Malware Analysis Report

2025-03-15 08:29

Sample ID 250214-yxrd3sxpgl
Target LBLeak.zip
SHA256 744214bbe4ab445a2778cc66eb4a8a5b64673b245cfbf3500e14ed70f5906ef1
Tags
discovery lockbit blackmatter
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

744214bbe4ab445a2778cc66eb4a8a5b64673b245cfbf3500e14ed70f5906ef1

Threat Level: Known bad

The file LBLeak.zip was found to be: Known bad.

Malicious Activity Summary

discovery lockbit blackmatter

Blackmatter family

Lockbit family

Rule to detect Lockbit 3.0 ransomware Windows payload

Downloads MZ/PE file

System Location Discovery: System Language Discovery

System Network Configuration Discovery: Internet Connection Discovery

Unsigned PE

Suspicious behavior: CmdExeWriteProcessMemorySpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-14 20:10

Signatures

Blackmatter family

blackmatter

Lockbit family

lockbit

Rule to detect Lockbit 3.0 ransomware Windows payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral5

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win7-20241010-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe

"C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe"

Network

N/A

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win10v2004-20250211-en

Max time kernel

105s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe"

Signatures

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe

"C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe"

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODk0NzUzMjM5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 150.171.28.10:443 g.bing.com tcp
US 4.151.228.221:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
US 199.232.214.172:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp
GB 2.16.34.139:443 www.bing.com tcp
IT 91.80.49.85:80 tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win7-20241023-en

Max time kernel

122s

Max time network

123s

Command Line

cmd /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2324 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 2324 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 2324 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 2324 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 2324 wrote to memory of 2080 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2080 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2080 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2080 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2528 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2528 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2528 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2528 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 296 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 296 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 296 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 296 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2340 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2340 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2340 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2340 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 2324 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"

C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe

keygen -path C:\Users\Admin\AppData\Local\Temp\LBLeak\Build -pubkey pub.key -privkey priv.key

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3Decryptor.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_pass.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32.dll

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32_pass.dll

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_ReflectiveDll_DllMain.dll

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key

MD5 b78d511819541935dd6a9d45540d6d66
SHA1 83ff6bab74ad1e73327ce29a7c8fde616f3875f2
SHA256 1d0181760959517f2249dc2cdf2d205d9e62f59e28806e71cd9d3dcd69fead05
SHA512 7e91795ca587724e71f53a58e13a4d44aec860ad9ad9e198a6a62e6d89a76bd1cd907bba5e4d9b18fc45979fb14e934ad57c6bc4e0eefe41a706915716f0b37c

C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key

MD5 95f54d73b05a63a820436c7d2602b4bd
SHA1 644bc5ae3ebfb90654e4b6ad9247ef9afbec3b26
SHA256 d6cd23dd931aac44d75aff3408a2877930fe6f13ca61fb447ddc913e3ff45692
SHA512 1d77246768cad67c811720b9261725bab977eca7da0d0270a324adca2dcbaf2f06fe873ab705319369baeaa7bdfd76d1265ff43f69cf478a904e9b480a26f64a

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win10v2004-20250211-en

Max time kernel

149s

Max time network

150s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"

Signatures

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3704 wrote to memory of 2072 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 3704 wrote to memory of 2072 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 3704 wrote to memory of 2072 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe
PID 3704 wrote to memory of 3728 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 3728 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 3728 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 3808 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 3808 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 3808 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 1760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 1760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 1760 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 4988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 4988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 4988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2980 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2980 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe
PID 3704 wrote to memory of 2980 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LBLeak\Build.bat"

C:\Users\Admin\AppData\Local\Temp\LBLeak\keygen.exe

keygen -path C:\Users\Admin\AppData\Local\Temp\LBLeak\Build -pubkey pub.key -privkey priv.key

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3Decryptor.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_pass.exe

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32.dll

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_Rundll32_pass.dll

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

builder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\LB3_ReflectiveDll_DllMain.dll

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTQ4MDA0NzY4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
GB 2.16.34.130:443 www.bing.com tcp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
FR 95.100.133.91:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\priv.key

MD5 bd827bfa655257a2c0ab7b47d247820c
SHA1 2087ddfa99de1a201761f659b32f099571a9fb5e
SHA256 1c9de852cdf64a31cade461ec3699e131a6428436a4a5a68c724b3c858813199
SHA512 9dbc2a177f00239667376a1eac76be748407a1ab88c2b6433e9e6446dc36c4393cff94e559d0a78650d53c44ad147d905c16a90eb15add1ab074f3eecb0c9136

C:\Users\Admin\AppData\Local\Temp\LBLeak\Build\pub.key

MD5 30e0a253c6b1106a39b859817f9be138
SHA1 ed81c83a5cfdb0c74cdb3125dd2979884a3c0afc
SHA256 b62511a4cde8e84cee52c0c53d242651f42156689f4bc604b707b35f76d56baf
SHA512 15531f993d16a6ee7a0f36314a079068515106f6cf882cea5cafdaf7d21fbd41c11df83eaa39bd57c9f051d1bba85738fd16989f38447e343114d096751d00a0

Analysis: behavioral3

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win7-20240729-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

"C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe"

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2025-02-14 20:10

Reported

2025-02-14 20:12

Platform

win10v2004-20250207-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe"

Signatures

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe

"C:\Users\Admin\AppData\Local\Temp\LBLeak\builder.exe"

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7ODBFM0JEMjYtQzE4Mi00NURFLUFCQUUtNkFFM0NEN0IyRkQyfSIgdXNlcmlkPSJ7RTNBODg3RDYtNThFNi00NTFDLTgwRTUtMzQwRkUwODE5MjM0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MzIzMzJGN0YtNjY0MC00NEJBLTk0OTYtOTcwMUE2Q0VFNDJEfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODgwMjEzNjIxIi8-PC9hcHA-PC9yZXF1ZXN0Pg

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
GB 2.16.34.138:443 www.bing.com tcp
GB 2.16.34.138:443 www.bing.com tcp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 4.155.164.36:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
FR 95.100.133.91:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp

Files

N/A