Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
Resource
win10v2004-20220414-en
General
-
Target
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
-
Size
372KB
-
MD5
e3b3e285390c0e2f7d04bd040bec790d
-
SHA1
dbee71535e9f1fb23b3f01e25989d22d51237e68
-
SHA256
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6
-
SHA512
6156a6b0ff4f41c823cba68a4596676e357ceb5b8c0848c2828a72321dbc2a731d9ae8f1a417fe27aef7de0080001ad3f77b3809b64a93c610ae99f95b35f5be
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\ShowGrant.tiff 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe File opened for modification \??\c:\Users\Admin\Pictures\StartResolve.tiff 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe File opened for modification \??\c:\Users\Admin\Pictures\WatchStart.tiff 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe File opened for modification \??\c:\Users\Admin\Pictures\CompleteBlock.tiff 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\WallpaperStyle = "0" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\TileWallpaper = "0" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01b9ce8cf92d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "364052391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c000000000200000000001066000000010000200000009803faecc2b55b82a732d3813a16a1105445048d37d5a1456b023d4cbfd179b4000000000e800000000200002000000055fcbbee645264078afde4427319d268945945e198123592f3b19374167c406c20000000bc02ffeb434afd6b2fd5f0202a78d69012b66e3ef3d4b547f6c4d3973ea45134400000006c0e4b56f94be932d386b707957eeb4170f1af467df7ae5fcdfb033909c9f694e8b09a9586ce2991f9eef0d0dfe41537851bb09ad89a35d0ceaf09e9b1e65767 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{056A1981-FEC3-11EC-8E39-DE95627D9645} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1000 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1000 AUDIODG.EXE Token: 33 1000 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1000 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1524 iexplore.exe 632 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1524 iexplore.exe 1524 iexplore.exe 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1524 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1032 wrote to memory of 1524 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1032 wrote to memory of 1524 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1032 wrote to memory of 1524 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1524 wrote to memory of 1004 1524 iexplore.exe 33 PID 1524 wrote to memory of 1004 1524 iexplore.exe 33 PID 1524 wrote to memory of 1004 1524 iexplore.exe 33 PID 1524 wrote to memory of 1004 1524 iexplore.exe 33 PID 1032 wrote to memory of 304 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1032 wrote to memory of 304 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1032 wrote to memory of 304 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1032 wrote to memory of 304 1032 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1524 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"2⤵PID:304
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5acc54942a7f9b8a112d59180b2b9174b
SHA145d6bc7b4a9152f227cfa9cefbed811684e6fc48
SHA25641cce3245996e0dfd8a3d3b293afc87b9f060f31fde27342304577861de7c34b
SHA512474281fde9ed3d8bdcfdf73399234c2ef2a82b527f28411ae57c3c545b9a44e824e6c92bc29e2fd7197b0dc262885fb31a114400539205ff0c423ec483bff7fe
-
Filesize
3.4MB
MD55031f31c470595a1390358728e30e527
SHA1a122ce032945231abbf2859523fd8cda8d9f4057
SHA256965ffcd671a2cfb304678c77fa06392194c15c9cfb1864b0050ed7f2b7adb5e2
SHA512e5a8e46dfb392371ad3e336b11fc106cfc8f7f3c56b58410638229856f3761b9e272130c56db4958338faaa3ce8fcbfb19e57394a98d47463168ca4d00db9f48
-
Filesize
8KB
MD50ea14921853b18d6eba56be1bc1ee2d0
SHA10d351d4f7009d17c584d14ffefdcaa58601f7cd5
SHA2560519a8dd784ccd2b3d97caa480d4ac53edf71f573002e9fca031d72218b88622
SHA5122871e0b4661b6b4dfd3c0074dc35134cba7d08b2e1bbf33b15c7d183d650e67786fe43f757d1af11fa4f7eb64f8d440892b1f3d60ced46d6cf703fdad9d0c78d