Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
17-11-2021 11:36
Static task
static1
Behavioral task
behavioral1
Sample
20161205_e4a80fe1dcf0f7e3a9cb5ebfd027c115.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20161205_e4a80fe1dcf0f7e3a9cb5ebfd027c115.js
Resource
win10-en-20211104
General
-
Target
20161205_e4a80fe1dcf0f7e3a9cb5ebfd027c115.js
-
Size
13KB
-
MD5
cf7844b89cfa63d28152f4706ab1fc74
-
SHA1
ce46ff282bfe3162aec806b92672e0299aa09588
-
SHA256
cfc9a840db2ea814739f220bdaa2edc18f2fdcb350a40646bdc144ea7b559b9f
-
SHA512
58672ec8b6440321d4394e838e911927e2c03217a6ff39357f4c85d3428aef0ed4868e4848d6db3fc27d196d553aaee836a961f76ab4e669f9453e81f631b469
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 11 512 wscript.exe 13 512 wscript.exe 17 512 wscript.exe 19 512 wscript.exe 33 4368 rundll32.exe 34 4368 rundll32.exe 35 4368 rundll32.exe 38 4368 rundll32.exe 39 4368 rundll32.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\ClearRead.tiff rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\SearchWatch.tiff rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4368 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 512 wrote to memory of 4356 512 wscript.exe 69 PID 512 wrote to memory of 4356 512 wscript.exe 69 PID 4356 wrote to memory of 4368 4356 rundll32.exe 70 PID 4356 wrote to memory of 4368 4356 rundll32.exe 70 PID 4356 wrote to memory of 4368 4356 rundll32.exe 70
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20161205_e4a80fe1dcf0f7e3a9cb5ebfd027c115.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\TL1G5Z~1.ZK,TOxNKCZjUHCfTf9D2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\TL1G5Z~1.ZK,TOxNKCZjUHCfTf9D3⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Loads dropped DLL
PID:4368
-
-