Analysis

  • max time kernel
    38s
  • max time network
    38s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20-12-2024 00:56

General

  • Target

    LBB_PS1.ps1

  • Size

    466KB

  • MD5

    17a7cd1ead2d35ed5d69c71d4fd7386d

  • SHA1

    734400d4444b88fe3848c80e3dba2ad9a5155c56

  • SHA256

    20dd91f589ea77b84c8ed0f67bce837d1f4d7688e56754e709d467db0bea03c9

  • SHA512

    7d5cd9b042229d1076a587b75594a002d379396d6ec889a8aee457a6a5a399130ae0a43fe0863adae23e32e46a7d17d4b55bfc2564cb17e579751161f6778828

  • SSDEEP

    1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJI:VA

Malware Config

Signatures

  • Renames multiple (184) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
      2⤵
      • Sets desktop wallpaper using registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\ProgramData\9887.tmp
        "C:\ProgramData\9887.tmp"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: RenamesItself
        PID:4312
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:3060
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\kF0wnCN24.README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:2348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\9887.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      ab3bde1d495878b0d54bbf552fbd3b0d

      SHA1

      695293de04b1f84f2c29ae536dcf28d49b751425

      SHA256

      7deba83538bbb06cddd80ffcd9d42960a8690f0ec54fe625e0757c0803ccbb08

      SHA512

      2f5f5491ef90a97950e0471c862fe47c08472ada828bcfd1dc9b40c063de3ad3171158bbe792e4bed553dd7188964750125da764e2c87581e48179eb1f8ead99

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDD

      Filesize

      466KB

      MD5

      3b699ed7c822d70afcb98c3e654aec90

      SHA1

      2ec85ef8256c4a63071f621befd9028e8bbc16e6

      SHA256

      1532756962e30b88ac254ea838ae7f62e1e639ef3d5173dd24cfa68bbb118256

      SHA512

      11f264f89de466448435667f6e391054d1f38e4d7599ac1d396f49004b48fe7b489394aac7531d8eb7d4bd9a7351c0b41807426138a5b7257b5acc49cbfa1ba3

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4qvgc2sd.uen.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • F:\kF0wnCN24.README.txt

      Filesize

      6KB

      MD5

      b97a8c710973a9b18377f57a327f9d15

      SHA1

      affbe47fc2fc9a1eb2bf23da373ca2699505f5a7

      SHA256

      905247c03be9ba4199024e02f2df31c8b318d12a045bb5a9942bcf392d7a82be

      SHA512

      5873149b2c261fb16de49c523bcfbe3e919bee65f717b657cbde658c07933f737c0f4f29739a2909577c7071561add3b9f19256b1a3eb7f8a4e7b74fdad3df08

    • memory/64-0-0x00007FFC40463000-0x00007FFC40465000-memory.dmp

      Filesize

      8KB

    • memory/64-1-0x00007FFC40460000-0x00007FFC40F22000-memory.dmp

      Filesize

      10.8MB

    • memory/64-12-0x00007FFC40460000-0x00007FFC40F22000-memory.dmp

      Filesize

      10.8MB

    • memory/64-11-0x000001D7B8990000-0x000001D7B89B2000-memory.dmp

      Filesize

      136KB

    • memory/64-13-0x00007FFC40460000-0x00007FFC40F22000-memory.dmp

      Filesize

      10.8MB

    • memory/64-16-0x00007FFC40460000-0x00007FFC40F22000-memory.dmp

      Filesize

      10.8MB

    • memory/2580-42-0x00000000713C0000-0x000000007140C000-memory.dmp

      Filesize

      304KB

    • memory/2580-57-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-19-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-20-0x0000000005010000-0x00000000056DA000-memory.dmp

      Filesize

      6.8MB

    • memory/2580-21-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-22-0x00000000057A0000-0x00000000057C2000-memory.dmp

      Filesize

      136KB

    • memory/2580-28-0x0000000005840000-0x00000000058A6000-memory.dmp

      Filesize

      408KB

    • memory/2580-29-0x0000000005920000-0x0000000005986000-memory.dmp

      Filesize

      408KB

    • memory/2580-34-0x0000000005AD0000-0x0000000005E27000-memory.dmp

      Filesize

      3.3MB

    • memory/2580-36-0x0000000005EF0000-0x0000000005F0E000-memory.dmp

      Filesize

      120KB

    • memory/2580-37-0x0000000005F40000-0x0000000005F8C000-memory.dmp

      Filesize

      304KB

    • memory/2580-38-0x0000000007740000-0x0000000007DBA000-memory.dmp

      Filesize

      6.5MB

    • memory/2580-39-0x00000000064B0000-0x00000000064CA000-memory.dmp

      Filesize

      104KB

    • memory/2580-41-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-40-0x00000000071E0000-0x0000000007212000-memory.dmp

      Filesize

      200KB

    • memory/2580-17-0x00000000751EE000-0x00000000751EF000-memory.dmp

      Filesize

      4KB

    • memory/2580-53-0x0000000007220000-0x000000000723E000-memory.dmp

      Filesize

      120KB

    • memory/2580-43-0x0000000071520000-0x0000000071877000-memory.dmp

      Filesize

      3.3MB

    • memory/2580-54-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-55-0x0000000007250000-0x00000000072F3000-memory.dmp

      Filesize

      652KB

    • memory/2580-56-0x0000000007350000-0x000000000735A000-memory.dmp

      Filesize

      40KB

    • memory/2580-18-0x0000000004900000-0x0000000004936000-memory.dmp

      Filesize

      216KB

    • memory/2580-58-0x0000000007550000-0x00000000075E6000-memory.dmp

      Filesize

      600KB

    • memory/2580-59-0x00000000074B0000-0x00000000074C1000-memory.dmp

      Filesize

      68KB

    • memory/2580-60-0x00000000074E0000-0x00000000074EE000-memory.dmp

      Filesize

      56KB

    • memory/2580-61-0x00000000074F0000-0x0000000007504000-memory.dmp

      Filesize

      80KB

    • memory/2580-62-0x0000000007530000-0x000000000754A000-memory.dmp

      Filesize

      104KB

    • memory/2580-63-0x0000000007520000-0x0000000007528000-memory.dmp

      Filesize

      32KB

    • memory/2580-64-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-70-0x00000000751EE000-0x00000000751EF000-memory.dmp

      Filesize

      4KB

    • memory/2580-71-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-72-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-73-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-75-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-85-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-80-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-99-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-321-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-325-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-320-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-326-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-333-0x0000000007650000-0x0000000007673000-memory.dmp

      Filesize

      140KB

    • memory/2580-336-0x00000000751E0000-0x0000000075991000-memory.dmp

      Filesize

      7.7MB