Analysis
-
max time kernel
571s -
max time network
362s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
16-10-2021 15:18
Static task
static1
Behavioral task
behavioral1
Sample
lockit.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
lockit.exe
Resource
win10-en-20211014
General
-
Target
lockit.exe
-
Size
372KB
-
MD5
e3b3e285390c0e2f7d04bd040bec790d
-
SHA1
dbee71535e9f1fb23b3f01e25989d22d51237e68
-
SHA256
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6
-
SHA512
6156a6b0ff4f41c823cba68a4596676e357ceb5b8c0848c2828a72321dbc2a731d9ae8f1a417fe27aef7de0080001ad3f77b3809b64a93c610ae99f95b35f5be
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
lockit.exedescription ioc process File opened for modification \??\c:\Users\Admin\Pictures\AddGroup.tiff lockit.exe File opened for modification \??\c:\Users\Admin\Pictures\BlockSync.tiff lockit.exe File opened for modification \??\c:\Users\Admin\Pictures\RestoreRevoke.tiff lockit.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1828 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
lockit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" lockit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
lockit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\TileWallpaper = "0" lockit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\WallpaperStyle = "0" lockit.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f45a3407a6eee4cb6062dddd85478a600000000020000000000106600000001000020000000b5bb12edbad24e9301bc02b9a87e7d15c72577bdec7cbaca460f5cd6e1c11772000000000e800000000200002000000038692b7a0699e195ff3466fbd4ff86e6d3f78dad30b9da8ba98f94d5ab6f448620000000af884abc8d00210aeebc166a14510ae7a6bb92ea1b112bd6596c4890d809222e40000000412549c20c045670598c292aa56d95a466734995b1a27e8cb2ab26e9f29e06648995af01ac3184af470a027fbdc178f0bab8b1c0136672cc45af1bd2c4919a09 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dacb33a1c2d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341162510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E50E4C1-2E94-11EC-B2E0-EE548F012901} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
lockit.exepid process 1232 lockit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid process 1200 iexplore.exe 1092 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1200 iexplore.exe 1200 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
lockit.exeiexplore.exedescription pid process target process PID 1232 wrote to memory of 1200 1232 lockit.exe iexplore.exe PID 1232 wrote to memory of 1200 1232 lockit.exe iexplore.exe PID 1232 wrote to memory of 1200 1232 lockit.exe iexplore.exe PID 1232 wrote to memory of 1200 1232 lockit.exe iexplore.exe PID 1232 wrote to memory of 1828 1232 lockit.exe cmd.exe PID 1232 wrote to memory of 1828 1232 lockit.exe cmd.exe PID 1232 wrote to memory of 1828 1232 lockit.exe cmd.exe PID 1232 wrote to memory of 1828 1232 lockit.exe cmd.exe PID 1200 wrote to memory of 2012 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2012 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2012 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2012 1200 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\lockit.exe"C:\Users\Admin\AppData\Local\Temp\lockit.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\lockit.exe"2⤵
- Deletes itself
PID:1828
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
67aef63b6d2e96e46870ae1be360b9f8
SHA186a79775ae2443cb35f5f0cf032bd093e16386d7
SHA256f3da92a2cfa31f97fe062d917b93c91af3e4febc4fe4ef702fb4a4da857f61c5
SHA512bd34bb914b6462ad75a144cdaad7b75c5fd228a2fe36d2d348f988e9f655b272d2859aa935d3e2d341a646bc251970c9b560b430164878273f7eea2352c6c2d0
-
MD5
405b97b9d7ad474a0876b38b3407b314
SHA116bf8ff015acefab81c909cc85b685ee8440b1c4
SHA256dfec3ffd264a0a3d170a1b242908466e68998d93a5d47a0e7f758d59a0176582
SHA512be74c9d2de18c8236b041f7e32a3e9b56e2ffa30c85d725925724c5241c374ac9610f7490c68d0ed67a12d0ee31546a5ff503fb4799cf73779ae8f2d54cee34f
-
MD5
448fc0b2b33a8db81ebda303b547ad40
SHA1f6a76f14b0badcef3346c73bcdacf4f8b191ef0e
SHA256af1e88e66db49e1332c8e3806a448f2a26be86235dd4cb9917cac800d54df5ea
SHA512ad09b0268204a7b421b4a64371b89e2282a73df30236aaeb234474299568603c54d73e4387896302877066678810a5311db6a13d830f7b7f4a08c0a61a93c139