Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe
Resource
win10v2004-20240802-en
General
-
Target
2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe
-
Size
183KB
-
MD5
3870e4591ce517d956771e23c361582d
-
SHA1
28d09d35d3e5a8490ef4a4ebaa36262fa411afba
-
SHA256
2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d
-
SHA512
61dc0f9ca1a81170ef6aa4e514432079ebf12509eb615a191dae9f0e801d95748adf1cfd7d03dc5035dddd809458b0d42453b3fd51ca29cca3b8776a430de2d1
-
SSDEEP
3072:8FuxfutjURbpYkH+wWtaiEGlIQZboLRG9ua/aHyvXgQd2md:8FEgjUXr7NGlVbAh
Malware Config
Extracted
C:\MNYHU2Jh1.README.txt
https://coinatmradar.com
https://www.moonpay.com/buy
https://tox.chat/download.html
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d39-10.dat family_lockbit -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (323) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2624 LB3.exe 2240 F595.tmp -
Loads dropped DLL 3 IoCs
pid Process 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 2624 LB3.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyOtApp = "C:\\Users\\Admin\\AppData\\Roaming\\JavaUpdate\\JavaUpdate.exe" 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini LB3.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini LB3.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\MNYHU2Jh1.bmp" LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\MNYHU2Jh1.bmp" LB3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2240 F595.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LB3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F595.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Desktop\WallpaperStyle = "10" LB3.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Desktop LB3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MNYHU2Jh1\DefaultIcon LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MNYHU2Jh1 LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MNYHU2Jh1\DefaultIcon\ = "C:\\ProgramData\\MNYHU2Jh1.ico" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.MNYHU2Jh1 LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.MNYHU2Jh1\ = "MNYHU2Jh1" LB3.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe 2624 LB3.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 2624 LB3.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe Token: SeAssignPrimaryTokenPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeDebugPrivilege 2624 LB3.exe Token: 36 2624 LB3.exe Token: SeImpersonatePrivilege 2624 LB3.exe Token: SeIncBasePriorityPrivilege 2624 LB3.exe Token: SeIncreaseQuotaPrivilege 2624 LB3.exe Token: 33 2624 LB3.exe Token: SeManageVolumePrivilege 2624 LB3.exe Token: SeProfSingleProcessPrivilege 2624 LB3.exe Token: SeRestorePrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSystemProfilePrivilege 2624 LB3.exe Token: SeTakeOwnershipPrivilege 2624 LB3.exe Token: SeShutdownPrivilege 2624 LB3.exe Token: SeDebugPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeBackupPrivilege 2624 LB3.exe Token: SeSecurityPrivilege 2624 LB3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2624 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 32 PID 2388 wrote to memory of 2624 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 32 PID 2388 wrote to memory of 2624 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 32 PID 2388 wrote to memory of 2624 2388 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe 32 PID 2624 wrote to memory of 2240 2624 LB3.exe 34 PID 2624 wrote to memory of 2240 2624 LB3.exe 34 PID 2624 wrote to memory of 2240 2624 LB3.exe 34 PID 2624 wrote to memory of 2240 2624 LB3.exe 34 PID 2624 wrote to memory of 2240 2624 LB3.exe 34 PID 2240 wrote to memory of 672 2240 F595.tmp 35 PID 2240 wrote to memory of 672 2240 F595.tmp 35 PID 2240 wrote to memory of 672 2240 F595.tmp 35 PID 2240 wrote to memory of 672 2240 F595.tmp 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe"C:\Users\Admin\AppData\Local\Temp\2c85d7c4dd069fff494edd19387d56e54a52f6ef1b557f3d775f999410eb5a4d.exe"1⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\LB3.exe"C:\Users\Admin\AppData\Local\Temp\LB3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\ProgramData\F595.tmp"C:\ProgramData\F595.tmp"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\F595.tmp >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:672
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5c315544f5a69916c724f3dab064c0446
SHA16cde79883806203fedea8df1e5b642d00810af63
SHA2568b8cd2ff58d2c68ed9e0a1f7d02f46871d295a8229916acb6b1bfa1ff4600148
SHA512d6f054ceb8eb1ca88377b80054f33154e6c1214985cdc45f31292fb977be47b640f0c22e9221432e91e25148a61f59d0def2fb5029fa9d4c5a7863dae8f230dc
-
Filesize
1KB
MD570f8acf921f004784b21982bdfb5fb9b
SHA1a5fe82b54b1da9425c680e04ac9a0ea88ff4a225
SHA256497cdf0c2b83ff7b52d2b0e06985a0dd70746291f1c7fef1dd191e286a8f71f4
SHA51204c76d374ac49c6c6d72fd00c0bafe0bb50ab98f8e2e954f32c575720df623d1e1103954475e9a36a79de7820627ef5170d00ac1d768038e50ad1e4e80313084
-
Filesize
147KB
MD52c6ae8ac412a41c4fb20e6ef1367e438
SHA1a0fe5e206d35998c96cced0017fbfb780fa16c54
SHA2569eebcfb1754d912583c87ec40fcd3d07e5044a7906af627c4243204062412073
SHA512367abe9d2b8cce63fc665d8326f159e8ec16455d590d6c0e2b5618ad30a8159dd6f5a96b9f9391a257dc725b7a9264869d242ce691aa3ccdb4f3867f23b8457b
-
Filesize
129B
MD52629bee861410167f04cf382a4d06fdb
SHA131ad2c602891f239db3cf1d07f4c91cd58f6f5fd
SHA2562a4259ca42415a996c9133dd95f47add84737f2b4d380cc70a28170421f7d613
SHA5123f8d3f1d08b156c003cfdce9c3b1c67a966aae5a03753ddcf24de299b38274e1bb79345a5e547c58e908008175922a227906891e5f09da0f094df0f90a5545b9
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
147KB
MD55820e728cfad98d8673d29448c58c7d5
SHA1cfe71685fd09fd14d2d2faa8618b2559438a8b1e
SHA2565ccc9cb2e75c85b87f7244cca81c1acf6dfffe8f35a8c4d0ee00795872a9c9e7
SHA51228ce7d774bd528a83e18fadf74e2826ae99031909e0907c83278604ba72a299942436721443ead9820a7e6bbc1f07c2e325886d316ed529fd12946c20e6cb9d4