Analysis

  • max time kernel
    98s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 16:04

General

  • Target

    LB3.exe

  • Size

    145KB

  • MD5

    6ef47bf0769d5ffff66803b62a6ef2c3

  • SHA1

    e3825327205f8f39c42c1b0d76c8f0aeff587dec

  • SHA256

    970c78e5f252490ea381faf4e9b311764b8be5f1f97f737fc96a8357018fd552

  • SHA512

    30cb1a3c86158f48a469f5ec1cad8584a9f432bf1c3f020321982180cd60f9acb2b17abcaff9a801d417548d5a482f746d602a8b267cd8c7a098d625e3a2571a

  • SSDEEP

    3072:pqJogYkcSNm9V7D8B+L5PDVdsvHuMXva4T:pq2kc4m9tD8B+LTe1y

Malware Config

Signatures

  • Renames multiple (627) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LB3.exe
    "C:\Users\Admin\AppData\Local\Temp\LB3.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:2092
    • C:\ProgramData\D4E5.tmp
      "C:\ProgramData\D4E5.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D4E5.tmp >> NUL
        3⤵
          PID:3968
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:1312
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{C2C28400-E19C-4FDA-8C1F-46DE507F5601}.xps" 133651010594740000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:1576
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\2RhHf8MzI.README.txt
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:3520

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-3419463127-3903270268-2580331543-1000\GGGGGGGGGGG

        Filesize

        129B

        MD5

        d58f40f7fa8e48a3859ff9f3d9d34456

        SHA1

        b8e21cb72350eaff42f515b7a80d3ee677fba780

        SHA256

        e6aad7eee4dd78491667aafa099a09e920ca714b7abeb37f9fe8805efad5f678

        SHA512

        a7422a9299b3fd13fe58e4139b119542d0fd5a2e4d805712782bca1023dcfc5d2c7083d671e18323bf2e5f5647b73e428bf10d5a5320bafc6b0c2ae60f7c6219

      • C:\2RhHf8MzI.README.txt

        Filesize

        316B

        MD5

        f7c2a71eb88dbc296f6f2219e4f03685

        SHA1

        894712e61f16fd1221e209ef1793dabb72a14f8c

        SHA256

        def22d8a877d824871a81902a456d421e81ea2abdf86999669d9a3087d864531

        SHA512

        852fd2569921b36412413cfb3cc194b089be1383421f3210f22ebb2a796bb53189a95bc7db761ba33d6c345588eb9edd5aa48917dca597eba4c546dcb8ab84d4

      • C:\ProgramData\D4E5.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\CCCCCCC

        Filesize

        145KB

        MD5

        d7c7a56ab3f51404176fc88436bfeae9

        SHA1

        6afe4ea00d198e78f62d5d82fdff618f06417f4b

        SHA256

        39252aae72da8c70fd798205e8a05e3cd545e20099d8faf8a2d5c4be678602dc

        SHA512

        c2f4f7ee55468f29889d525d1b507bb222220dfd79ab0854f04baf9927320abd55da3a4f175f3a2ee79387915e531469e0349ae830366fe7950071e891010640

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        bb16bee60a56ecdffcf40ed1f8faa3fd

        SHA1

        d302c8f9c10270b833799d848dac858a65fd25af

        SHA256

        1aa8787b8eeabb91c55b63e13c04446c23aeab96472b00001256b4c79fff4fe3

        SHA512

        ac40009abea49359b66c27a1a1cfe3c122d07a74fc50968ddd22dd9b1c9f01743e47e26ae3eb9804815c4a48be7955c960ea6569a8f7697e0a5baefa39ba5e3c

      • F:\$RECYCLE.BIN\S-1-5-21-3419463127-3903270268-2580331543-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        6cf56b3b01bf9dd9ae6d4a752c8cad35

        SHA1

        7dd5de3184f0cff85ba4b58fed9904c6e2d86b04

        SHA256

        5b167c98af808feb8ecc73d740e0deea3bcc4579b1129cd948481c3bdd2f209b

        SHA512

        9fa65d0ac3292a6f8e3e55550b284c7e894ff2ceb826d8949ba4b1f5c80010af4e2f95b6c06f1d53ae5bba16c81fe29fe1f4a6bd6c5524c8340c1263c44193a5

      • memory/1576-2844-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2862-0x00007FFC21140000-0x00007FFC21150000-memory.dmp

        Filesize

        64KB

      • memory/1576-2842-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2841-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2840-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2845-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2898-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2896-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2895-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2897-0x00007FFC23990000-0x00007FFC239A0000-memory.dmp

        Filesize

        64KB

      • memory/1576-2861-0x00007FFC21140000-0x00007FFC21150000-memory.dmp

        Filesize

        64KB

      • memory/2776-1-0x00000000009D0000-0x00000000009E0000-memory.dmp

        Filesize

        64KB

      • memory/2776-2-0x00000000009D0000-0x00000000009E0000-memory.dmp

        Filesize

        64KB

      • memory/2776-0-0x00000000009D0000-0x00000000009E0000-memory.dmp

        Filesize

        64KB