Analysis

  • max time kernel
    163s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-07-2022 14:52

General

  • Target

    0a2bc257eb1e266e2fd7c608bbb7e1f2ed34660c8ff21f32999fe49c6997329b.exe

  • Size

    303KB

  • MD5

    d5fee0c6f1d0d730de259c64e6373a0c

  • SHA1

    894f45f50454001bd21ad2713fefc15eb25b2b8b

  • SHA256

    0a2bc257eb1e266e2fd7c608bbb7e1f2ed34660c8ff21f32999fe49c6997329b

  • SHA512

    fa39d6cdf1c00ec33ce02df71d16d83d58095d09d6a2a1c9d31ceb0bcd1d0c01abbe39daa49de37fab525a59678db241d2d2ebb36359c203a2e25c808c6b5f79

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky (Osiris variant)

    Variant of the Locky ransomware seen in the wild since early 2017.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2bc257eb1e266e2fd7c608bbb7e1f2ed34660c8ff21f32999fe49c6997329b.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2bc257eb1e266e2fd7c608bbb7e1f2ed34660c8ff21f32999fe49c6997329b.exe"
    1⤵
      PID:4468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4468-130-0x00000000032C0000-0x00000000032E5000-memory.dmp
      Filesize

      148KB

    • memory/4468-131-0x0000000000400000-0x0000000000450000-memory.dmp
      Filesize

      320KB

    • memory/4468-133-0x00000000113B0000-0x00000000113D7000-memory.dmp
      Filesize

      156KB

    • memory/4468-134-0x00000000113B0000-0x00000000113D7000-memory.dmp
      Filesize

      156KB