Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 13:34
Static task
static1
Behavioral task
behavioral1
Sample
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
Resource
win10v2004-20241007-en
General
-
Target
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps1
-
Size
590KB
-
MD5
d96d2bcf13d55740f3bb64d45d2db94d
-
SHA1
4ded4b1d4866a4adf534f5a4eb66386465fe3120
-
SHA256
82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908
-
SHA512
cb1fbe8f36630915796d864c5a044177ea4ad881281ec454f932232fff99ce0524fb63becd96581a23cfe12bc455d55b613aaa389aa0a68fac97748400f473bd
-
SSDEEP
1536:Kk0H/lFq+N1mfoRlNyjZk11iBQcIY1Y+qFMJFOgvZ/wpKDcalOGODPNTbJYj6CJh:QA
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/memory/1868-14-0x0000000010000000-0x0000000010022000-memory.dmp family_lockbit -
pid Process 2108 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 powershell.exe 2108 powershell.exe 2108 powershell.exe 1868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1868 2108 powershell.exe 31 PID 2108 wrote to memory of 1868 2108 powershell.exe 31 PID 2108 wrote to memory of 1868 2108 powershell.exe 31 PID 2108 wrote to memory of 1868 2108 powershell.exe 31 PID 1868 wrote to memory of 2840 1868 powershell.exe 33 PID 1868 wrote to memory of 2840 1868 powershell.exe 33 PID 1868 wrote to memory of 2840 1868 powershell.exe 33 PID 1868 wrote to memory of 2840 1868 powershell.exe 33
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -nonI C:\Users\Admin\AppData\Local\Temp\82d89a75d80e80e4be42c9eb79e401558c9fa3175648cd0c0467f2de1a07a908.ps12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1868" "968"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e2be81a41ca66d3431f74b17dbfdd924
SHA1c5fe64d886baa9e0d39fbf375d423c6ae504f0f9
SHA256ad3a3652d8c5fe04215451868d6e57973e6286812260329aaaf97d8389a2e54e
SHA512b19f333b8e3fb019d4e8b2aed419d23341fe5ca537887cd8aac17ffcd7af7d2face7d8d9ca3fe0e1834e3de38417363e0e21e1c061717f9bb1f1511e68d7a948
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ALDQZGFK871SWN46IP12.temp
Filesize7KB
MD587e78719492968d9373042ba2a08232c
SHA142ace7c270c415c1c99560afc60d5c057d3efa0c
SHA256f83b6061120ee994a0c9635406bb976546af673ee3b40149c99d0bfe072d7c76
SHA5120167e65d066810842b64b698ea3916801631e98ea0f5c2421a51ce86fe13f636a8a884d1b29b11c576b2093bf213995b0d9a2f52354cbca7cab9e0d92fdefdd6