Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe
-
Size
37KB
-
MD5
a6eca7beed59c67d7f5a7fc02cdeef64
-
SHA1
456a894f7bca1d0a8d886923dd340aa8192032ba
-
SHA256
0ba93d381f12b006b269579ccb56020258f60db32b7e4e868e4a4019aa2f3001
-
SHA512
64cdeaa8637672c5d6276f14d5b76410c0f5cd6aa94b9f8769818faa4b8ef01a9619bc2963b4c492ea65a096cf869c8041058273e8dcca8f6765fac614794eaf
-
SSDEEP
768:K0cr3xNg6Aut4bE0nvNS5ZHcWh+UNj07wbLwM6jHBB9D3xfjL2x4xC7g8Qcr6K:tWpAjHIHcO+UNS8GBx3xb6x4l8Qc+K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 autochk.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN45052_32 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN45052_32\ = "Service" 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__4aaddce65dc0b0cb\autochk.exe:Zone.Identifier 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autochk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3176 cmd.exe 1988 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__4aaddce65dc0b0cb\autochk.exe:Zone.Identifier 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe 4856 autochk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3176 2688 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 90 PID 2688 wrote to memory of 3176 2688 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 90 PID 2688 wrote to memory of 3176 2688 2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe 90 PID 3176 wrote to memory of 1988 3176 cmd.exe 92 PID 3176 wrote to memory of 1988 3176 cmd.exe 92 PID 3176 wrote to memory of 1988 3176 cmd.exe 92 PID 3176 wrote to memory of 116 3176 cmd.exe 93 PID 3176 wrote to memory of 116 3176 cmd.exe 93 PID 3176 wrote to memory of 116 3176 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"1⤵
- Checks computer location settings
- Impair Defenses: Safe Mode Boot
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe" & del "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe" > NUL & exit2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1988
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a6eca7beed59c67d7f5a7fc02cdeef64_lockbit.exe"3⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
-
C:\ProgramData\Microsoft\v2.0_2.0.0.0__4aaddce65dc0b0cb\autochk.exeC:\ProgramData\Microsoft\v2.0_2.0.0.0__4aaddce65dc0b0cb\autochk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4856
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Safe Mode Boot
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5a6eca7beed59c67d7f5a7fc02cdeef64
SHA1456a894f7bca1d0a8d886923dd340aa8192032ba
SHA2560ba93d381f12b006b269579ccb56020258f60db32b7e4e868e4a4019aa2f3001
SHA51264cdeaa8637672c5d6276f14d5b76410c0f5cd6aa94b9f8769818faa4b8ef01a9619bc2963b4c492ea65a096cf869c8041058273e8dcca8f6765fac614794eaf