Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 03:34

General

  • Target

    s1-d.dll

  • Size

    159KB

  • MD5

    7932ee5fa6f83b149569752c47e04b87

  • SHA1

    6eb115feadc5808507fb5a666dd18aa89a45616c

  • SHA256

    f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b

  • SHA512

    17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58

  • SSDEEP

    3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky (Osiris variant)

    Variant of the Locky ransomware seen in the wild since early 2017.

  • Blocklisted process makes network request 6 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1564
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OSIRIS-22cc.htm

    Filesize

    8KB

    MD5

    4af313487e9cd898c359ea30d3d1484d

    SHA1

    0a6942b45f60741e2225e887b44dbc323ac904af

    SHA256

    fc08968bf7a7e5470cb5be68fa05e5eb6cdcffe344855fe80b9bfec363e9c3d1

    SHA512

    5b9fbd41d1830d9cdad7a74c62b9b1a6cc7b63005440cd0c852229da31b20eacf3809822ef150cbe6004887c809d16d1fc00df464304522649eb0ebf3125510b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ff23bad0570a334529fb20726d8e2bd

    SHA1

    c5065d9374238f2a2de6a173c76bb539be12d14e

    SHA256

    532d5874ab46a49b8f77913dda5d8de5f12410dd8a2661199dca03266b71bc98

    SHA512

    245fbdd9c64fe05303aefdea06d61823546dbb96aafb1292462ce91b99f02b509693fbac8a4d4c4ec41bc9f1391a748901ff20127cc981cfd4bf05541363371c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3178e8f9995eab5b132aaa610ffd0b95

    SHA1

    093d0461755e3e3f35dda303fbefff890c1ec434

    SHA256

    1584cf4a2af19daabbe5511988ec7e67761b15b80d622c810238c98ac479372b

    SHA512

    ee7467fce8346f12e57d52a96d0e97576fededb03545fb749f9056747d2f93dc8c38cdaf8e9f8ea97d6ccf6134d478dd2b7ce249c6846c307ba68c5c0f19ff79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31f9f1de7994366e1e8d9b8142b978d2

    SHA1

    ddce2dd5f876d38cfe5b944600280e977586622e

    SHA256

    5c89a0e5327b0c5aee5032e29200a256ee7dc1e9f3abcb354c78419dc92d11e8

    SHA512

    7d1b6562b36ee61234f50f9e84a6a4ae6b2ac22074ec10e3d18a4642f5cd15bc61d62d7441d88e50cdf4d97e4ef98a42c76f7c2295b8d6d9f813cf298cedc750

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a64a72ac032497f9276e18ee15d806d1

    SHA1

    3b492d6bc3a427bc1a94480e3dfb809f15767b69

    SHA256

    b8669a82989bbe23f07dcb3a88be2ff110cbb5fcd4d65b8bf2484d5bf514e3dc

    SHA512

    34bf7f6520cd0922fe5749d715fd3d8dfc0d8cf35d986510f1b65b154989ef76bf8c7504cdb53264cd9859b6c95bbd817f0d3a22ab7ca34a4886edd146aeacd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a119d4ef68e7837da281f1f5d3593c5

    SHA1

    29c9583746850267f31e681a679915bd19d65ac1

    SHA256

    fb6420b80e9d8544862a22b33f6ed41bf1862ccbd041d453e38cceeb5e7c5dd9

    SHA512

    9a3363e0310db55a67c48f4a72bd5e3aa2b451a73763d9823026a98083ecf2b9bbe46332c3047d6db78babc896fddd050d8aa059174f0a28128383c3cc0d1e51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4307719df9a7f2d9c134fc7a280c5128

    SHA1

    bc28e0a18088df7a824e8a7bef21f280c2f86ee8

    SHA256

    532aa5de28b4267014ce2135d43de1e34f9e3d167f519d97113954988c07fa09

    SHA512

    b3eac3542623338edfa3bd046ed37613d5f8b3404b0b9baab963e2b8960df86188b5ef0e82525264085627f9ca19375add5add5ecb683dbc48ccc081290b394f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4e04d7846c10d629562ed5e2bbfdaca

    SHA1

    1d955f42acfdadead289ef935bea53aa47c7e40d

    SHA256

    b7b0a493fe26960b6a9f3385bc1689b98dca5d5b8ce9b7910569c0a418dd8328

    SHA512

    2fc6f82bc838d48a58ab1f97c132f3ffea2f67c386d40d6cab25f11be8b91877182eae6a7843b71bd8dc948ce9d0f45701381d64db99a82b9eee426a21d0c27d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ff24a46245d64a5c3d75c0b6fac1e2e

    SHA1

    4da886ccb3747559e88fe26f4f016e5638bba23f

    SHA256

    ad30a59357bb2889b5dce9ea047bc83fdd948bb29b6860a3882dd2f3e52ee642

    SHA512

    675f166ec2af4154a0c86fc5562f8796bd0cfba83e3c0a09bfa1f345de365757338dd987d7a740f06ef2b16e01e721ec687ac9768e4df786e8b80e7f87fab744

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7089dafbd2113b6c71a8130a1be586a

    SHA1

    1eff970cd241ce876159d878f04798dcac573513

    SHA256

    7cd5e0952d75d08d5e081a8ef742214758301c36cbaf680c7cad9fc204c4f1a5

    SHA512

    f15bb6547c1e1578803862e0f743b2f09ec580e6eee79b054d3e43b8c5451563f30f52b85ab6fbfab8c23333501816bc47d89e5395b35ab94a751c477314ce97

  • C:\Users\Admin\AppData\Local\Temp\CabF00D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF0EF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\DesktopOSIRIS.bmp

    Filesize

    3.4MB

    MD5

    9ca6c25815d70701ab58599afa3d9644

    SHA1

    f5edb1050cbb265b08ad957ee0a5e883d6f06278

    SHA256

    e39e9f372d19c3a156abbfe87299600e8890002550197e2e1175b339d7f5ffe4

    SHA512

    879e97220c2b2aca08565be6aabb9972a395a076faebe28e6c019a9e68cef2e68f1de4151a95ed5640e2fed9a4d923df900d2889f2e1b15fdacde3ac5eb58d5f

  • memory/1880-366-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB

  • memory/1880-368-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/1880-844-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/3044-12-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-18-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-16-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-14-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-365-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/3044-9-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-8-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/3044-6-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-4-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/3044-2-0x0000000074AB0000-0x0000000074AE2000-memory.dmp

    Filesize

    200KB

  • memory/3044-1-0x0000000074950000-0x0000000074982000-memory.dmp

    Filesize

    200KB

  • memory/3044-0-0x0000000074AB0000-0x0000000074AE2000-memory.dmp

    Filesize

    200KB