Analysis

  • max time kernel
    6s
  • max time network
    16s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    24-10-2024 09:20

Errors

Reason
Machine shutdown

General

  • Target

    Ransom.Win32.LCrypt0rX.A/LCrypt0rX with shutdown.vbs

  • Size

    19KB

  • MD5

    8aa664ce58b37ea055c57137b311de72

  • SHA1

    24296c2aa2aa9529db935e39b982c4d60d626ac7

  • SHA256

    560b7919733ca8a891743eae7080224114aa1d376f9f11c734c86cc119e8ac9f

  • SHA512

    132f8358848a23d046e5ad042eec110fbfb2f9baa296c92529be6fe9325ae53661c61cb0555feb4aade4f953bac20db671fafed1bd214f05a6076aca8e258ba5

  • SSDEEP

    384:tDqbplStxYHQHSH7l+iijqF2ZNvz1wj9byX+Ek8:lkMK2N+ED

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 3 IoCs
  • Blocks application from running via registry modification 3 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.LCrypt0rX.A\LCrypt0rX with shutdown.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.LCrypt0rX.A\LCrypt0rX with shutdown.vbs" /elevated
      2⤵
      • UAC bypass
      • Blocklisted process makes network request
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4924
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4736
      • C:\Windows\System32\notepad.exe
        "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\READMEPLEASE.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:3636
      • C:\Windows\System32\RUNDLL32.EXE
        "C:\Windows\System32\RUNDLL32.EXE" user32.dll,UpdatePerUserSystemParameters
        3⤵
          PID:692
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\iamthedoom.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3588
          • C:\Windows\system32\mspaint.exe
            mspaint
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:5068
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://languishcharmingwidely.com/22/f4/31/22f431404146fb2f892b30f7d213aea4.js
            4⤵
              PID:4064
          • C:\Windows\System32\wscript.exe
            "C:\Windows\System32\wscript.exe" C:\Windows\System32\haha.vbs
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:2136
            • C:\Windows\System32\wscript.exe
              "C:\Windows\System32\wscript.exe" C:\Windows\System32\haha.vbs
              4⤵
                PID:4928
                • C:\Windows\System32\wscript.exe
                  "C:\Windows\System32\wscript.exe" C:\Windows\System32\haha.vbs
                  5⤵
                    PID:2064
                    • C:\Windows\System32\wscript.exe
                      "C:\Windows\System32\wscript.exe" C:\Windows\System32\haha.vbs
                      6⤵
                        PID:1080
                        • C:\Windows\System32\wscript.exe
                          "C:\Windows\System32\wscript.exe" C:\Windows\System32\haha.vbs
                          7⤵
                            PID:4580
                  • C:\Windows\System32\wscript.exe
                    "C:\Windows\System32\wscript.exe" C:\Windows\System32\wins32bugfix.vbs
                    3⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:4504
                    • C:\Windows\System32\taskkill.exe
                      "C:\Windows\System32\taskkill.exe" /IM powershell.exe /F
                      4⤵
                      • Kills process with taskkill
                      PID:4704
                    • C:\Windows\System32\taskkill.exe
                      "C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F
                      4⤵
                      • Kills process with taskkill
                      PID:1912
                  • C:\Windows\System32\taskkill.exe
                    "C:\Windows\System32\taskkill.exe" /F /IM explorer.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1060
                  • C:\Windows\System32\shutdown.exe
                    "C:\Windows\System32\shutdown.exe" /r /t 0
                    3⤵
                      PID:324
                • C:\Windows\system32\vssvc.exe
                  C:\Windows\system32\vssvc.exe
                  1⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4248
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                  1⤵
                    PID:540
                  • C:\Windows\system32\LogonUI.exe
                    "LogonUI.exe" /flags:0x4 /state0:0xa3a16855 /state1:0x41c64e6d
                    1⤵
                      PID:4420

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\Desktop\READMEPLEASE.txt

                      Filesize

                      95B

                      MD5

                      316cdf8bc3bae069158a2b5ce6e6584b

                      SHA1

                      1fb87b0babb134777c858a5a0ca2b61257be7b88

                      SHA256

                      5185b861b4c7d2c74ec334178a1f9eb6bae84bfaefc11ef9f1aa88ca1d1ef211

                      SHA512

                      48e69c5958b7dce18dbcf0330aae01be09b8db685d5e080e24d88a4ae91f8cede980b19522b81d5a7c82cd70dd51a60c3d971d5775c7ef8fd5cefccd65520080

                    • C:\Windows\System32\haha.vbs

                      Filesize

                      1KB

                      MD5

                      1bacacc2b6eb59865eaae4d690f6838d

                      SHA1

                      0c5847b096a01ab305296c20e805f2069c8d7c42

                      SHA256

                      b74b36c91ef1850828d0f33fbf0981f74c30e4e989bcbd4e62fc1357334f81da

                      SHA512

                      c611b6540b2e48283cbf4a8732d957ec700b94f3c78464980d34d09ff26d0c1147689d618d469e1f3051edc2b8436d08bf95e3622ffa0493a6e9ff6ee1c14728

                    • C:\Windows\System32\iamthedoom.bat

                      Filesize

                      431B

                      MD5

                      7f577772568e8e2166472cfc8576f2a5

                      SHA1

                      19f00b639e0456bc990c2506d4e9d516f57a56c3

                      SHA256

                      de6bdd7e830e1df26ded7aee443e494869390dd08f2f14de277c4eb56699f640

                      SHA512

                      31f06800905fa4031d00c28a003059afa385dcaa4cff606a7805cbada80fdae2ad5518f5939d9a31c9a51dd9a0ea0af1cdb0b9e292d324023dcfbf227d7e47a9

                    • C:\Windows\System32\wins32bugfix.vbs

                      Filesize

                      496B

                      MD5

                      e2d836beba8f0d92022fc8c07d42f684

                      SHA1

                      ca8904c7281ff138afbbb2690862a54ebdbd53e7

                      SHA256

                      2581cbeb3f35d83a6f90ed208a1f3ac8e59efbbeafbaab11c9d2b66c2333e1a3

                      SHA512

                      ead612bde359a4d0d7b305f8aeaee4d46595c8cbfbfecd0ff76c7dbc1b0156e2a6d5df76787c2c07134df1d4d0122f2b61a51b3287c026ec1e202228f0248ad7