Analysis

  • max time kernel
    127s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 06:36

General

  • Target

    2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe

  • Size

    32KB

  • MD5

    40a597576a9556281e438482cd727cd4

  • SHA1

    98451cbc7f40168c996650d2b61f489dc673cc1e

  • SHA256

    352b8017a3bd2a1890985f73e5f09c962576ea437ee7fb3a111921760661eec5

  • SHA512

    8f9cc45f9e833bbe429c428e01827fa3c7c8ba2a175dc5952cff64d90365d0342810d0bcac57664152cb6e805b845fd21eaee3a09082e4f3b78c6e604d1c1c7f

  • SSDEEP

    768:5F2jccRV0SOZ4Okd5uIuEnMAnHw7waN8BB5Ix4PC74801bK:/yV0SO2Okd5uQBrakBGx40480xK

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe"
    1⤵
    • Checks computer location settings
    • Subvert Trust Controls: Mark-of-the-Web Bypass
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe" & del "C:\Users\Admin\AppData\Local\Temp\2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe" > NUL & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 2 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2864
      • C:\Windows\SysWOW64\fsutil.exe
        fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-10-09_40a597576a9556281e438482cd727cd4_lockbit.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1500
  • C:\ProgramData\Microsoft\v2.0_2.0.0.0__49ce9ce34ec699a8\dxdiag.exe
    C:\ProgramData\Microsoft\v2.0_2.0.0.0__49ce9ce34ec699a8\dxdiag.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\v2.0_2.0.0.0__49ce9ce34ec699a8\dxdiag.exe

          Filesize

          59KB

          MD5

          13e6f8f17f61a51bb84ca92083da38c0

          SHA1

          5441eb3f38f52488e0d5233d1d2ad16b15698f50

          SHA256

          51f36a66da338180f4aedf0669ae25aa48083ee167f06bd7dd21d34ee5d7abda

          SHA512

          0e2c5a5571539fccf70664ce15a1e7e4b59d80efba87ba918422c17b451aa6cea26db4c6972771828157281e1c4e30187bae73ff8958a61d0229826117e4dcd8

        • C:\Users\Admin\AppData\Local\Temp\tmp9C9E.tmp

          Filesize

          32KB

          MD5

          40a597576a9556281e438482cd727cd4

          SHA1

          98451cbc7f40168c996650d2b61f489dc673cc1e

          SHA256

          352b8017a3bd2a1890985f73e5f09c962576ea437ee7fb3a111921760661eec5

          SHA512

          8f9cc45f9e833bbe429c428e01827fa3c7c8ba2a175dc5952cff64d90365d0342810d0bcac57664152cb6e805b845fd21eaee3a09082e4f3b78c6e604d1c1c7f