General
-
Target
http://vxvault.net
-
Sample
240902-qa9cda1apn
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://vxvault.net
Resource
win11-20240802-en
windows11-21h2-x64
29 signatures
150 seconds
Malware Config
Targets
-
-
Target
http://vxvault.net
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Renames multiple (609) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1