Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 11:35
Behavioral task
behavioral1
Sample
2024-07-09_5f491563a87b37afd1d12d14cd00631b_lockbit.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_5f491563a87b37afd1d12d14cd00631b_lockbit.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-09_5f491563a87b37afd1d12d14cd00631b_lockbit.exe
-
Size
143KB
-
MD5
5f491563a87b37afd1d12d14cd00631b
-
SHA1
d6d4337fe3ad9887697142b565ddc4635c489616
-
SHA256
bd574c6fe75d0689277ce42742c29514620d76f025a50fc83ea9ef0ab987bba8
-
SHA512
9667bbb8d41ca9b5105df157118da65a7605bb360e68230017a6110b34d6a98aea6ff5d1e664e545a613cc130953c8f970d2b5e0f2593f2ddfde51ab785f6e87
-
SSDEEP
3072:HjUr8tlAC2z9mXTlpG/7K9x6k4uk0ivk7doQDHbPeJFDDx5kOjHhA:DUwPADAXTlp7C7XU7bPe/vbC
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/456-0-0x0000000000400000-0x0000000000427000-memory.dmp family_lockbit behavioral2/memory/456-1-0x0000000000400000-0x0000000000427000-memory.dmp family_lockbit -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4132 456 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_5f491563a87b37afd1d12d14cd00631b_lockbit.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_5f491563a87b37afd1d12d14cd00631b_lockbit.exe"1⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 2642⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 456 -ip 4561⤵PID:3028