Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe
-
Size
103KB
-
MD5
fe42ddb9cd6479e6a098c48b9fd9f76c
-
SHA1
f7f5d80050ee5fa9e4e81e114f6e6bf914a708a9
-
SHA256
61f45f2e68a69a8befc03c58cf7e752f9d1c220ea78b524508431e2afaaf2e6b
-
SHA512
fa9d0279ed995e34b6ee0b5a0c61edb9c2637a3a598c6165a6909e5d84d5861e0cc0453c39a0dd071c79999cbca49d8d069593f8ef435ec062aeab322619e43c
-
SSDEEP
3072:r6G5HOokBx3xrBx41z8QcHuneI8QBNj0xT8EsvkTdky:mGpr1z8QVBNjE8Q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 ktmutil.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN42797_32 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\NGEN42797_32\ = "Service" 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__e95f10c6297488a6\ktmutil.exe:Zone.Identifier 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktmutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2512 cmd.exe 1620 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__e95f10c6297488a6\ktmutil.exe:Zone.Identifier 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1620 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe 4840 ktmutil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2512 4068 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe 89 PID 4068 wrote to memory of 2512 4068 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe 89 PID 4068 wrote to memory of 2512 4068 2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe 89 PID 2512 wrote to memory of 1620 2512 cmd.exe 91 PID 2512 wrote to memory of 1620 2512 cmd.exe 91 PID 2512 wrote to memory of 1620 2512 cmd.exe 91 PID 2512 wrote to memory of 4700 2512 cmd.exe 92 PID 2512 wrote to memory of 4700 2512 cmd.exe 92 PID 2512 wrote to memory of 4700 2512 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe"1⤵
- Checks computer location settings
- Impair Defenses: Safe Mode Boot
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe" & del "C:\Users\Admin\AppData\Local\Temp\2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe" > NUL & exit2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1620
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\2024-10-31_fe42ddb9cd6479e6a098c48b9fd9f76c_lockbit.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\ProgramData\Microsoft\v2.0_2.0.0.0__e95f10c6297488a6\ktmutil.exeC:\ProgramData\Microsoft\v2.0_2.0.0.0__e95f10c6297488a6\ktmutil.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4840
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Safe Mode Boot
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5fe42ddb9cd6479e6a098c48b9fd9f76c
SHA1f7f5d80050ee5fa9e4e81e114f6e6bf914a708a9
SHA25661f45f2e68a69a8befc03c58cf7e752f9d1c220ea78b524508431e2afaaf2e6b
SHA512fa9d0279ed995e34b6ee0b5a0c61edb9c2637a3a598c6165a6909e5d84d5861e0cc0453c39a0dd071c79999cbca49d8d069593f8ef435ec062aeab322619e43c