Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
s1-d.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
s1-d.dll
Resource
win10v2004-20240226-en
General
-
Target
s1-d.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 3044 rundll32.exe 5 3044 rundll32.exe 6 3044 rundll32.exe 7 3044 rundll32.exe 8 3044 rundll32.exe 9 3044 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5124C241-ECB4-11EE-831B-46E11F8BECEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002ac7d4262f3ec3b98226905eba6fbf1a7892408474ea9620a2e068b3c70ba2ac000000000e8000000002000020000000f07fedc4b5001d92740c784c08d38b82e6dedcac53a8a9a08bd21ce61d1f33ac20000000bedbcfadc88c82577f2189380288d9fb7430e073b2a2b9521ae4257b5c261cd1400000006abd1dfac3974c97638e6638e52f1fcfeaecb8cf8ec606d169ed1ad8ffda5bc3a65a5861bfa18821423682cf09b244043702cfa3aea8f2c358793362e0b5adee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07f9725c180da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1748 iexplore.exe 1880 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3036 wrote to memory of 3044 3036 rundll32.exe 28 PID 3044 wrote to memory of 1748 3044 rundll32.exe 32 PID 3044 wrote to memory of 1748 3044 rundll32.exe 32 PID 3044 wrote to memory of 1748 3044 rundll32.exe 32 PID 3044 wrote to memory of 1748 3044 rundll32.exe 32 PID 1748 wrote to memory of 1564 1748 iexplore.exe 34 PID 1748 wrote to memory of 1564 1748 iexplore.exe 34 PID 1748 wrote to memory of 1564 1748 iexplore.exe 34 PID 1748 wrote to memory of 1564 1748 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54af313487e9cd898c359ea30d3d1484d
SHA10a6942b45f60741e2225e887b44dbc323ac904af
SHA256fc08968bf7a7e5470cb5be68fa05e5eb6cdcffe344855fe80b9bfec363e9c3d1
SHA5125b9fbd41d1830d9cdad7a74c62b9b1a6cc7b63005440cd0c852229da31b20eacf3809822ef150cbe6004887c809d16d1fc00df464304522649eb0ebf3125510b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff23bad0570a334529fb20726d8e2bd
SHA1c5065d9374238f2a2de6a173c76bb539be12d14e
SHA256532d5874ab46a49b8f77913dda5d8de5f12410dd8a2661199dca03266b71bc98
SHA512245fbdd9c64fe05303aefdea06d61823546dbb96aafb1292462ce91b99f02b509693fbac8a4d4c4ec41bc9f1391a748901ff20127cc981cfd4bf05541363371c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53178e8f9995eab5b132aaa610ffd0b95
SHA1093d0461755e3e3f35dda303fbefff890c1ec434
SHA2561584cf4a2af19daabbe5511988ec7e67761b15b80d622c810238c98ac479372b
SHA512ee7467fce8346f12e57d52a96d0e97576fededb03545fb749f9056747d2f93dc8c38cdaf8e9f8ea97d6ccf6134d478dd2b7ce249c6846c307ba68c5c0f19ff79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f9f1de7994366e1e8d9b8142b978d2
SHA1ddce2dd5f876d38cfe5b944600280e977586622e
SHA2565c89a0e5327b0c5aee5032e29200a256ee7dc1e9f3abcb354c78419dc92d11e8
SHA5127d1b6562b36ee61234f50f9e84a6a4ae6b2ac22074ec10e3d18a4642f5cd15bc61d62d7441d88e50cdf4d97e4ef98a42c76f7c2295b8d6d9f813cf298cedc750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64a72ac032497f9276e18ee15d806d1
SHA13b492d6bc3a427bc1a94480e3dfb809f15767b69
SHA256b8669a82989bbe23f07dcb3a88be2ff110cbb5fcd4d65b8bf2484d5bf514e3dc
SHA51234bf7f6520cd0922fe5749d715fd3d8dfc0d8cf35d986510f1b65b154989ef76bf8c7504cdb53264cd9859b6c95bbd817f0d3a22ab7ca34a4886edd146aeacd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a119d4ef68e7837da281f1f5d3593c5
SHA129c9583746850267f31e681a679915bd19d65ac1
SHA256fb6420b80e9d8544862a22b33f6ed41bf1862ccbd041d453e38cceeb5e7c5dd9
SHA5129a3363e0310db55a67c48f4a72bd5e3aa2b451a73763d9823026a98083ecf2b9bbe46332c3047d6db78babc896fddd050d8aa059174f0a28128383c3cc0d1e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54307719df9a7f2d9c134fc7a280c5128
SHA1bc28e0a18088df7a824e8a7bef21f280c2f86ee8
SHA256532aa5de28b4267014ce2135d43de1e34f9e3d167f519d97113954988c07fa09
SHA512b3eac3542623338edfa3bd046ed37613d5f8b3404b0b9baab963e2b8960df86188b5ef0e82525264085627f9ca19375add5add5ecb683dbc48ccc081290b394f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e04d7846c10d629562ed5e2bbfdaca
SHA11d955f42acfdadead289ef935bea53aa47c7e40d
SHA256b7b0a493fe26960b6a9f3385bc1689b98dca5d5b8ce9b7910569c0a418dd8328
SHA5122fc6f82bc838d48a58ab1f97c132f3ffea2f67c386d40d6cab25f11be8b91877182eae6a7843b71bd8dc948ce9d0f45701381d64db99a82b9eee426a21d0c27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ff24a46245d64a5c3d75c0b6fac1e2e
SHA14da886ccb3747559e88fe26f4f016e5638bba23f
SHA256ad30a59357bb2889b5dce9ea047bc83fdd948bb29b6860a3882dd2f3e52ee642
SHA512675f166ec2af4154a0c86fc5562f8796bd0cfba83e3c0a09bfa1f345de365757338dd987d7a740f06ef2b16e01e721ec687ac9768e4df786e8b80e7f87fab744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7089dafbd2113b6c71a8130a1be586a
SHA11eff970cd241ce876159d878f04798dcac573513
SHA2567cd5e0952d75d08d5e081a8ef742214758301c36cbaf680c7cad9fc204c4f1a5
SHA512f15bb6547c1e1578803862e0f743b2f09ec580e6eee79b054d3e43b8c5451563f30f52b85ab6fbfab8c23333501816bc47d89e5395b35ab94a751c477314ce97
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
3.4MB
MD59ca6c25815d70701ab58599afa3d9644
SHA1f5edb1050cbb265b08ad957ee0a5e883d6f06278
SHA256e39e9f372d19c3a156abbfe87299600e8890002550197e2e1175b339d7f5ffe4
SHA512879e97220c2b2aca08565be6aabb9972a395a076faebe28e6c019a9e68cef2e68f1de4151a95ed5640e2fed9a4d923df900d2889f2e1b15fdacde3ac5eb58d5f