Analysis
-
max time kernel
236s -
max time network
269s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
V7bTrYJ4lbO6OS.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
V7bTrYJ4lbO6OS.dll
Resource
win10v2004-20230220-en
General
-
Target
V7bTrYJ4lbO6OS.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1064 rundll32.exe 2 1064 rundll32.exe 3 1064 rundll32.exe 5 1064 rundll32.exe 6 1064 rundll32.exe 7 1064 rundll32.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\ConvertMerge.tiff rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1070a3eb8463d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386999993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1575F2F1-CF78-11ED-BB29-4E1AE6AC1D45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc4589900000000020000000000106600000001000020000000ee1765c29ff15f8b9273f9e29692ba61deeeaf8ea0589bdd666cc7509c44cd51000000000e80000000020000200000004c58dd56390461bf5dffeca51700806132f385906bb3d710a6fc387113ca7f0020000000f8713d49f122608d8624305a1f7a72d79a13f77a54dd64a611d3b62bfb131696400000006c6eeeb96caa6c693cce95ed08b17212231760909776cc28895e1610f1324314da6d419b7d35548846d5dd1b929a4292dc24850241a7b5722ec2437b1dbdef36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 584 iexplore.exe 552 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 2016 wrote to memory of 1064 2016 rundll32.exe 28 PID 1064 wrote to memory of 584 1064 rundll32.exe 34 PID 1064 wrote to memory of 584 1064 rundll32.exe 34 PID 1064 wrote to memory of 584 1064 rundll32.exe 34 PID 1064 wrote to memory of 584 1064 rundll32.exe 34 PID 584 wrote to memory of 1280 584 iexplore.exe 36 PID 584 wrote to memory of 1280 584 iexplore.exe 36 PID 584 wrote to memory of 1280 584 iexplore.exe 36 PID 584 wrote to memory of 1280 584 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\V7bTrYJ4lbO6OS.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\V7bTrYJ4lbO6OS.dll,#12⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:1524
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e7f43ceb28ed4b8e7cd527433cd16dcc
SHA1b15e6a7dd787a7719d61bccb324d35b58e3901db
SHA2562abb3f8c901ceadb5a690a2c440a7ce82f47d9253c6f25cd2c94747301f49f41
SHA5120d5c16896b63c51b814d0a5022ae7f4e69680f211f60bc9c57eea81114551842cb5ba6d3ad1090a8d9d339df00883834b2cb92dc2164beade8661faca3f62bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53572bedecb89dfd7d6e4312624f46a6f
SHA10a3df970f325041134bbd3a6fbf70ca69b9099a5
SHA2560214598300ee9d014d10f0045310671ce4476adf250fd2eb1148e4cfea5e1b79
SHA5123f644154077bb8504b5ea1c4aeb64134254a5821fd30428e5eb6e766be0cae511a2a68599eefed6aae1018bdcc8acba8dc53bb3a9a9be9f45f0e69f880ca4f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5033774e5d78d08bc15fcf60e16b30
SHA10e44566ded2fa5d1ebe073a86fa8a970823bc18c
SHA256ee8e15c33f4ae999e6f6409bd29772edd1990f5237e5f9b7dc83a0eebd1889eb
SHA512a3d456b16b215d52783fd56520b36be91423707b905970e205c785f515f72f14446362a5746728d053c7e9d7fbad3d01c40b952bb90192b3a4e0b76be2b077a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ad603756f350809d2e7c196112ad5a
SHA186d5b677fd094790cb0f372c5485cdad116c212e
SHA256d1e5b9c88d8d78f1209eb978b9d3bce631946f6096382663a890a0418a7af4f4
SHA512b5e65a00a5509a73e9e4743d3e07057df882d2aaee066256935915c63bcb03b03b5a3dc14df31b653fbb08bb77e45931118c1e2ad403c224f65c7ca58704fb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110a0706050591bdcaf970015e7f05ec
SHA1bf0ef45b9490cff2ef33c13b6f385f10b3bf9110
SHA256dda4e0aedfc7467390e9f9dd0dc74ac4d99756d88a7a29dac6a1d54503416d38
SHA5129455ff4f192e602229f49a02216790b8d0cafb866e3febaf8717e9fa921b35b12657600a7aff77cdb2772ba59fe018048f36083edfce381ce942a7557bbacf47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53595172609807cdcf895ed9f6d5a01af
SHA194b60e2022d13cbced85bb9e07eefec885b5b68b
SHA25640345f18e5ac44a5b2ace98f214420ae963eacb3531d2e4d17300d43d76050ca
SHA512b05e216c737da0f0d2437b7014afbc482e91db77258d4621c4f9ea7e8550c23efe845561376410aa482e521a7351d4ec7d20fc5cc467363b9f3ab79082061f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0bc2d736aca3ff0640e42bc4652476
SHA16a3d221e7e264bfea577f1fb0fb5db453b90985c
SHA2562cebc536d9e0485aaec08aeed807eef7b13091eafd0d3d209496a9ad59e42a54
SHA512ea477c93a3dca5faf9d47ebaa60ce1a70754b00a6fe056ba4fd11eac0980a2b0d98c751b1a389121e2ca9ec9e2b1e06a5f1abebf7649ea2e1056a8a4cddd49e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d81af28b51bb2123f04cc272915c29
SHA17342d377e45262b55216234af692c9dc3e9158d6
SHA256b866ae1fcbb590f33b5c1c681a0990f67f6bc2aefeba7f74a0876d7d8acc907a
SHA5122c0fbdf8a769be85e93ace40f64ba32652ad15864812bf00c4cc2daee732f071a9bfec8fd0b39f02a377b6976bf6b72a2d8976bea64b3aa0a502082547b141ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565173e89019bfdb5d154f7e12f5cf872
SHA17276f76432f16b621e812b021ba45afa4023cb44
SHA2565ec4343eb68049daa60ea22bce9551b17abd4dc53e639697f15399bb73d599f9
SHA51211e18bfa86a117aeb47ebc20305371e98f7e80a1a86294770c279dd759b76268d490eaa1e8a08ec6f70c0961129cf75da848adea73a227806b2ae02c8e284c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf4d2bc08aeb3a44e00cc9ace805215
SHA140b41b610fe30f7e4b8769e1f8a704f1297d6837
SHA25632191e9c6ad84eee723836151d5607928398d685a87c0a955e68efc56d1e1863
SHA512d11a924c5c4c6c8fa360e254e5a3433030b53def093b8f56ebf8e0f41b066c8ea87336b5771b13c385ec2648149e23a786f0bede527efbce611eb329bd4e3a2b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5684ef6285fca6cc05691a07846ce4e4e
SHA119f2a141b6378d6e0ed42c5734041264b5a9f622
SHA256801bb9ee8cbc36a4770b937ed03bad5409119f0bde3c6d5939cad8caaa9c1d60
SHA512e90195fd623b64d43ac150625a9475f45fbc820e4e97c988688b11b52e043dd0c69cb154a6c41e5befe8abbf7b87ce4d7db873d0ff350ea4571cf2a3805d9329
-
Filesize
3.4MB
MD59bac9d5bab872e21ba34728bd110b450
SHA1272ced38ecb45ea913dcdec32f1d76fcb3d3883c
SHA2568ab26895a8d1e0e6c42fd71fba920988529d0e4dd83e32ef9999f33554f494a8
SHA5120db6fa851ba6d2575dc80289bb7fd29807262cea04c38e790c50f6b181a880905f0e4110509ff8ce25396462b346874a2deb10224c2fd0b8a5446248ff1f9990
-
Filesize
8KB
MD5e7f43ceb28ed4b8e7cd527433cd16dcc
SHA1b15e6a7dd787a7719d61bccb324d35b58e3901db
SHA2562abb3f8c901ceadb5a690a2c440a7ce82f47d9253c6f25cd2c94747301f49f41
SHA5120d5c16896b63c51b814d0a5022ae7f4e69680f211f60bc9c57eea81114551842cb5ba6d3ad1090a8d9d339df00883834b2cb92dc2164beade8661faca3f62bda