Analysis

  • max time kernel
    65s
  • max time network
    70s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-07-2024 04:11

General

  • Target

    LB3.exe

  • Size

    145KB

  • MD5

    f24e4d221c73ebf1c2fb12d15c13fde9

  • SHA1

    019ef3cbd70a0c4e3ea5c45ec4afdc28a655ed81

  • SHA256

    4f006379bbd3a2b2611346595ce373595031177d7043200591d81150aefc8ee0

  • SHA512

    1508ebf2cba481eda06707d133b994932688d6d3be6c1373e9e88bf8c36a02331df31dc1a575b6e4ed8a160294c88ae8767115af16af94e51b1589bdeedd1629

  • SSDEEP

    3072:H6glyuxE4GsUPnliByocWepMIO/oULmUHI:H6gDBGpvEByocWeGy6

Malware Config

Signatures

  • Renames multiple (600) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LB3.exe
    "C:\Users\Admin\AppData\Local\Temp\LB3.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:1276
    • C:\ProgramData\F6F4.tmp
      "C:\ProgramData\F6F4.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\F6F4.tmp >> NUL
        3⤵
          PID:2644
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\N0IKX538u.README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3320
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:840
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E7D99FA0-85E2-4202-9D5E-5A7F398869C5}.xps" 133648855528280000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:3300
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1016

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-587429654-1855694383-2268796072-1000\desktop.ini

          Filesize

          129B

          MD5

          847753b7b3a2b6303de403c82cd60041

          SHA1

          7a85d062a630a3dfda6ce2f0ee82998becbfa8d3

          SHA256

          089f8a2e813c63fc69d8619b512ab32c33da90f74694339f4f2036cae3e85e77

          SHA512

          4a1fa7a9ee41e1fda419cc8fa2449effc9dbe0c64dc9b5fcb7c75645289d7583ae3981d8173fe3c368b98781e4aa35d41ae6445d02ac53074aca3ca2672d78d5

        • C:\N0IKX538u.README.txt

          Filesize

          19B

          MD5

          7edb66f1ed51a03a8b381c2307756c3c

          SHA1

          60fbdfcefe96843c077b66f7df2f89cbb3bd0312

          SHA256

          0fb417b326d101acbdbb29f1a10c8cfea19b6ce313c17f970ecbfd318c5015dd

          SHA512

          f65dc6c8a1494c267b217f562a6c98fa4b8d7ee9a77127d4062a6fba5e26879b9a4adb5649b3777d26f95ba491f29cde343fc4353e9ef6c8648ed51332a87dff

        • C:\ProgramData\F6F4.tmp

          Filesize

          14KB

          MD5

          294e9f64cb1642dd89229fff0592856b

          SHA1

          97b148c27f3da29ba7b18d6aee8a0db9102f47c9

          SHA256

          917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

          SHA512

          b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

        • C:\Users\Admin\AppData\Local\Temp\DDDDDDD

          Filesize

          145KB

          MD5

          e3c96f419361b9ff86d99870fdaa1481

          SHA1

          873b1b9e18fe174d2e221f3f1beb54da5a937d18

          SHA256

          34bdb8c7af99201ec443311166c7603c3062dec2cc7cd2750a131f74d3d5252c

          SHA512

          f6c550584a7245743ee6abfdd62730f7b7670fab2cb088c5cfaf363b57ddd59caaee37506cf10f886b948245da43cec6d93615b8edf4e260788b1a509f476726

        • C:\Users\Admin\AppData\Local\Temp\{0BF7B9C8-4846-4785-89E3-3E0CA4E0D4C9}

          Filesize

          4KB

          MD5

          3c7afa56171024f10213b6959389de42

          SHA1

          cad7fd8bc8a95fc5f2ef07722c09232de8698fbf

          SHA256

          2dc4973e0af185205407e37317d018eedb166aa342185daa987767726c037c0e

          SHA512

          2d980329e2350f7ebbe826eabeb00f31a99efe9eda6e97254a7fb301ac0f4cdec30b1b4d9ea3c83c350eabdab9fdc49329e95cecef4b96dfb6003034b8bd3b9c

        • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

          Filesize

          4KB

          MD5

          a0a21e13fba70c11505de20dbb11ce9f

          SHA1

          42a1570ddca67ade54832d1cec7152092af8c34b

          SHA256

          517d961d59c35aa5d95d8ffd57b13dda96dfa5f45f2f1642f2139d9883b391dd

          SHA512

          80b938ef075bb8ae8ffbae317264a6a57ddbb9b7532abcd0d5525ad06d538fe7c10c4ca44d371be4ebcbc79e590986943c770365c05221efe53144697c672f66

        • F:\$RECYCLE.BIN\S-1-5-21-587429654-1855694383-2268796072-1000\DDDDDDDDDDD

          Filesize

          129B

          MD5

          c574d48e6c005fa49d5ff109489de77e

          SHA1

          bbe5dcff0d5dfc2a8920f2671603b0316e98a488

          SHA256

          4680860e83bc09f4e603a8ae6ec43ade684979d8724377b9bc260f1ec38a34ea

          SHA512

          abf0002273b916b2b1d450dfce5c1d75326de636e658398c5bcd2eeb81b70a2f03e59454a3a9cb8eb275a83461b060092752b8857c3bf0114eb37d4361c5c1ad

        • memory/3300-2760-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2825-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2752-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2756-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2759-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2822-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2823-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2757-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2824-0x00007FFAF4470000-0x00007FFAF4480000-memory.dmp

          Filesize

          64KB

        • memory/3300-2789-0x00007FFAF2410000-0x00007FFAF2420000-memory.dmp

          Filesize

          64KB

        • memory/3300-2790-0x00007FFAF2410000-0x00007FFAF2420000-memory.dmp

          Filesize

          64KB

        • memory/3468-0-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB

        • memory/3468-1-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB

        • memory/3468-2749-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB

        • memory/3468-2751-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB

        • memory/3468-2750-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB

        • memory/3468-2-0x0000000001110000-0x0000000001120000-memory.dmp

          Filesize

          64KB