Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18-11-2021 14:03
Static task
static1
Behavioral task
behavioral1
Sample
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
Resource
win10-en-20211104
General
-
Target
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
-
Size
13KB
-
MD5
f6dbcc215aaca6a41234b8f5c4e63102
-
SHA1
ba8aaa58fa4e526cb0b6ef75948c5f5c22345d3d
-
SHA256
a92fabe3ad5c2e51fe204e977772c935e3caeab6eb1c779a9258c7758eaff0c6
-
SHA512
46bd8ec361b7cd22b311b7c4413ec1146d6b5c7ab7c6d99792423d27bb1748c0c61e6dd3c6d856af96b3fbb53d7a2e5b0797b17cfe36c356c12bc81dd5605397
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 10 IoCs
flow pid Process 8 4164 wscript.exe 10 4164 wscript.exe 14 4164 wscript.exe 17 4164 wscript.exe 19 4164 wscript.exe 35 3972 rundll32.exe 47 3972 rundll32.exe 48 3972 rundll32.exe 54 3972 rundll32.exe 55 3972 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3972 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4188 4164 wscript.exe 68 PID 4164 wrote to memory of 4188 4164 wscript.exe 68 PID 4188 wrote to memory of 3972 4188 rundll32.exe 69 PID 4188 wrote to memory of 3972 4188 rundll32.exe 69 PID 4188 wrote to memory of 3972 4188 rundll32.exe 69
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\IBJJVA~1.ZK,TOxNKCZjUHCfTf9D2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\IBJJVA~1.ZK,TOxNKCZjUHCfTf9D3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3972
-
-