Analysis
-
max time kernel
16s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-09-2024 17:24
Behavioral task
behavioral1
Sample
LBLeak/Build.bat
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
LBLeak/builder.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
LBLeak/config.json
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LBLeak/keygen.exe
Resource
win11-20240802-en
General
-
Target
LBLeak/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1248 4608 cmd.exe 80 PID 4608 wrote to memory of 1248 4608 cmd.exe 80 PID 4608 wrote to memory of 1248 4608 cmd.exe 80 PID 4608 wrote to memory of 2960 4608 cmd.exe 81 PID 4608 wrote to memory of 2960 4608 cmd.exe 81 PID 4608 wrote to memory of 2960 4608 cmd.exe 81 PID 4608 wrote to memory of 3560 4608 cmd.exe 82 PID 4608 wrote to memory of 3560 4608 cmd.exe 82 PID 4608 wrote to memory of 3560 4608 cmd.exe 82 PID 4608 wrote to memory of 3460 4608 cmd.exe 83 PID 4608 wrote to memory of 3460 4608 cmd.exe 83 PID 4608 wrote to memory of 3460 4608 cmd.exe 83 PID 4608 wrote to memory of 4088 4608 cmd.exe 84 PID 4608 wrote to memory of 4088 4608 cmd.exe 84 PID 4608 wrote to memory of 4088 4608 cmd.exe 84 PID 4608 wrote to memory of 572 4608 cmd.exe 85 PID 4608 wrote to memory of 572 4608 cmd.exe 85 PID 4608 wrote to memory of 572 4608 cmd.exe 85 PID 4608 wrote to memory of 3596 4608 cmd.exe 86 PID 4608 wrote to memory of 3596 4608 cmd.exe 86 PID 4608 wrote to memory of 3596 4608 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\LBLeak\Build -pubkey pub.key -privkey priv.key2⤵
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3Decryptor.exe2⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3.exe2⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_pass.exe2⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32.dll2⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32_pass.dll2⤵
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_ReflectiveDll_DllMain.dll2⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5876bb78260ef7e75c35388028e6564f2
SHA114c3b2f58d7b2a1378be121bce78e9f2f92920ff
SHA2568d0a68814d8c4ed4ba485dc3295396f8e33414d3da5ab33062c6329bb0d6f5ba
SHA512ca17bad96c4fa52b110de5429df4f786696fc94b11df17a29e2bf1033e4a64ce16790e2b3077b850e1e91f9b5a2a80d2081c67b579adce885b15d93eb6f1f934
-
Filesize
344B
MD5cfdae327b3c974e5f5cacb1a2ee40b4c
SHA191f2a8e8c0003e59d976fc856b9bb59674ddcdef
SHA2568f8defc48f875a6e34f60ce2f84ec4b390f9673331f71f211702a5cc21ed87f9
SHA5122e4378eed9eeaab115e4898d9169b50f49514773bffeb309b8ff7f0ca03b4c3f6084d25ccc40ede44199edb3679d3669a8ae927ebdf0fa1de004794123290a3b