        60fbdfcefe96843c077b66f7df2f89cbb3bd0312

        SHA256

        0fb417b326d101acbdbb29f1a10c8cfea19b6ce313c17f970ecbfd318c5015dd

        SHA512

        f65dc6c8a1494c267b217f562a6c98fa4b8d7ee9a77127d4062a6fba5e26879b9a4adb5649b3777d26f95ba491f29cde343fc4353e9ef6c8648ed51332a87dff

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDD

        Filesize

        145KB

        MD5

        5988c2acfe2794f8a3ffe1b3b3d2f044

        SHA1

        3a10fe2c68e156f8e5c2681e094b2c19cc0be883

        SHA256

        5d6deabbba1b947f96add8f8ea60fdf6c3f841c96754bca7e62e7d4d51cae3c6

        SHA512

        fadc09a81cf00caa2882a319efe06cb1dc70f55ee37847ba603c24d4be70c8062f18e27c3bfd11b7e396a53ed32df36de0cf8e588933f728ef31e9535c584671

      • F:\$RECYCLE.BIN\S-1-5-21-2172136094-3310281978-782691160-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        aef182bb49881afefdea21ca8a3a7734

        SHA1

        53f31f0cf9c8ace46bf0a0ee11ce59f4868b8e0f

        SHA256

        7f396d7e729d35e6c20de924b638f2634f539c2c32e57d46d97ab9efc9e7cad4

        SHA512

        e9fd4c2ab1b49c4ba039ddc02c4d43fef7497f4262802d2e1d888f8f89c4c7c272ce42cce1780fe42061e6baae375348236d59a50802cc676d905a70c4717d28

      • \ProgramData\F289.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • memory/2180-854-0x0000000000401000-0x0000000000404000-memory.dmp

        Filesize

        12KB

      • memory/2180-856-0x0000000000400000-0x0000000000407000-memory.dmp

        Filesize

        28KB

      • memory/2396-0-0x0000000000250000-0x0000000000290000-memory.dmp

        Filesize

        256KB