Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-09-2024 12:29

General

  • Target

    166bba02413995aff28ffeb27d3bf3d5a5f6a6cd36893e252c7b9a22836f4980.exe

  • Size

    5.1MB

  • MD5

    be8bf725892ddd7a200d0a1906b9387f

  • SHA1

    582a24a72b29e70f2de26a8d217492c7a6b983ff

  • SHA256

    166bba02413995aff28ffeb27d3bf3d5a5f6a6cd36893e252c7b9a22836f4980

  • SHA512

    32d9d97692255e84cbd8c24794627bdfaa8ae41942bd449b678906f01d8b667d9d9785440f562132878987c682169b8ba9f9242a9f2abdf4b197d425ff1e7cb8

  • SSDEEP

    98304:MjHm6/Pi0bzB+Ot7nM3wnuZFm0qRttZYtToFbSO7VKoFbSO7VyoFbSO7VKoFbSO5:O5unMkMsMkM

Malware Config

Extracted

Path

C:\wlJ8FiR2h.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom DeathGrip Ransomware Attack | t.me/DeathGripRansomware This computer is attacked by russian ransomware community of professional black hat hackers. Your every single documents / details is now under observation of those hackers. If you want to get it back then you have to pay 1000$ for it. This Attack Is Done By Team RansomVerse You Can Find Us On Telegram @DeathGripRansomware Contact The Owner For The Decrypter Of This Ransomware #DeathGripMalware >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. You can obtain information about us on Telegram t.me/DeathGripRansomware >>>> You need contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait for our answer because we attack many companies. Links for Tor Browser: http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion Link for the normal browser http://lockbitsupp.uz >>>> Your personal DECRYPTION ID: B7568014A48684D6D525F3F3722638C4 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again! >>>> Advertisement Would you like to earn millions of dollars $$$ ? Our company acquire access to networks of various companies, as well as insider information that can help you steal the most valuable data of any company. You can provide us accounting data for the access to any company, for example, login and password to RDP, VPN, corporate email, etc. Open our letter at your email. Launch the provided virus on any computer in your company. You can do it both using your work computer or the computer of any other employee in order to divert suspicion of being in collusion with us. Companies pay us the foreclosure for the decryption of files and prevention of data leak. You can contact us using on Telegram messenger without registration and text t.me/DeathGripRansomware Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, write in jabber or tox. If this contact is expired, and we do not respond you, look for the relevant contact data on our website via Tor or Brave browser Links for Tor Browser: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
URLs

http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion

http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion

http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion

http://lockbitsupp.uz

http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion

http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion

http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion

http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion

http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion

http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion

http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
  • Renames multiple (580) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\166bba02413995aff28ffeb27d3bf3d5a5f6a6cd36893e252c7b9a22836f4980.exe
    "C:\Users\Admin\AppData\Local\Temp\166bba02413995aff28ffeb27d3bf3d5a5f6a6cd36893e252c7b9a22836f4980.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\ggc.exe
      "C:\Users\Admin\AppData\Local\Temp\ggc.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
        • Drops file in System32 directory
        PID:4228
      • C:\ProgramData\A48E.tmp
        "C:\ProgramData\A48E.tmp"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\A48E.tmp >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4688
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:1236
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{A0F88FCD-0B3C-47AF-B910-C79494ACA480}.xps" 133699265728490000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:1896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\YYYYYYYYYYY

      Filesize

      129B

      MD5

      ab75719564d4b187fbe08e2e6bfaa2d7

      SHA1

      b2e1ef37510e5d3d303050536d4751f6321984bb

      SHA256

      933912000eb6cb42e83df1379338e382aafbc20fefde58354bbb545a026e32b8

      SHA512

      2570d15d27fb015fe6a36e6a0c102d95650fee407d4fe8a66934f2b847043949a61be783f92f8c5d2e246c0d17f4794bd10e5b290aeb2f9ff20b168131eeff69

    • C:\ProgramData\A48E.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDD

      Filesize

      150KB

      MD5

      2d95f269bd72d003cb4d2747e4073e74

      SHA1

      a37577ed934406364d2520ba79b1fda687895c78

      SHA256

      c2b9ce15fba25e5a04ab1e1236ac96029d447b8c992c37a23713bceafc4e40c0

      SHA512

      a65a3f87fb30ae05bb72fdff8e1b6c4399064c13eaff6d2cc75eaa92a523bce16ad11b2e4e5d3be9bc9e90cf54817cbb59683e97569388a6b6278a5f73122fe9

    • C:\Users\Admin\AppData\Local\Temp\ggc.exe

      Filesize

      150KB

      MD5

      7e503c206e57f0295da017914a957d04

      SHA1

      96c375b9c57292db73c7ef2f2df16cf7be1604bb

      SHA256

      274844568a6a9ce334d71efeac21f528d7b54b2cd4377c978cc1270c6ad986c4

      SHA512

      cd4889ae107c54df854042e030eb431664d4db9d6dc908d1f1910ca49b89d247222f9d19440fcc2d9a120c95b56cd694750072ab9486eea961b8c33391344c1c

    • C:\Users\Admin\AppData\Local\Temp\{73F4B898-BD5A-4C63-A748-A9F74F9124C4}

      Filesize

      4KB

      MD5

      13a2c3f17e082292fead626cd1c3857a

      SHA1

      84d73c9ab15225112307a6f7e3ba193457d14295

      SHA256

      b0a2328548f487cf80d187cc2700878fda7171d47b4ad46bc9de2fdbe9e91c6b

      SHA512

      84a7ce359cd5acfa3aca2d160d983b5ddd1568faf4a07c488c796ec507919a7bf163c24a620963bffb5a4942483b2010cf3d1d56143286db1d3e3d4a6ffac5dd

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      84448a233b03345cf73cffc022eb17f9

      SHA1

      633f258e9e5a0a666ae239de4fb3562351bb6637

      SHA256

      a83c90638a880cad5b1f516341a68cf65241f4168e2ed1516452975114470f03

      SHA512

      1ae59758c1e6279128a9959acf0ddfcd6f9a4d8ec3ec36e544e106c3e1f77288b2e39a7ef4b4aaec571f913f2169670fdb1690ee95effb65d34f5c65d5f0c579

    • C:\wlJ8FiR2h.README.txt

      Filesize

      3KB

      MD5

      b9674de0868a93e9121bdb1d02d80130

      SHA1

      79d692fd03d3110a4358e2cc7442af9517489f3f

      SHA256

      9268d24e96639cf4c0e8d74f9769092b415015692ea528820faaded6fc5b052c

      SHA512

      b3264ad33eddedb2c18da883e2345247c762adc8a604991fce931cba06b86c361d23fa121e79d6c69948a2d5b9c1613139f401b971360d9d684abb5a61543c02

    • F:\$RECYCLE.BIN\S-1-5-21-2412658365-3084825385-3340777666-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      c8835a55ddda804ac13b6540013df83d

      SHA1

      4dc2ce1a30752eee015df63f37093c70d079414c

      SHA256

      d73d75f9ff580a767996bc6a17cd7aa26541429c245c4a3427720ca71d7e2ff3

      SHA512

      76cca835c276add77ad3bd8ef76dd5bd7bfa08b06a3600261f1083378a22746f258312fb9baa4168dc52ee14d165f3cedaa881cbafe86837977976f91dbb28b3

    • memory/1896-2790-0x00007FFA25D90000-0x00007FFA25DA0000-memory.dmp

      Filesize

      64KB

    • memory/1896-2786-0x00007FFA25D90000-0x00007FFA25DA0000-memory.dmp

      Filesize

      64KB

    • memory/1896-2821-0x00007FFA23960000-0x00007FFA23970000-memory.dmp

      Filesize

      64KB

    • memory/1896-2820-0x00007FFA23960000-0x00007FFA23970000-memory.dmp

      Filesize

      64KB

    • memory/1896-2788-0x00007FFA25D90000-0x00007FFA25DA0000-memory.dmp

      Filesize

      64KB

    • memory/1896-2789-0x00007FFA25D90000-0x00007FFA25DA0000-memory.dmp

      Filesize

      64KB

    • memory/1896-2787-0x00007FFA25D90000-0x00007FFA25DA0000-memory.dmp

      Filesize

      64KB

    • memory/1984-2768-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/1984-2769-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/1984-15-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/1984-2770-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/1984-16-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/1984-14-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/2704-2791-0x00007FF63EA40000-0x00007FF63EBE8000-memory.dmp

      Filesize

      1.7MB

    • memory/2704-2767-0x00007FF63EA40000-0x00007FF63EBE8000-memory.dmp

      Filesize

      1.7MB