Analysis

  • max time kernel
    100s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 14:36

General

  • Target

    LBB_PS1.ps1

  • Size

    466KB

  • MD5

    17a7cd1ead2d35ed5d69c71d4fd7386d

  • SHA1

    734400d4444b88fe3848c80e3dba2ad9a5155c56

  • SHA256

    20dd91f589ea77b84c8ed0f67bce837d1f4d7688e56754e709d467db0bea03c9

  • SHA512

    7d5cd9b042229d1076a587b75594a002d379396d6ec889a8aee457a6a5a399130ae0a43fe0863adae23e32e46a7d17d4b55bfc2564cb17e579751161f6778828

  • SSDEEP

    1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJI:VA

Malware Config

Signatures

  • Renames multiple (172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\LBB_PS1.ps1
      2⤵
      • Sets desktop wallpaper using registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\ProgramData\E687.tmp
        "C:\ProgramData\E687.tmp"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\E687.tmp >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2480
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\E687.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      ca6e5843fe0f30068ddef94b0b542eca

      SHA1

      1527177e5ccfe0041918840613af104d2ba8a1c8

      SHA256

      2655330566a9953364d9e13e939b3938e96a7b752d4f65f9586841b777ef137a

      SHA512

      3296343e54290ae3c86d7f2deac6fe3e98a0b63428132aea9ae9b1d17805c7cadea183245e7ae9ee2d785430565989f0cd27a49600e7d8c61db66d151450b0e9

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDD

      Filesize

      466KB

      MD5

      c9154d1f956d5b9ac91cf57abe5d3825

      SHA1

      6fe707ba3bfbb9b1cf3a142aa92a9e7c47eb61b0

      SHA256

      16b14cd03b5b90a584d200b3c41f1a20cf91cfd94860c81ae8b90058ba1882ce

      SHA512

      a18e6834f056534e47327d58b03ddd75b3d02be935ad15d66b79743a778dd60a974e9ab49715dc611b8c68598ebf78b25395fc43296f1e48b48d21c00e2c1b8a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hnv5xuex.v2b.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\kF0wnCN24.README.txt

      Filesize

      6KB

      MD5

      e118a94b450f3ff42c46c239603a3d1f

      SHA1

      e7b4532ee2a4f299419066c4276cc29d8f04009d

      SHA256

      02b8dd3500554be91c930eb9499f8ce6f87817561202fed9bebb19d6975d95f0

      SHA512

      e96a3741c5e5c0968d13f0774c0dd503bc6e82738c6a61fc4a98a4a532a6f46cc6cb374bcd4ca349c7975d5c484f1a458e51b0249ef8556de3af4ec36c52c9f2

    • memory/2208-55-0x00000000072F0000-0x0000000007393000-memory.dmp

      Filesize

      652KB

    • memory/2208-22-0x0000000005730000-0x0000000005752000-memory.dmp

      Filesize

      136KB

    • memory/2208-16-0x000000007484E000-0x000000007484F000-memory.dmp

      Filesize

      4KB

    • memory/2208-349-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-346-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-21-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-59-0x0000000007560000-0x0000000007571000-memory.dmp

      Filesize

      68KB

    • memory/2208-23-0x00000000057F0000-0x0000000005856000-memory.dmp

      Filesize

      408KB

    • memory/2208-24-0x0000000005860000-0x00000000058C6000-memory.dmp

      Filesize

      408KB

    • memory/2208-31-0x0000000005990000-0x0000000005CE4000-memory.dmp

      Filesize

      3.3MB

    • memory/2208-17-0x00000000026C0000-0x00000000026F6000-memory.dmp

      Filesize

      216KB

    • memory/2208-60-0x00000000075A0000-0x00000000075AE000-memory.dmp

      Filesize

      56KB

    • memory/2208-37-0x0000000006000000-0x000000000604C000-memory.dmp

      Filesize

      304KB

    • memory/2208-38-0x0000000007770000-0x0000000007DEA000-memory.dmp

      Filesize

      6.5MB

    • memory/2208-39-0x0000000006540000-0x000000000655A000-memory.dmp

      Filesize

      104KB

    • memory/2208-41-0x0000000070660000-0x00000000706AC000-memory.dmp

      Filesize

      304KB

    • memory/2208-52-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-53-0x00000000070B0000-0x00000000070CE000-memory.dmp

      Filesize

      120KB

    • memory/2208-54-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-42-0x0000000070D80000-0x00000000710D4000-memory.dmp

      Filesize

      3.3MB

    • memory/2208-58-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-20-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-56-0x00000000073F0000-0x00000000073FA000-memory.dmp

      Filesize

      40KB

    • memory/2208-57-0x0000000007600000-0x0000000007696000-memory.dmp

      Filesize

      600KB

    • memory/2208-40-0x0000000007070000-0x00000000070A2000-memory.dmp

      Filesize

      200KB

    • memory/2208-339-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-36-0x0000000005FD0000-0x0000000005FEE000-memory.dmp

      Filesize

      120KB

    • memory/2208-61-0x00000000075B0000-0x00000000075C4000-memory.dmp

      Filesize

      80KB

    • memory/2208-62-0x00000000076A0000-0x00000000076BA000-memory.dmp

      Filesize

      104KB

    • memory/2208-63-0x00000000075F0000-0x00000000075F8000-memory.dmp

      Filesize

      32KB

    • memory/2208-64-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-70-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-71-0x000000007484E000-0x000000007484F000-memory.dmp

      Filesize

      4KB

    • memory/2208-74-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-73-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-79-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-85-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-98-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-19-0x00000000050C0000-0x00000000056E8000-memory.dmp

      Filesize

      6.2MB

    • memory/2208-332-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-335-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-333-0x0000000007740000-0x0000000007763000-memory.dmp

      Filesize

      140KB

    • memory/2208-338-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/2480-1-0x00000294D6B60000-0x00000294D6B82000-memory.dmp

      Filesize

      136KB

    • memory/2480-0-0x00007FFAAC253000-0x00007FFAAC255000-memory.dmp

      Filesize

      8KB

    • memory/2480-13-0x00007FFAAC250000-0x00007FFAACD11000-memory.dmp

      Filesize

      10.8MB

    • memory/2480-12-0x00007FFAAC250000-0x00007FFAACD11000-memory.dmp

      Filesize

      10.8MB

    • memory/2480-11-0x00007FFAAC250000-0x00007FFAACD11000-memory.dmp

      Filesize

      10.8MB

    • memory/2480-18-0x00007FFAAC250000-0x00007FFAACD11000-memory.dmp

      Filesize

      10.8MB