Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 22:23

General

  • Target

    FC8E43EC21BE9047/lbg64.exe

  • Size

    49KB

  • MD5

    8ff61e4156c10b085e0c2233f24e8501

  • SHA1

    69d50a8efd73c619aa36113ec04368db83d9b331

  • SHA256

    3552dda80bd6875c1ed1273ca7562c9ace3de2f757266dae70f60bf204089a4a

  • SHA512

    dbde74b89d498d708215ddfdc9a2a38cb27be931c9fe2d5965aba3c31482a0efbe39913ed17eabe5eae3b5efc9cb369589784e7d9ce5b2e89505c10406038249

  • SSDEEP

    768:9pZt6fz03gUYxTSGCoTrxTjA+xqCkEiAOPZAzEZoo6Czcit6OjeB6:jpQRNSGCo64OxAgZUCcicvB6

Malware Config

Signatures

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FC8E43EC21BE9047\lbg64.exe
    "C:\Users\Admin\AppData\Local\Temp\FC8E43EC21BE9047\lbg64.exe"
    1⤵
    • Deletes itself
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\Restore-My-Files.txt

    Filesize

    6KB

    MD5

    74a77bd81fa83b32b595eafa20c978ec

    SHA1

    5ce7e2079a61d012d4839a84eb7bb329651a2ead

    SHA256

    49cc31e84e5f3cf75de5d5f58f62ac6c43d9dca726dfc750593129b730a56616

    SHA512

    71accd7c7e1060a696718a4f11a7e04c2f6c16b05dfe4fa12e80878d703a403b7d33861b1315436f881fba37e1a0c3ae2aefc09499f5e7b04b2c582ba0e635e4

  • memory/1448-9-0x00007FFF66120000-0x00007FFF662C1000-memory.dmp

    Filesize

    1.6MB

  • memory/1448-10-0x00007FFF662D0000-0x00007FFF6633B000-memory.dmp

    Filesize

    428KB

  • memory/1448-3-0x00007FFF641A0000-0x00007FFF64469000-memory.dmp

    Filesize

    2.8MB

  • memory/1448-5-0x00007FFF63D60000-0x00007FFF63EB6000-memory.dmp

    Filesize

    1.3MB

  • memory/1448-4-0x00007FFF65210000-0x00007FFF652BC000-memory.dmp

    Filesize

    688KB

  • memory/1448-7-0x00007FFF64F90000-0x00007FFF6505D000-memory.dmp

    Filesize

    820KB

  • memory/1448-2-0x00007FFF65B50000-0x00007FFF65C0E000-memory.dmp

    Filesize

    760KB

  • memory/1448-0-0x00007FF65FD30000-0x00007FF65FE57000-memory.dmp

    Filesize

    1.2MB

  • memory/1448-6-0x00007FFF652C0000-0x00007FFF653EA000-memory.dmp

    Filesize

    1.2MB

  • memory/1448-8-0x00007FFF646C0000-0x00007FFF64DFF000-memory.dmp

    Filesize

    7.2MB

  • memory/1448-1-0x00007FFF66610000-0x00007FFF66805000-memory.dmp

    Filesize

    2.0MB

  • memory/1448-3881-0x00007FF65FD30000-0x00007FF65FE57000-memory.dmp

    Filesize

    1.2MB

  • memory/1448-4261-0x00007FF65FD30000-0x00007FF65FE57000-memory.dmp

    Filesize

    1.2MB

  • memory/1448-5467-0x00007FF65FD30000-0x00007FF65FE57000-memory.dmp

    Filesize

    1.2MB

  • memory/1448-6746-0x00007FF65FD30000-0x00007FF65FE57000-memory.dmp

    Filesize

    1.2MB