Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
-
Size
37KB
-
MD5
a6eca7beed59c67d7f5a7fc02cdeef64
-
SHA1
456a894f7bca1d0a8d886923dd340aa8192032ba
-
SHA256
0ba93d381f12b006b269579ccb56020258f60db32b7e4e868e4a4019aa2f3001
-
SHA512
64cdeaa8637672c5d6276f14d5b76410c0f5cd6aa94b9f8769818faa4b8ef01a9619bc2963b4c492ea65a096cf869c8041058273e8dcca8f6765fac614794eaf
-
SSDEEP
768:K0cr3xNg6Aut4bE0nvNS5ZHcWh+UNj07wbLwM6jHBB9D3xfjL2x4xC7g8Qcr6K:tWpAjHIHcO+UNS8GBx3xb6x4l8Qc+K
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 AdapterTroubleshooter.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN2432_32 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN2432_32\ = "Service" 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__9504240ffc886e88\AdapterTroubleshooter.exe:Zone.Identifier 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdapterTroubleshooter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 820 cmd.exe 2140 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__9504240ffc886e88\AdapterTroubleshooter.exe:Zone.Identifier 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe 2728 AdapterTroubleshooter.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2328 wrote to memory of 820 2328 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 32 PID 2328 wrote to memory of 820 2328 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 32 PID 2328 wrote to memory of 820 2328 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 32 PID 2328 wrote to memory of 820 2328 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 32 PID 820 wrote to memory of 2140 820 cmd.exe 34 PID 820 wrote to memory of 2140 820 cmd.exe 34 PID 820 wrote to memory of 2140 820 cmd.exe 34 PID 820 wrote to memory of 2140 820 cmd.exe 34 PID 820 wrote to memory of 2620 820 cmd.exe 35 PID 820 wrote to memory of 2620 820 cmd.exe 35 PID 820 wrote to memory of 2620 820 cmd.exe 35 PID 820 wrote to memory of 2620 820 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"1⤵
- Impair Defenses: Safe Mode Boot
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe" & del "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe" > NUL & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2140
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\ProgramData\Microsoft\v2.0_2.0.0.0__9504240ffc886e88\AdapterTroubleshooter.exeC:\ProgramData\Microsoft\v2.0_2.0.0.0__9504240ffc886e88\AdapterTroubleshooter.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Safe Mode Boot
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5a6eca7beed59c67d7f5a7fc02cdeef64
SHA1456a894f7bca1d0a8d886923dd340aa8192032ba
SHA2560ba93d381f12b006b269579ccb56020258f60db32b7e4e868e4a4019aa2f3001
SHA51264cdeaa8637672c5d6276f14d5b76410c0f5cd6aa94b9f8769818faa4b8ef01a9619bc2963b4c492ea65a096cf869c8041058273e8dcca8f6765fac614794eaf