Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c.dll
Resource
win10v2004-20240226-en
General
-
Target
45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c.dll
-
Size
127KB
-
MD5
685fd532cd11d534b3179c56dfab29cf
-
SHA1
a83a3fec900e523541476d03f75e26a05b3d524f
-
SHA256
45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c
-
SHA512
2d9dc2ad4fa5b93d47c32e4fe5868dcb0340289da77c1dce6e25bc7aede4738298fc2597de0b2b883a1bd0953e2130dd565d22123504bd0b738508cce706d8b1
-
SSDEEP
3072:0uFa0hGJ5yhppWMy7qWrH4CJWA+26begdDywQp3LnnBphN:+MUARQnr6X26fDvMbnBZ
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\_WHAT_is.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3004 vssadmin.exe -
Modifies Control Panel 2 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 2680 msedge.exe 2680 msedge.exe 2888 msedge.exe 2888 msedge.exe 2028 identity_helper.exe 2028 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 5024 vssvc.exe Token: SeRestorePrivilege 5024 vssvc.exe Token: SeAuditPrivilege 5024 vssvc.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exemsedge.exedescription pid process target process PID 1388 wrote to memory of 3556 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 3556 1388 rundll32.exe rundll32.exe PID 1388 wrote to memory of 3556 1388 rundll32.exe rundll32.exe PID 3556 wrote to memory of 2888 3556 rundll32.exe msedge.exe PID 3556 wrote to memory of 2888 3556 rundll32.exe msedge.exe PID 2888 wrote to memory of 1056 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 1056 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2108 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2680 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2680 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 2208 2888 msedge.exe msedge.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45a379ee5c48fd976a80e2334eeaf27636d5948b6ec20f794a55ab257e22bd4c.dll,#12⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_WHAT_is.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0x78,0x110,0x7ffd5fd946f8,0x7ffd5fd94708,0x7ffd5fd947184⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:24⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:84⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:84⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2292 /prefetch:14⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:14⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:14⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18159879424235027809,12680446044606333309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:14⤵PID:208
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All1⤵
- Interacts with shadow copies
PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
6KB
MD5ec7091f9200da775eee0e9967ed11990
SHA18a53e23c4f5cbedb20bb57079f52ce7edfd8a09b
SHA256cb483dffed6e64c3d9930c6942c6aba61cc183bf5d2493059186bbce66666a3e
SHA512ff644b8ce46097da7797e0c4b18f28c1efce4f49c8bc00e91d28951ea8f710187313b66ddbc071331e6ae3d9317211c892fd287b209962b225d72e5d78268cef
-
Filesize
6KB
MD5991afbbd7185b3a9080fd5fdeaba2092
SHA14c588cf5d192a1ef113778ccff2e555383221cee
SHA256e6c08e9b52b4a73bdf20387b18f8a85883e655f7efbeaba2716079e6e99c9e8b
SHA5128ace18e398cfeef3a6d515eca2b38bc4197db434fbf2305c516e3ff94e14f5dc654cdbc0cf86045e0e3396736fe23c793db72b9d43f14142daa4b208b8bd7c55
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c7cbfbbea405bcea804eb705fec11041
SHA1b8a1e0bde51c39e157350ff73d767aa91e8cb5b9
SHA256f27f27607eb52196da24c26fd6bf167c6d4014314dff3a0ca298ee46a63b75c4
SHA512ff1aaa24b2d889b1b3cd0bcf36219fe1442642add2e3f173b2308307193c4a60eb296048a67569e46ad5d24e10cb3af0e10993e65b6f8ab2b15902a905defa62
-
Filesize
9KB
MD523567188a9a907538d5149f0766274d6
SHA135a9a1136fb0d96f4e68e2cbd40fe4106f689ab4
SHA256b8d03086c7a28a185685dde5d97d673e905559750c756f8a011c9264b9b6c38e
SHA512ceac44dbd7179b04e8b35c5d0a696dd3213f012f3e35f68c66c817aba70401999f0e17c23c582a6eefe4f0f912fe8411db7b27b3d228894d4e836fb10b1de5f1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e