Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-11-2020 05:36
Static task
static1
Behavioral task
behavioral1
Sample
8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe
Resource
win10v20201028
General
-
Target
8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe
-
Size
576KB
-
MD5
f62e0d79f8f442903fd5f4f5e9bc47ee
-
SHA1
1f735d691e92301fe06447028f92949bf385301b
-
SHA256
8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0
-
SHA512
fb4dd2e38e8156b92757d48eabd037a505c96308eb924d5e44e3f84eef8922d4458c1badc269fa35e18da23c5886bb5fe89f30dc4559155d7da578a7e97a4a8d
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Modifies service 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1632 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\WallpaperStyle = "0" 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\TileWallpaper = "0" 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79738E61-1F28-11EB-9A79-FE442E565B8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f5f74e35b3d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "311319404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000095a7e50775ad5b470b6c41f58b272a8042c6b2ba0ca72fe5779498ed1071507a000000000e8000000002000020000000fff2a6de9f7a0dc2ce7c16a732a6f088a66169b03104cfd68030e5c1970ac51c20000000293637b2b6b5a4c0d3b726a068b450a482d7b6a99659235fe798afb92cff6291400000006a00809614affeeaaa2b2c262896eefcc0f8553e1c735ce77fa3d6417944d82132403441b2dcd081e771b96d0370e33c0a1e5b51d2709a5af26565486ee07796 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1368 vssvc.exe Token: SeRestorePrivilege 1368 vssvc.exe Token: SeAuditPrivilege 1368 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1172 iexplore.exe 1588 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 732 wrote to memory of 1632 732 taskeng.exe 32 PID 732 wrote to memory of 1632 732 taskeng.exe 32 PID 732 wrote to memory of 1632 732 taskeng.exe 32 PID 596 wrote to memory of 1172 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 35 PID 596 wrote to memory of 1172 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 35 PID 596 wrote to memory of 1172 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 35 PID 596 wrote to memory of 1172 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 35 PID 596 wrote to memory of 1996 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 38 PID 596 wrote to memory of 1996 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 38 PID 596 wrote to memory of 1996 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 38 PID 596 wrote to memory of 1996 596 8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe 38 PID 1172 wrote to memory of 1860 1172 iexplore.exe 40 PID 1172 wrote to memory of 1860 1172 iexplore.exe 40 PID 1172 wrote to memory of 1860 1172 iexplore.exe 40 PID 1172 wrote to memory of 1860 1172 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe"C:\Users\Admin\AppData\Local\Temp\8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe"1⤵
- Modifies service
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ykcol.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0.exe"2⤵
- Deletes itself
PID:1996
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
C:\Windows\system32\taskeng.exetaskeng.exe {7D63C0B4-2EE4-49C2-9224-99F58E76BB2E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:1632
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1588