Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
17-11-2021 11:53
Static task
static1
Behavioral task
behavioral1
Sample
20161205_9ce2d7bf1b9cf61897a960de3e0481d0.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
20161205_9ce2d7bf1b9cf61897a960de3e0481d0.js
Resource
win10-en-20211014
General
-
Target
20161205_9ce2d7bf1b9cf61897a960de3e0481d0.js
-
Size
13KB
-
MD5
558d1d1e23ddd0847e8a5f2d5ed4f930
-
SHA1
9c59224dff0787058da1a8b2c1c6182a1a6dd9d5
-
SHA256
fad379ba7f9d1b7e2d8efd4f92e622e386e56e4a05499d4a0c80e05072a5d355
-
SHA512
ad98ec378d4ae717dc93e94fbc672907345e78e85e1d1a0fa3677a517362a6e61ba1322c0a35743ab93d00e4a7968ef603c854e721365a62e9f08b8ad3fc1beb
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 7 IoCs
flow pid Process 6 1680 wscript.exe 8 1680 wscript.exe 9 1888 rundll32.exe 12 1888 rundll32.exe 13 1888 rundll32.exe 14 1888 rundll32.exe 15 1888 rundll32.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\CheckpointShow.tiff rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\RestartSubmit.tiff rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1888 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1940 1680 wscript.exe 30 PID 1680 wrote to memory of 1940 1680 wscript.exe 30 PID 1680 wrote to memory of 1940 1680 wscript.exe 30 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31 PID 1940 wrote to memory of 1888 1940 rundll32.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20161205_9ce2d7bf1b9cf61897a960de3e0481d0.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\5kCGed9T.zk,TOxNKCZjUHCfTf9D2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\5kCGed9T.zk,TOxNKCZjUHCfTf9D3⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Loads dropped DLL
PID:1888
-
-