Analysis
-
max time kernel
152s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
17-11-2021 11:31
Static task
static1
Behavioral task
behavioral1
Sample
20161205_94392b41886882eae567704071328694.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20161205_94392b41886882eae567704071328694.js
Resource
win10-en-20211104
General
-
Target
20161205_94392b41886882eae567704071328694.js
-
Size
12KB
-
MD5
606a681823a1378212c3eb66e9f4b2f0
-
SHA1
7f60d8ad61224419a77e43626c81f5c7c2510533
-
SHA256
8758f8414e002568ca5872b1677f26a238ef8dd7e10840c9b23b296c86ff9f13
-
SHA512
d4366b90d827fa32f1dd5454a0bc6d4776073867bfbbf4c5ae9cb94bac1a328823b62691361d324e941d7b9a73aa9e65f538878fd7ab8a325d15e50e7769d1a5
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 7 IoCs
flow pid Process 5 1096 wscript.exe 8 1096 wscript.exe 9 1984 rundll32.exe 12 1984 rundll32.exe 13 1984 rundll32.exe 14 1984 rundll32.exe 15 1984 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2004 1096 wscript.exe 30 PID 1096 wrote to memory of 2004 1096 wscript.exe 30 PID 1096 wrote to memory of 2004 1096 wscript.exe 30 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31 PID 2004 wrote to memory of 1984 2004 rundll32.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20161205_94392b41886882eae567704071328694.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\RPDIHV~1.ZK,TOxNKCZjUHCfTf9D2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\RPDIHV~1.ZK,TOxNKCZjUHCfTf9D3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1984
-
-