Analysis Overview
SHA256
27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd
Threat Level: Known bad
The file 27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe was found to be: Known bad.
Malicious Activity Summary
Lockbit family
Brain Cipher
Braincipher family
Rule to detect Lockbit 3.0 ransomware Windows payload
Reads user/profile data of web browsers
Executes dropped EXE
Deletes itself
Checks computer location settings
Indicator Removal: File Deletion
Drops desktop.ini file(s)
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-04-21 06:45
Signatures
Lockbit family
Rule to detect Lockbit 3.0 ransomware Windows payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-04-21 06:45
Reported
2025-04-21 06:47
Platform
win10v2004-20250410-en
Max time kernel
103s
Max time network
143s
Command Line
Signatures
Brain Cipher
Braincipher family
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Control Panel\International\Geo\Nation | C:\ProgramData\8BB5.tmp | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
Reads user/profile data of web browsers
Drops desktop.ini file(s)
| Description | Indicator | Process | Target |
| File opened for modification | C:\$Recycle.Bin\S-1-5-21-3833542908-3750648139-3436651901-1000\desktop.ini | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
| File opened for modification | F:\$RECYCLE.BIN\S-1-5-21-3833542908-3750648139-3436651901-1000\desktop.ini | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
Indicator Removal: File Deletion
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\ProgramData\8BB5.tmp | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
| N/A | N/A | C:\ProgramData\8BB5.tmp | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3836 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\8BB5.tmp |
| PID 3836 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\8BB5.tmp |
| PID 3836 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\8BB5.tmp |
| PID 3836 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\8BB5.tmp |
| PID 2752 wrote to memory of 4948 | N/A | C:\ProgramData\8BB5.tmp | C:\Windows\SysWOW64\cmd.exe |
| PID 2752 wrote to memory of 4948 | N/A | C:\ProgramData\8BB5.tmp | C:\Windows\SysWOW64\cmd.exe |
| PID 2752 wrote to memory of 4948 | N/A | C:\ProgramData\8BB5.tmp | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe
"C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe"
C:\ProgramData\8BB5.tmp
"C:\ProgramData\8BB5.tmp"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\8BB5.tmp >> NUL
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| DE | 172.217.16.67:80 | c.pki.goog | tcp |
Files
memory/3836-0-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
memory/3836-1-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
memory/3836-2-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
C:\$Recycle.Bin\S-1-5-21-3833542908-3750648139-3436651901-1000\desktop.ini
| MD5 | 788c3e648ca16cdc4ca13f1fa9fe3559 |
| SHA1 | d3ebae159e8bc13872c0d72c3f73c71bc6dc8920 |
| SHA256 | e6e400ce100de5035de804af048a6ebe352a28156ddd7972830b2421959b6106 |
| SHA512 | d3aba090e8cdf9455c8006434f8d14df46bbcd0443c7cecdba59f2ced05811c7f4d7a7d15a299183d8d28b772c5793ad641b7394658cc38906750a37cc8e4089 |
C:\KUsfyVlDo.README.txt
| MD5 | 82046584dff98337c32ac7117e05387b |
| SHA1 | 61c5022e6a5f00b4b0164ecf090b0c863d7df84e |
| SHA256 | 9b90c3d076d429fdf9ea0606d6d19fee56b3202715157da0ac8ad88ef0b06399 |
| SHA512 | 59e49ede5ed8e9769b28d56d4d03f2f28f33088282d0070b834adb30c639c2d93c72ed222aff9f18d973a2f965858f93b895d6282062ee551c9ec04d5ba54ecf |
F:\$RECYCLE.BIN\S-1-5-21-3833542908-3750648139-3436651901-1000\DDDDDDDDDDD
| MD5 | 9e67ebf40ba7dfc7a611153f9b904c31 |
| SHA1 | 1884cfe86a7aa3a04053f02a5896bdb9101d3d24 |
| SHA256 | 8bc68162599830bbf8ebd4592b043d14b55f1f62a063042f7a791bf66388f355 |
| SHA512 | 3b60ef9ed00b67c20591786cc163e0f8729b6a4a8791953ef27e55cf10caac267a5c68ae90ca5bdf46ef0afe9af68f37d43439bccc33125c766ae3695f81af65 |
memory/3836-3418-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
memory/3836-3420-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
memory/3836-3419-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
C:\ProgramData\8BB5.tmp
| MD5 | 294e9f64cb1642dd89229fff0592856b |
| SHA1 | 97b148c27f3da29ba7b18d6aee8a0db9102f47c9 |
| SHA256 | 917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2 |
| SHA512 | b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf |
memory/2752-3425-0x0000000000401000-0x0000000000404000-memory.dmp
memory/2752-3426-0x0000000000400000-0x0000000000407000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
| MD5 | e1e6d38e6175bd39a5a5d0f2e39c7feb |
| SHA1 | 4c4696eff20062641b9161cde80b98ffa7f627b9 |
| SHA256 | e02a8e5cb26f445d0a7866d5f632a9dac02fa29cd7e8ad87ff491c6b0ae19e78 |
| SHA512 | dbafc144c39c89927917261edfd95d8f21b10dce6caccfd7e9a0080405f14a8483148ae1ecc2c835e6db3479e5e3575169df87f34926c76dfb37c1a4b1a986c8 |
Analysis: behavioral2
Detonation Overview
Submitted
2025-04-21 06:45
Reported
2025-04-21 06:47
Platform
win11-20250410-en
Max time kernel
103s
Max time network
104s
Command Line
Signatures
Brain Cipher
Braincipher family
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
Reads user/profile data of web browsers
Drops desktop.ini file(s)
| Description | Indicator | Process | Target |
| File opened for modification | C:\$Recycle.Bin\S-1-5-21-1492919288-2219487354-2015056034-1000\desktop.ini | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
| File opened for modification | F:\$RECYCLE.BIN\S-1-5-21-1492919288-2219487354-2015056034-1000\desktop.ini | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
Indicator Removal: File Deletion
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\ProgramData\74C2.tmp | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
| N/A | N/A | C:\ProgramData\74C2.tmp | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1180 wrote to memory of 5112 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\74C2.tmp |
| PID 1180 wrote to memory of 5112 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\74C2.tmp |
| PID 1180 wrote to memory of 5112 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\74C2.tmp |
| PID 1180 wrote to memory of 5112 | N/A | C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe | C:\ProgramData\74C2.tmp |
| PID 5112 wrote to memory of 4680 | N/A | C:\ProgramData\74C2.tmp | C:\Windows\SysWOW64\cmd.exe |
| PID 5112 wrote to memory of 4680 | N/A | C:\ProgramData\74C2.tmp | C:\Windows\SysWOW64\cmd.exe |
| PID 5112 wrote to memory of 4680 | N/A | C:\ProgramData\74C2.tmp | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe
"C:\Users\Admin\AppData\Local\Temp\27a3cc834c1cd00ad5378c373d76957998bb54bbcfe67bbf3ae5c7be5a5a66dd.exe"
C:\ProgramData\74C2.tmp
"C:\ProgramData\74C2.tmp"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\74C2.tmp >> NUL
Network
Files
memory/1180-0-0x0000000003410000-0x0000000003420000-memory.dmp
memory/1180-2-0x0000000003410000-0x0000000003420000-memory.dmp
memory/1180-1-0x0000000003410000-0x0000000003420000-memory.dmp
C:\$Recycle.Bin\S-1-5-21-1492919288-2219487354-2015056034-1000\IIIIIIIIIII
| MD5 | 71608e63322ec8b5a74a6bd3880fa3c9 |
| SHA1 | 0b00cc4b0d81bd3c2ccca0637ac2b26704560049 |
| SHA256 | 97e8538fdd81e7754321eb462682f966396794a2d139ce6010467bd62ea93626 |
| SHA512 | 27f5a1d7b2954cb41a413cda0d68933f57482d1460b2c14bc128b7f600964965dd18fc175f4eb0c6126190f328b47f1d9969a0d31bd2fb1fbd5f726cddf96173 |
C:\KUsfyVlDo.README.txt
| MD5 | 82046584dff98337c32ac7117e05387b |
| SHA1 | 61c5022e6a5f00b4b0164ecf090b0c863d7df84e |
| SHA256 | 9b90c3d076d429fdf9ea0606d6d19fee56b3202715157da0ac8ad88ef0b06399 |
| SHA512 | 59e49ede5ed8e9769b28d56d4d03f2f28f33088282d0070b834adb30c639c2d93c72ed222aff9f18d973a2f965858f93b895d6282062ee551c9ec04d5ba54ecf |
F:\$RECYCLE.BIN\S-1-5-21-1492919288-2219487354-2015056034-1000\DDDDDDDDDDD
| MD5 | ff3b657effb49dbc70067995023a71c0 |
| SHA1 | c605a7973bfd647f2e3bed9807317a7d091ae5c5 |
| SHA256 | b2b165d4b5946fb0b29656d53627677dfa279fb31a2e6a40ec3a4389f506fca9 |
| SHA512 | 5d1ee7ce5b0fdc5e90b73eed79ebdcd18182e5cf0c5f37de2ab14d79f44417a02a44ce8eb0c778b2e3fe99c2c31547e8d212bc2bcc30e274c1e69c533b0f9521 |
C:\ProgramData\74C2.tmp
| MD5 | 294e9f64cb1642dd89229fff0592856b |
| SHA1 | 97b148c27f3da29ba7b18d6aee8a0db9102f47c9 |
| SHA256 | 917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2 |
| SHA512 | b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf |
memory/1180-3498-0x0000000003410000-0x0000000003420000-memory.dmp
memory/5112-3499-0x000000007FE70000-0x000000007FE71000-memory.dmp
memory/1180-3503-0x0000000003410000-0x0000000003420000-memory.dmp
memory/5112-3502-0x000000007FDF0000-0x000000007FDF1000-memory.dmp
memory/5112-3501-0x000000007FE50000-0x000000007FE51000-memory.dmp
memory/5112-3500-0x00000000024B0000-0x00000000024C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
| MD5 | ce4b570255a46d7e4311dd20954ac96e |
| SHA1 | ce9301b32db6d79ba1fdeeb961c2dc4268d7e441 |
| SHA256 | e3661eed8ab72d43aa42d5a36c2c83e3e9bda5f55076565ca1d83d6499927432 |
| SHA512 | 6eb591c7398ae47232c200d59cc8059b7ff8a0ef53fcec0585347298f70800099bd5bdafc6636af6f7323c393ffc8162466e0cb3b002f5990aae5fcab79d92c1 |
memory/5112-3532-0x000000007FE10000-0x000000007FE11000-memory.dmp
memory/5112-3533-0x000000007FE30000-0x000000007FE31000-memory.dmp