Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 11:13
Static task
static1
Behavioral task
behavioral1
Sample
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
Resource
win10v2004-20220414-en
General
-
Target
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe
-
Size
372KB
-
MD5
e3b3e285390c0e2f7d04bd040bec790d
-
SHA1
dbee71535e9f1fb23b3f01e25989d22d51237e68
-
SHA256
21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6
-
SHA512
6156a6b0ff4f41c823cba68a4596676e357ceb5b8c0848c2828a72321dbc2a731d9ae8f1a417fe27aef7de0080001ad3f77b3809b64a93c610ae99f95b35f5be
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\LockMount.tiff 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Control Panel\Desktop\WallpaperStyle = "0" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Control Panel\Desktop\TileWallpaper = "0" 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007647cecb75a30445a6fd9fb68eba5427000000000200000000001066000000010000200000003a36e7f09ba7b533cd52b403c75f22fe947734462fa4ebc1aaf3cdebac88c3aa000000000e8000000002000020000000f3db1576833176103218f5745343f902b479db403c9913f32c1ecba40ad7212c20000000a90bc17f58f469986aaaecfd9737c7075a4572db392bcfcb566c50c7835d6881400000004f3a4ecbde5db9d3661f428c32a8e9403b6c922871ac32b3d3a8db5410bc982e14c3ba8fb0c270420aa560dafb5244fe566372745bce3b19af3854301884631b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5315E401-05D2-11ED-94A4-CE76330CF053} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c55829df99d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1588 AUDIODG.EXE Token: 33 1588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1588 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1624 iexplore.exe 1408 DllHost.exe 1408 DllHost.exe 1408 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 824 IEXPLORE.EXE 824 IEXPLORE.EXE 824 IEXPLORE.EXE 824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1624 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1808 wrote to memory of 1624 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1808 wrote to memory of 1624 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1808 wrote to memory of 1624 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 32 PID 1624 wrote to memory of 824 1624 iexplore.exe 34 PID 1624 wrote to memory of 824 1624 iexplore.exe 34 PID 1624 wrote to memory of 824 1624 iexplore.exe 34 PID 1624 wrote to memory of 824 1624 iexplore.exe 34 PID 1808 wrote to memory of 1804 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1808 wrote to memory of 1804 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1808 wrote to memory of 1804 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35 PID 1808 wrote to memory of 1804 1808 21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\21a0201874af80436dc0a36e5cbaf7da9b75217b3e39b712f3850729cf47deb6.exe"2⤵PID:1804
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2000
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1408
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5c39bee4c1119b0180f71dafc0c64e22e
SHA1e0c55767057f91e760c92a66d2133cf141751e26
SHA256fadad59a135de69bcbe225372a473ca1c014f477a910ea84f23e966dc1707fc5
SHA512572978bab41419628909d2a87ff10ad4a67ccbc8700027d2ac2d31978385c9535e2bbb0102d89c071f9ddb70ba6d38215906d6935b4853b5c0039f7bb2fa62d2
-
Filesize
8KB
MD5b761e70b02f7639e662788f0a7915e0b
SHA1f3e04d866b4c48018974561e91a2157f43eb50af
SHA25604dcf106c3c374a0fb3add8bc9dd9f7b11343a4c04d11488ffe05a9ef5e9a138
SHA5129a0f23d0999b0e067e0f9f3bf8e4e33a386a2f3ba23ad749902273d87debef4197dc17e121a7fa3fa62063e4dec866e92cb7b11e499dc6c09035895eabe81196