Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 01:19

General

  • Target

    LB3.exe

  • Size

    153KB

  • MD5

    639919c7f0efe99678341b74092e1dc5

  • SHA1

    71a0e9a07f9d27ce972e19a6f45c0bccf02982d6

  • SHA256

    6e3570fa586a231073216e887720b6ab5a33b68ccf3658869bd42fd6364eb2c0

  • SHA512

    d474efc41af7e35c7f6a5a63b88377d7e01e3d1f51b62040b6b6bdc9fd95dff21769836ecc0f6a8e69d2ef1d13b20635b4bc3da6d96d14e51de7352837f08019

  • SSDEEP

    3072:Q6glyuxE4GsUPnliByocWepGRB3xVP0476:Q6gDBGpvEByocWe+VP0476

Malware Config

Extracted

Path

C:\Wdpc0qLQS.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom Links for Tor Browser: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion Links for the normal browser http://lockbitapt.uz http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. You can obtain information about us on twitter https://twitter.com/hashtag/lockbit?f=live >>>> You need contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait for our answer because we attack many companies. Links for Tor Browser: http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion Link for the normal browser http://lockbitsupp.uz If you do not get an answer in the chat room for a long time, the site does not work and in any other emergency, you can contact us in jabber or tox. Tox ID LockBitSupp: 3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 XMPP (Jabber) Support: [email protected] [email protected] >>>> Your personal DECRYPTION ID: A7BDE813813543C0EFC22A2ECE63467D >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again! >>>> Advertisement Would you like to earn millions of dollars $$$ ? Our company acquire access to networks of various companies, as well as insider information that can help you steal the most valuable data of any company. You can provide us accounting data for the access to any company, for example, login and password to RDP, VPN, corporate email, etc. Open our letter at your email. Launch the provided virus on any computer in your company. You can do it both using your work computer or the computer of any other employee in order to divert suspicion of being in collusion with us. Companies pay us the foreclosure for the decryption of files and prevention of data leak. You can contact us using Tox messenger without registration and SMS https://tox.chat/download.html. Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, write in jabber or tox. Tox ID LockBitSupp: 3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 XMPP (Jabber) Support: [email protected] [email protected] If this contact is expired, and we do not respond you, look for the relevant contact data on our website via Tor or Brave browser Links for Tor Browser: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion Links for the normal browser http://lockbitapt.uz http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
URLs

http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion

http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion

http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion

http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion

http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion

http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion

http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion

http://lockbitapt.uz

http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly

http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly

http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly

http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly

http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly

http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly

http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly

http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly

https://twitter.com/hashtag/lockbit?f=live

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Lockbit family
  • Renames multiple (640) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LB3.exe
    "C:\Users\Admin\AppData\Local\Temp\LB3.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:2200
    • C:\ProgramData\DFA3.tmp
      "C:\ProgramData\DFA3.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\DFA3.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:764
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:4364
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{114CA57C-21EF-4DDC-B5A0-BFCBFBD85527}.xps" 133780943807200000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4792
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Wdpc0qLQS.README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\RRRRRRRRRRR

      Filesize

      129B

      MD5

      c06c1c76090c921959ab3372c988810a

      SHA1

      a77c05799a3ded65302f4ff71424928739c15ae9

      SHA256

      9caa2a246544aa0a4188a4bfd01474c2169a5829cbf40fb3ea07182a8fc52d22

      SHA512

      df644553d21f8d85bcc985a14e273f7d8197385b4859fc15a6c015b469ed9f3346174ceb5e83ba947369ec2b025b49a387222e9dfddc28cee78b3d445bc1f62f

    • C:\ProgramData\DFA3.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDD

      Filesize

      153KB

      MD5

      534679cca0450963a7a99635efcc23c4

      SHA1

      a6f4044ae22c3aa5aaf81c6c6c5bcee280de4cfb

      SHA256

      da373e41eb751d950528c2c6f8292bbf80cdea7ec1661bb03ee7ce76adecac47

      SHA512

      40db9181d6e0bfe612aac18d7aac83bbf1f0524cc56d79f0944a2e3d2b1c15e1e349822503e8f4ed9a7ca9a21503a1a569f18157954ac1a3805a6d5ecb073b11

    • C:\Users\Admin\AppData\Local\Temp\{06431A01-DB4A-47B3-8CEA-DB2B527267BE}

      Filesize

      4KB

      MD5

      d620b06767a27434ee3f46a1ed40730b

      SHA1

      1bc871bd1dc4ceca7648d66e35dd3a6bf1d0062f

      SHA256

      832f06b86cf10d60e161153b1d0f5b5f08dc96db2af9aad9735afbec64bfda6a

      SHA512

      32721b0cb4d6c836dd7ba22da88ec300713c764a876102fe10b1e4fead31a89e060478fd96c77e8c97db46d2df9e3b09ad2672872a1a24e4db37c60b4c120ec0

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      99a1f3106e551956e752aa688d5f1d68

      SHA1

      26f4ea0b560c481d28070c31218011bd02626580

      SHA256

      384b619ead67951b84fd1d783bb3ff2ea676d46d97b3df293a746dde72b5f86d

      SHA512

      305f811087f4a6dc9972c1c0d4a07015ac2cd449b34a474469610348d1c55a5e64d60aace8c9b5e6545a57d5e03541a4248bf663b5200c8c71ae4ece1646ffb4

    • C:\Wdpc0qLQS.README.txt

      Filesize

      6KB

      MD5

      3d6a723583dcfac62c75b8ccb723a067

      SHA1

      7d942b2eb2b20792748dc257a6cdd5c50ac58f88

      SHA256

      2a09d814da34fb08708ddf06f12427c16f3bae339da02a9b64bb78828e3ce777

      SHA512

      a2b0815d6ae6b8e186ffe66e83743730f3d1315108d867f67d193c4193b5f8bbd7f85448f55c2504acc367815d697876c9736b321716a0008603991d52e24bce

    • F:\$RECYCLE.BIN\S-1-5-21-493223053-2004649691-1575712786-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      325e993cd494209246a68a1494c44a7a

      SHA1

      30d32680ba533036d4f2063d8bb1f1a58d5bc0e2

      SHA256

      dc32c44e77862b36b368657269dc4fc2cd33c247c0b5f1ca54a2cbfff0331390

      SHA512

      68e252bfb42af597f0465152d5de0de276f583c999980058e1e3f7cd0abda35cfb1801f2bcc973394fdb297f3128dbe9a470a45363465395cdbda5358977dc7a

    • memory/1008-2978-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/1008-2979-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/1008-2-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/1008-1-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/1008-0-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/1008-2980-0x00000000028D0000-0x00000000028E0000-memory.dmp

      Filesize

      64KB

    • memory/4792-2995-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-2996-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3001-0x00007FF7FAA00000-0x00007FF7FAA10000-memory.dmp

      Filesize

      64KB

    • memory/4792-2993-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3030-0x00007FF7FAA00000-0x00007FF7FAA10000-memory.dmp

      Filesize

      64KB

    • memory/4792-2994-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-2992-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3070-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3071-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3068-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB

    • memory/4792-3069-0x00007FF7FCEF0000-0x00007FF7FCF00000-memory.dmp

      Filesize

      64KB