Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 22:23

General

  • Target

    LBB_PS1.ps1

  • Size

    466KB

  • MD5

    17a7cd1ead2d35ed5d69c71d4fd7386d

  • SHA1

    734400d4444b88fe3848c80e3dba2ad9a5155c56

  • SHA256

    20dd91f589ea77b84c8ed0f67bce837d1f4d7688e56754e709d467db0bea03c9

  • SHA512

    7d5cd9b042229d1076a587b75594a002d379396d6ec889a8aee457a6a5a399130ae0a43fe0863adae23e32e46a7d17d4b55bfc2564cb17e579751161f6778828

  • SSDEEP

    1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJI:VA

Malware Config

Signatures

  • Renames multiple (146) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
      2⤵
      • Sets desktop wallpaper using registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\ProgramData\BC89.tmp
        "C:\ProgramData\BC89.tmp"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\BC89.tmp >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1020
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:4080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\BC89.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      ca6e5843fe0f30068ddef94b0b542eca

      SHA1

      1527177e5ccfe0041918840613af104d2ba8a1c8

      SHA256

      2655330566a9953364d9e13e939b3938e96a7b752d4f65f9586841b777ef137a

      SHA512

      3296343e54290ae3c86d7f2deac6fe3e98a0b63428132aea9ae9b1d17805c7cadea183245e7ae9ee2d785430565989f0cd27a49600e7d8c61db66d151450b0e9

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDD

      Filesize

      466KB

      MD5

      066172948f4c530fda2d01fe6e939426

      SHA1

      479457112e79920e80e6812c7c8d8c50cbaaea5b

      SHA256

      f0883de000ae2e09abb2c8f1a2525d5e0e06532739825d45591a5240f95932b8

      SHA512

      cbca767b7f79ce39893c25f418bf3d3d3787d2fa41b7d26275a2049887b07d1227f42d462967f4591ffb2eeb88cdac642f58529abaf7a12d05e9ad02713ef1a8

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yir1wxyk.cpv.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\kF0wnCN24.README.txt

      Filesize

      6KB

      MD5

      30aea123931a176e4a10f7835c82ddf2

      SHA1

      5b47fe9616a40c70b2c96f5599cdc7de716c7764

      SHA256

      7a4da77aecc6c82b498b546f94f0e609784ff1f8ded78db3be4125f442f8f679

      SHA512

      74117c92bd0a3948684c8cadafd07673d0f8a63d4dfe68f96d36807a871309171d2d5095096bc8bb07e15471e7162a279eb37ebe6c13a648c37ac72d3e4bdd5f

    • memory/996-56-0x0000000007780000-0x000000000778A000-memory.dmp

      Filesize

      40KB

    • memory/996-302-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-21-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-60-0x0000000007920000-0x0000000007934000-memory.dmp

      Filesize

      80KB

    • memory/996-24-0x0000000005D30000-0x0000000005D96000-memory.dmp

      Filesize

      408KB

    • memory/996-23-0x0000000005550000-0x00000000055B6000-memory.dmp

      Filesize

      408KB

    • memory/996-30-0x0000000005DA0000-0x00000000060F4000-memory.dmp

      Filesize

      3.3MB

    • memory/996-62-0x0000000007960000-0x0000000007968000-memory.dmp

      Filesize

      32KB

    • memory/996-36-0x0000000006360000-0x000000000637E000-memory.dmp

      Filesize

      120KB

    • memory/996-37-0x0000000006390000-0x00000000063DC000-memory.dmp

      Filesize

      304KB

    • memory/996-39-0x00000000068E0000-0x00000000068FA000-memory.dmp

      Filesize

      104KB

    • memory/996-38-0x0000000007B00000-0x000000000817A000-memory.dmp

      Filesize

      6.5MB

    • memory/996-42-0x00000000704D0000-0x000000007051C000-memory.dmp

      Filesize

      304KB

    • memory/996-41-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-40-0x0000000007400000-0x0000000007432000-memory.dmp

      Filesize

      200KB

    • memory/996-43-0x0000000070670000-0x00000000709C4000-memory.dmp

      Filesize

      3.3MB

    • memory/996-53-0x00000000073E0000-0x00000000073FE000-memory.dmp

      Filesize

      120KB

    • memory/996-61-0x0000000007A10000-0x0000000007A2A000-memory.dmp

      Filesize

      104KB

    • memory/996-55-0x0000000007680000-0x0000000007723000-memory.dmp

      Filesize

      652KB

    • memory/996-19-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-57-0x0000000007970000-0x0000000007A06000-memory.dmp

      Filesize

      600KB

    • memory/996-58-0x00000000078E0000-0x00000000078F1000-memory.dmp

      Filesize

      68KB

    • memory/996-22-0x00000000054B0000-0x00000000054D2000-memory.dmp

      Filesize

      136KB

    • memory/996-17-0x00000000746BE000-0x00000000746BF000-memory.dmp

      Filesize

      4KB

    • memory/996-54-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-59-0x0000000007910000-0x000000000791E000-memory.dmp

      Filesize

      56KB

    • memory/996-63-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-69-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-72-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-70-0x00000000746BE000-0x00000000746BF000-memory.dmp

      Filesize

      4KB

    • memory/996-82-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-77-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-96-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-20-0x00000000055D0000-0x0000000005BF8000-memory.dmp

      Filesize

      6.2MB

    • memory/996-320-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-305-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/996-310-0x00000000746B0000-0x0000000074E60000-memory.dmp

      Filesize

      7.7MB

    • memory/996-18-0x0000000002D90000-0x0000000002DC6000-memory.dmp

      Filesize

      216KB

    • memory/996-317-0x0000000009190000-0x00000000091B3000-memory.dmp

      Filesize

      140KB

    • memory/1728-10-0x000001415B3F0000-0x000001415B412000-memory.dmp

      Filesize

      136KB

    • memory/1728-13-0x00007FF98BBA0000-0x00007FF98C661000-memory.dmp

      Filesize

      10.8MB

    • memory/1728-11-0x00007FF98BBA0000-0x00007FF98C661000-memory.dmp

      Filesize

      10.8MB

    • memory/1728-12-0x00007FF98BBA0000-0x00007FF98C661000-memory.dmp

      Filesize

      10.8MB

    • memory/1728-0-0x00007FF98BBA3000-0x00007FF98BBA5000-memory.dmp

      Filesize

      8KB

    • memory/1728-16-0x00007FF98BBA0000-0x00007FF98C661000-memory.dmp

      Filesize

      10.8MB