General

  • Target

    0c96311fbd6dcd5af7dfa4875fc72beda0c9e1c7470ec8d0cb54041201f94708

  • Size

    201KB

  • Sample

    220628-td3wjsccg9

  • MD5

    038972d01e9d035b84e886f67c865a4b

  • SHA1

    18facd6db290de6032c1eabe2949e8ea06b71176

  • SHA256

    0c96311fbd6dcd5af7dfa4875fc72beda0c9e1c7470ec8d0cb54041201f94708

  • SHA512

    756f52345b2fe33cc929e78ba51ee7a15c54006a13a42e8aec0595b3243c6b9b9b1f660c7dfd272f9a95716666982a4aff98d9535bb2aa4d6da57b28455aace9

Malware Config

Targets

    • Target

      0c96311fbd6dcd5af7dfa4875fc72beda0c9e1c7470ec8d0cb54041201f94708

    • Size

      201KB

    • MD5

      038972d01e9d035b84e886f67c865a4b

    • SHA1

      18facd6db290de6032c1eabe2949e8ea06b71176

    • SHA256

      0c96311fbd6dcd5af7dfa4875fc72beda0c9e1c7470ec8d0cb54041201f94708

    • SHA512

      756f52345b2fe33cc929e78ba51ee7a15c54006a13a42e8aec0595b3243c6b9b9b1f660c7dfd272f9a95716666982a4aff98d9535bb2aa4d6da57b28455aace9

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Registers COM server for autorun

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks