Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
Resource
win10v2004-20241007-en
General
-
Target
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
-
Size
590KB
-
MD5
d96d2bcf13d55740f3bb64d45d2db94d
-
SHA1
4ded4b1d4866a4adf534f5a4eb66386465fe3120
-
SHA256
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908
-
SHA512
cb1fbe8f36630915796d864c5a044177ea4ad881281ec454f932232fff99ce0524fb63becd96581a23cfe12bc455d55b613aaa389aa0a68fac97748400f473bd
-
SSDEEP
1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJh:QA
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/memory/2336-15-0x0000000010000000-0x0000000010022000-memory.dmp family_lockbit -
pid Process 2848 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2848 powershell.exe 2848 powershell.exe 2848 powershell.exe 2336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2336 2848 powershell.exe 31 PID 2848 wrote to memory of 2336 2848 powershell.exe 31 PID 2848 wrote to memory of 2336 2848 powershell.exe 31 PID 2848 wrote to memory of 2336 2848 powershell.exe 31 PID 2336 wrote to memory of 1920 2336 powershell.exe 33 PID 2336 wrote to memory of 1920 2336 powershell.exe 33 PID 2336 wrote to memory of 1920 2336 powershell.exe 33 PID 2336 wrote to memory of 1920 2336 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2336" "964"3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f84f42d7e24b6253965ec58fb6860c3
SHA1f15423cbda9ffa1f84c3ff545f09f08a5e7d361e
SHA256f8001f7148f986ba822d9e168ea5ba4e595a9cb952098f485154e1862de030fa
SHA512a9d012e547393b77a02475a2ebf40c93b32b91ef47b36e5d0b4b2816f99a1179b22d3dc7ae9ae45c8847e73ef8b727efce92d2e30b1288e082da6db0bc2f0ec8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G4A56BKC2APQZ8SVRIAY.temp
Filesize7KB
MD567bd64c6e82111a63d280cc893fa17f9
SHA11be1d1c88e066a4bf1e75039cc9d607f6bac67bb
SHA2564130e62d4b9a9d8ab3156e23f21cfd1ccd8d2c768a090ec671265fb5993167d9
SHA5125660038e763ff52961adaffea753167292cb334dd0366ff8e74a6638cb225c101b7e7a4e9dd7ab8bf09ae5748fbbbee718ed531a53804e05cf064c363bac6420