Analysis

  • max time kernel
    60s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 19:01

General

  • Target

    7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1.exe

  • Size

    146KB

  • MD5

    23f8091893512fa2635817a2f51df391

  • SHA1

    9f7f2ba48752e37baadd4c35febaa58d613e3194

  • SHA256

    7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1

  • SHA512

    b4b9fc55bb944c8c657cf737ba0c8de17a09ec121591faac468b9c89182d45d910301f248d78134d78504de437a124208b6038a0047503f65e6cd1125490755c

  • SSDEEP

    1536:wzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDY4zGqaGKGcNY3XZ2Vsz1bl8HXo:PqJogYkcSNm9V7DLzxaGb522l83qtZT

Malware Config

Extracted

Path

C:\mqmQaLLxg.README.txt

Ransom Note
~~~ LockBit Black Ransomware Since 2024~~~ >>>> Your data are stolen and encrypted Price = 2000 $ Bitcoin = 328N9mKT6xFe6uTvtpxeKSymgWCbbTGbK2 Email = [email protected] Email = [email protected] >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. >>>> Your personal DECRYPTION ID: NEWWERTYFG34A48MK4D6D53 + Name.README.txt >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again!
Wallets

328N9mKT6xFe6uTvtpxeKSymgWCbbTGbK2

Signatures

  • Renames multiple (5363) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1.exe
    "C:\Users\Admin\AppData\Local\Temp\7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1980
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini

    Filesize

    129B

    MD5

    5bd58caaa41c0ebbb1f8ac599434e253

    SHA1

    73b85e03a514b6b7a0e966f871c316f1933854a0

    SHA256

    14283c780d034d62ae851315206db35601fd097503734b5043c977b5385455d3

    SHA512

    0d31ea7b689d85dae98c3e276434ee24d1c8fcc6492e8ba6786db7be48964c02290d03cdb31db14abccfaba7e183cc1cd63831dc5d7fcd21e208c146a7462a60

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\x86_microsoft-windows-l..-lpksetup.resources_31bf3856ad364e35_6.1.7601.17514_es-es_e73df841b378a01f.manifest.mqmQaLLxg

    Filesize

    2KB

    MD5

    8c3f57f6dab9c2ed7706b7fccabd672e

    SHA1

    4a58ababf974121a23c1ab854240ff200f7b37b8

    SHA256

    7c95038740831cf9b54c4286f7da0ed6b4df638f155f15911e8c90ecdb0c7f6b

    SHA512

    fd77768e3b242dcc62d58fbcad75a95c23353aeff97e9648e30abb2e64a56558da756f471aa5887d83314dac54aa8fcc0118ce67b2db045e0a09a75878ac53e5

  • C:\mqmQaLLxg.README.txt

    Filesize

    1KB

    MD5

    e660a65fcf9340820aff87745a4b9074

    SHA1

    161bfd683350ad551ce3a6652ba43bc4f447811b

    SHA256

    1a0ff740dcfbd23a131c794c9b43a8cf3578b361814e89987a8ca752c936cd93

    SHA512

    74f332c787ae1af6369c78c072c0dfc6b5148bd5f5b95ebb0c8d5f593925d083b0a28f2e54623d12599980473fb6d541ddd8b786d0f18fd9833ff71f2790a44e

  • F:\$RECYCLE.BIN\S-1-5-21-457978338-2990298471-2379561640-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    a516d8487f1207ef62900ccc8154d875

    SHA1

    274771ac04f66609a9a222437bbf144d19a6806c

    SHA256

    a767cee5d531eb12a9892615ea59ae5697348665b13fe17106d81ff61706d072

    SHA512

    9b13c02c42e6ab1f84d1880cf2259a6b1e58302a8beeecb7f6a4d2189b478e5014dcf3b9b4122949a62dd0f838eb7113562483216dd45dabae3e364410d6de13

  • memory/1980-0-0x00000000000E0000-0x0000000000120000-memory.dmp

    Filesize

    256KB