Analysis
-
max time kernel
152s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
17/11/2021, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
20161205_3f1d7664595d2ff885b9fa3bf8a96bbf.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20161205_3f1d7664595d2ff885b9fa3bf8a96bbf.js
Resource
win10-en-20211104
General
-
Target
20161205_3f1d7664595d2ff885b9fa3bf8a96bbf.js
-
Size
13KB
-
MD5
181a0ef665583fb02134e9effa90f86f
-
SHA1
815bd5e80fb2ba833514548c70a5e35014a993b1
-
SHA256
c4370948896e4b1d2fded7d0a85127f5c2e1564e41ecbc47c810ae76b1473ac4
-
SHA512
650b1f77700ea60e0c8bfca25b364a35722a1f6b26ed2358d553adb0ae100ececffb11fa1af873ecf2318e3002e115fb2ce5d7b98f5e16c6428baae18e2d0a10
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
suricata: ET MALWARE Nemucod JS Downloader Aug 01 2017
suricata: ET MALWARE Nemucod JS Downloader Aug 01 2017
-
Blocklisted process makes network request 9 IoCs
flow pid Process 5 1048 wscript.exe 7 1048 wscript.exe 9 1048 wscript.exe 11 1048 wscript.exe 12 1028 rundll32.exe 15 1028 rundll32.exe 16 1028 rundll32.exe 17 1028 rundll32.exe 18 1028 rundll32.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\SplitSkip.tiff rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\MergeExpand.tiff rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1028 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1676 1048 wscript.exe 30 PID 1048 wrote to memory of 1676 1048 wscript.exe 30 PID 1048 wrote to memory of 1676 1048 wscript.exe 30 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31 PID 1676 wrote to memory of 1028 1676 rundll32.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20161205_3f1d7664595d2ff885b9fa3bf8a96bbf.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\EBB852~1.ZK,TOxNKCZjUHCfTf9D2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\EBB852~1.ZK,TOxNKCZjUHCfTf9D3⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Loads dropped DLL
PID:1028
-
-