Analysis
-
max time kernel
77s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 22:20
Behavioral task
behavioral1
Sample
7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe
Resource
win10v2004-20240709-en
General
-
Target
7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe
-
Size
156KB
-
MD5
827fd84e6c235dbb400442390a538441
-
SHA1
f88eafeeb71837534f32d7de483497d8d74fb279
-
SHA256
7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea
-
SHA512
4e6df341e606cdc5ecafd02b7e9ba979502301e5e89aaecf604018d014019ffd6bd26b1380cb316ec1beb8f533df5125e75ec67d8760f7bcd90f883b72199f6b
-
SSDEEP
3072:1DDDDDDDDDDDDDDDDDDDE45d/t6sVkgZqltP3368yUTtc76PJCW:n5d/zugZqll3OUCuPJ
Malware Config
Extracted
C:\Users\bMHeBJMks.README.txt
http://lockbit3753ekiocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2id.onion/
http://lockbit3g3ohd3katajf6zaehxz4h4cnhmz5t735zpltywhwpc6oy3id.onion/
http://lockbit3olp7oetlc4tl5zydnoluphh7fvdt5oa6arcp2757r7xkutid.onion/
http://lockbit435xk3ki62yun7z5nhwz6jyjdp2c64j5vge536if2eny3gtid.onion/
http://lockbit4lahhluquhoka3t4spqym2m3dhe66d6lr337glmnlgg2nndad.onion/
http://lockbit6knrauo3qafoksvl742vieqbujxw7rd6ofzdtapjb4rrawqad.onion/
http://lockbit7ouvrsdgtojeoj5hvu6bljqtghitekwpdy3b6y62ixtsu5jqd.onion/
https://twitter.com/hashtag/lockbit?f=live
http://lockbit5eevg7vec4vwwtzgkl4kulap6oxbic2ye4mnmlq6njnpc47qd.onion
http://lockbit74beza5z3e3so7qmjnvlgoemscp7wtp33xo7xv7f7xtlqbkqd.onion
http://lockbit75naln4yj44rg6ez6vjmdcrt7up4kxmmmuvilcg4ak3zihxid.onion
http://lockbit7a2g6ve7etbcy6iyizjnuleffz4szgmxaawcbfauluavi5jqd.onion
http://lockbitaa46gwjck2xzmi2xops6x4x3aqn6ez7yntitero2k7ae6yoyd.onion
http://lockbitb42tkml3ipianjbs6e33vhcshb7oxm2stubfvdzn3y2yqgbad.onion
http://lockbitcuo23q7qrymbk6dsp2sadltspjvjxgcyp4elbnbr6tcnwq7qd.onion
Signatures
-
Renames multiple (166) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2920 F72B.tmp -
Executes dropped EXE 1 IoCs
pid Process 2920 F72B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\bMHeBJMks.bmp" 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\bMHeBJMks.bmp" 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\WallpaperStyle = "10" 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bMHeBJMks 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bMHeBJMks\ = "bMHeBJMks" 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bMHeBJMks\DefaultIcon 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bMHeBJMks 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bMHeBJMks\DefaultIcon\ = "C:\\ProgramData\\bMHeBJMks.ico" 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp 2920 F72B.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeDebugPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: 36 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeImpersonatePrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeIncBasePriorityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeIncreaseQuotaPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: 33 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeManageVolumePrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeProfSingleProcessPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeRestorePrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSystemProfilePrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeTakeOwnershipPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeShutdownPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeDebugPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 940 vssvc.exe Token: SeRestorePrivilege 940 vssvc.exe Token: SeAuditPrivilege 940 vssvc.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeSecurityPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe Token: SeBackupPrivilege 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2920 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 34 PID 2120 wrote to memory of 2920 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 34 PID 2120 wrote to memory of 2920 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 34 PID 2120 wrote to memory of 2920 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 34 PID 2120 wrote to memory of 2920 2120 7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe"C:\Users\Admin\AppData\Local\Temp\7de7ce42cde20847749fa5bc4048cf5cacec8c2bf49169d7d262ea38630640ea.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\ProgramData\F72B.tmp"C:\ProgramData\F72B.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
PID:2920
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:940
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1501⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5fc73e2c3875b518812cf37038c166971
SHA1b8da17f868c81e8c88b9c6df7171d68f8d6d536a
SHA256f5284eaa39b164e208c1eb206111aab25c10551ad6f449c6a6e4b54a5341e0b2
SHA512becb885f61075f81dfd924202b41f8f08ce7957a49666488715d926f73f28965c4bb46bd3a82c15409cdc43634103d3bd92bf603c4c27e693522c2035a66b8c8
-
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Filesize156KB
MD51cb9ee7cd5daaada761164a81b4294c6
SHA11f3c8d9d9c1411e79b3b6e2c03a5516ab5c34df1
SHA256cdac026ee20eb730814c46f169b8569b69b51ad62f0dd61054dd7de839194019
SHA51236787b4fec58b1c4363664f8455450ce339c53c73698a9991823e6c635ef61dc78744eabbca676fa286cf2034d4a373545855239c41fdb1bf22e2524d10f7cf0
-
Filesize
2KB
MD5b91cfff5e448429226843ea9b26c21fb
SHA14f640969b9aab6f514975b8f7140f48af51b05fb
SHA256f3ead46432ffebb864a244dc0849384732628df648c31f70a5e783daa0140191
SHA512fc7d8ce8127520f4907500e2a2eddb6fb0827af54f4f1878a7ca6d9c0ae4e74b1b154da07c404751efa15a68e101fe6caeb62ea385fa0dcd1d62bbb3613db140
-
Filesize
129B
MD57291728b2dfddbb2fc9d63dfd41266cb
SHA1e3acb756e6567ba1018693b4e30a70389454af6f
SHA256e91240c5c82c192f56e8ff857b645aaa898f56c98ed78612cde8a68c47959645
SHA5125dea1f8f8630bd016c53b42c049e32d376e71bbcde0d84170a0197adbecf73c79f8cb2cc336305c9e9b6c184dac49a701f02dfe5b86c28adedf905641ac7b6f2
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf