Analysis
-
max time kernel
1628s -
max time network
1631s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 16:37
Static task
static1
Behavioral task
behavioral1
Sample
8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe
Resource
win10v2004-20220414-en
General
-
Target
8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe
-
Size
602KB
-
MD5
c80c3fb6c195380cac523a07379ac310
-
SHA1
a199df676f583f9c4454d1714fcf152b541e84be
-
SHA256
8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe
-
SHA512
cd93ef8a7358f9aaf909a742bf02ca8447044bea9f96cc2d55948bd6e946f7587f700ea7d54f2666e5ffa73afd06e8082ac808458afe441850c70f72fa1128e5
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\MergeExpand.tiff 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe File opened for modification \??\c:\Users\Admin\Pictures\SplitSkip.tiff 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe -
Deletes itself 1 IoCs
pid Process 572 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\WallpaperStyle = "0" 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\TileWallpaper = "0" 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "363206616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB907F01-F711-11EC-8873-66AE473A865F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd400000000020000000000106600000001000020000000465543432928339ca96b45e7c914febc8ff21212284f39131cb7190328db31ae000000000e80000000020000200000006a245cc5a3a9dc324c0c46fb52f109108ff42e0adafa1fb116efead5cad2a518200000000125af4e8427e59b2e21f49e76ce3f0cf2c2237cb50663f7c697591b4bc4627f40000000404b216c72e4df6ec44dd631f0d25d38da46a6e7dcb2051e593f887f5fbc75330611a4e3f012cd2efe52d262dc23555967301dc34967a8c4f4b7a841363bce7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04d36a11e8bd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1508 iexplore.exe 1480 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 880 wrote to memory of 1508 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 29 PID 880 wrote to memory of 1508 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 29 PID 880 wrote to memory of 1508 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 29 PID 880 wrote to memory of 1508 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 29 PID 1508 wrote to memory of 1072 1508 iexplore.exe 31 PID 1508 wrote to memory of 1072 1508 iexplore.exe 31 PID 1508 wrote to memory of 1072 1508 iexplore.exe 31 PID 1508 wrote to memory of 1072 1508 iexplore.exe 31 PID 880 wrote to memory of 572 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 32 PID 880 wrote to memory of 572 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 32 PID 880 wrote to memory of 572 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 32 PID 880 wrote to memory of 572 880 8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe"C:\Users\Admin\AppData\Local\Temp\8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\8732d8a06842219bb9cf705a59cedb848996a53ce4a4438f34bf0f5fc7fc90fe.exe"2⤵
- Deletes itself
PID:572
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD59b398e0a9920c4954d3a34df87d0fc0f
SHA114960e8e6803cfee1c54be84db30e90a9e57803c
SHA256f329e45a9d31f4acfea1fa0dd9d5cc5c2ed4f24f08302c0e4427ddcf4b18e07e
SHA512f9ca1be26608d163eb41c5e066c6463d29f08486ab619c20072c7359f61c2710bd63b024bb896d46c22df07b21e57f524271c516496aff28dc11b796cfce1b80
-
Filesize
3.5MB
MD5e9da83e5da2e06d3c576e3e8eee172bb
SHA1ba593de0573afd0e0d6bbc8e615404da4d882c5e
SHA25687fd088b9d5278f849ed63c049da9d9bbd40ab4e67aa15d8261700adb6bb297e
SHA512836d9821ee82f7e2d8d86cb19f1a72752220353d277be39c348391cd9e6c3d5b1ab93dde79bf6cc70478172c2ca822a8286ef52c98f0c043aa55168ef3d2fb34
-
Filesize
7KB
MD5ce9afc7e7df846074f6ce40a9993e274
SHA1871bda728dc57d4e4744a6ffc9af96ee3415f044
SHA256ad76530c5da369b4135c507c40b60b2f0cc220c4f26256b038419ea6e3a3de3f
SHA512e8bc0522ec24d323cbdea8be2485d5d38b50e23f7cc8d5a50afd64965f5aa8928fb584a2e597723fd006ad5e659d28023ed44f67e21536200a65f534ee5da7ae