Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-01-2025 13:05
Static task
static1
Behavioral task
behavioral1
Sample
69487c2f91495cfda293735fc01ac8d516b48359171e3b53581ccf3145bfb527.ps1
Resource
win10ltsc2021-20241211-en
General
-
Target
69487c2f91495cfda293735fc01ac8d516b48359171e3b53581ccf3145bfb527.ps1
-
Size
590KB
-
MD5
e0411fcbbff0e20922d224c3ac8c811e
-
SHA1
1083bc3407717b9953ffe27ec8ef3f0a520fbc82
-
SHA256
69487c2f91495cfda293735fc01ac8d516b48359171e3b53581ccf3145bfb527
-
SHA512
0555dbe49cc4ac2e432b85e847ac48113d74651f8c238329645b1bb07968d3418e92122b7750a3902793824a932647fe5c27c1c3e841a010a354d789c358eba3
-
SSDEEP
1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJt:cA
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/memory/1612-63-0x0000000010000000-0x0000000010022000-memory.dmp family_lockbit -
pid Process 3956 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4300 1612 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3956 powershell.exe 3956 powershell.exe 1612 powershell.exe 1612 powershell.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2360 taskmgr.exe Token: SeSystemProfilePrivilege 2360 taskmgr.exe Token: SeCreateGlobalPrivilege 2360 taskmgr.exe Token: 33 2360 taskmgr.exe Token: SeIncBasePriorityPrivilege 2360 taskmgr.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 1612 3956 powershell.exe 93 PID 3956 wrote to memory of 1612 3956 powershell.exe 93 PID 3956 wrote to memory of 1612 3956 powershell.exe 93
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\69487c2f91495cfda293735fc01ac8d516b48359171e3b53581ccf3145bfb527.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\69487c2f91495cfda293735fc01ac8d516b48359171e3b53581ccf3145bfb527.ps12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 22163⤵
- Program crash
PID:4300
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=3988,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=4124 /prefetch:81⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1612 -ip 16121⤵PID:4072
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD596d56144f605ad642d629b57df5f630b
SHA1bbab3a1bd0688448fab05ce63ef91493d741b889
SHA256584c0aab955b71ce14bb5bf00b12a2b6be84380e4546cf63c1ae57b7846a779a
SHA512d5f7b95770aa9c46269c35202eaff069b374415dc71fa02250c3a0cfd731e7be3eb9822b89ca6be422f6cd34016f3e25f2ec6a840480159911e669932f3ce3e2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82