Analysis
-
max time kernel
16s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 21:56
Behavioral task
behavioral1
Sample
LB3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
LB3.exe
Resource
win10v2004-20240802-en
General
-
Target
LB3.exe
-
Size
153KB
-
MD5
713c0b2580a14c603a3e8304a0ace305
-
SHA1
9485e1ba5f152838c0b0625f8cfebad17a6aa48b
-
SHA256
55b2351ca0356b5071b67ad88becdf41f35b6f0624142db61ad6bc5ae71f9c27
-
SHA512
3916fa104ac27294c4070cb032014e8b94b887255267a3930020eb6cc6470e32cf82ef8b333798955c93adf605708aa7e729d6f9697acbe727a6437c355d6b3d
-
SSDEEP
3072:8qJogYkcSNm9V7DXCMTANJR3I6yD7T/bmvWnT:8q2kc4m9tDScg34p6
Malware Config
Extracted
C:\ZkY0iHrYy.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
https://tox.chat/download.html
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Deletes itself 1 IoCs
pid Process 2404 ED3C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2404 ED3C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2452 LB3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini LB3.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini LB3.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\ZkY0iHrYy.bmp" LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\ZkY0iHrYy.bmp" LB3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2404 ED3C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ED3C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LB3.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\Desktop\WallpaperStyle = "10" LB3.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\International LB3.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\Desktop LB3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ZkY0iHrYy LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ZkY0iHrYy\ = "ZkY0iHrYy" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZkY0iHrYy\DefaultIcon LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZkY0iHrYy LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZkY0iHrYy\DefaultIcon\ = "C:\\ProgramData\\ZkY0iHrYy.ico" LB3.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe 2452 LB3.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp 2404 ED3C.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeDebugPrivilege 2452 LB3.exe Token: 36 2452 LB3.exe Token: SeImpersonatePrivilege 2452 LB3.exe Token: SeIncBasePriorityPrivilege 2452 LB3.exe Token: SeIncreaseQuotaPrivilege 2452 LB3.exe Token: 33 2452 LB3.exe Token: SeManageVolumePrivilege 2452 LB3.exe Token: SeProfSingleProcessPrivilege 2452 LB3.exe Token: SeRestorePrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSystemProfilePrivilege 2452 LB3.exe Token: SeTakeOwnershipPrivilege 2452 LB3.exe Token: SeShutdownPrivilege 2452 LB3.exe Token: SeDebugPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeBackupPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe Token: SeSecurityPrivilege 2452 LB3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2404 2452 LB3.exe 34 PID 2452 wrote to memory of 2404 2452 LB3.exe 34 PID 2452 wrote to memory of 2404 2452 LB3.exe 34 PID 2452 wrote to memory of 2404 2452 LB3.exe 34 PID 2452 wrote to memory of 2404 2452 LB3.exe 34 PID 2404 wrote to memory of 2504 2404 ED3C.tmp 35 PID 2404 wrote to memory of 2504 2404 ED3C.tmp 35 PID 2404 wrote to memory of 2504 2404 ED3C.tmp 35 PID 2404 wrote to memory of 2504 2404 ED3C.tmp 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\LB3.exe"C:\Users\Admin\AppData\Local\Temp\LB3.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\ProgramData\ED3C.tmp"C:\ProgramData\ED3C.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\ED3C.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5acdceed86391eb8acca7e49c0b0e138a
SHA1a906e732f7bf5b2d0a004b6b19e33eee247ac919
SHA2560b8392a298484bd384a1abd0c105ce75dbb7e3f20c2ce4ffe3cd72d9d685ee82
SHA5127f04c407dd8a3f46fc6715a75f70c96f8ea3e7328d941a08f7e30daf29ca6e7a047e286a191dec7c9294675b782848e988a172494707c648c96af497c224c12a
-
Filesize
153KB
MD59ba936d95c85e622e2ddf25efc5122e3
SHA19b30dac24d6e3b34191af93a111261c78e2d0e2f
SHA256548d4e7ee43892457deb221b4482453655b77f0141e715a0cfcb31315159141e
SHA51285942c6961f440a40d4d10d473c594b4851be5eaeb31569a3b13c549ef59fcd1fc5c4cf4a9a4a33930036852b0f098bc69c765d5963e6b8663e892b0fdaf944a
-
Filesize
6KB
MD5f9366230690f4341bc9c9d958d042cc0
SHA19ae05629d0cee0b7e0d1a87e0ec812575c7cfe68
SHA25653e1aff3d9bdee7c6c0068f5553d88fca8f1399007fb47372717397d06d8f433
SHA51242af70bc2e1109633e259fc8a65650b1d8ff4d41456abcb39b4aba80c68d711192f2a21da3c9889fc71e7624692f0ddd3216c570ad8b67c48f09f180f11f8931
-
Filesize
129B
MD5d21b23c2919276a4010152c17c15c16d
SHA13fa926aeea11212dfec5f1703eebf2b83a13b0ca
SHA2560ffc4db9a456f2f668303a0a3c17314d88e7d0d0fe5b0b1c272f3ff2868c4d87
SHA51219a8d17f299bb24b8c1deb38bcdabccdc6ce874fc3b429704b3c4405407de3a11be471b6b7bfabbf9c8e00e351cf152d3857c0ddeccb46e5e655123b817e8292
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf