Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe
-
Size
517KB
-
MD5
7619daf0a58c873caa3790bc66f84204
-
SHA1
1feb1683d1b149601d2036b41ed36fd9c9d88f6d
-
SHA256
ce91d20c7f9e548ba5cf56e84cf8e535566bdaf6dd319d948988e3246d7f6644
-
SHA512
2326dbe762b73cd83bbf0e8964ae9d7836686b5127b4d7d2064936ca81f2906d58e645b3928801b50ae3a86167a131a8b90d5d9c2ef8e0871bf150fcf4995508
-
SSDEEP
12288:uVRm47ugq9QLXzNWVn4Fkl6BQ2yLhxPtIS4GudgBXllbXtdj:uVzzzjNO4FkUQ2yL7PtIdGudqlb9dj
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2596 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
Processes:
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\WallpaperStyle = "0" 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\TileWallpaper = "0" 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006028c3744a24ce429f885c12716b1e2000000000020000000000106600000001000020000000d9f5becbf7be016e732f12a5d9d0ec48a00b5b92205af87a03512d1b13b2a0a5000000000e8000000002000020000000ecc51db2b14f934ed5c3fd081f12b3100d27147b14350d0ecd93db74acb2184120000000610d8ddc333e720501fe3a19103d728caf40e1ca5d30a7f90c4c1d03b3db486340000000e20dbe14cc32486de642d4bf73f532f80698e4bf136a9e31d609f1261fd3edda132dff1ed1e3d2c4b126414b48e5edd465c4a214be175ff2ab56d605e8ea4e8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1093d05b29b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87676AD1-1E1C-11EF-A4EE-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid process 2796 iexplore.exe 2628 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2796 iexplore.exe 2796 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exeiexplore.exedescription pid process target process PID 1228 wrote to memory of 2796 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe iexplore.exe PID 1228 wrote to memory of 2796 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe iexplore.exe PID 1228 wrote to memory of 2796 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe iexplore.exe PID 1228 wrote to memory of 2796 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe iexplore.exe PID 2796 wrote to memory of 2344 2796 iexplore.exe IEXPLORE.EXE PID 2796 wrote to memory of 2344 2796 iexplore.exe IEXPLORE.EXE PID 2796 wrote to memory of 2344 2796 iexplore.exe IEXPLORE.EXE PID 2796 wrote to memory of 2344 2796 iexplore.exe IEXPLORE.EXE PID 1228 wrote to memory of 2596 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe cmd.exe PID 1228 wrote to memory of 2596 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe cmd.exe PID 1228 wrote to memory of 2596 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe cmd.exe PID 1228 wrote to memory of 2596 1228 2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\2024-05-30_7619daf0a58c873caa3790bc66f84204_locky.exe"2⤵
- Deletes itself
PID:2596
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0886725d0eeef960d72dce08cf0af63
SHA1e09338bcf6fe489871cea3f086b61eafe13b119d
SHA256af16cb2f63e2ef9ed6d66197da31fc26b40c3b2e41b16425553be661cfea9820
SHA5124aeba9e0afa0883e8740d896d5de538b6270396f926146734cf77e0fa4ce23c45d4f745e521ee07ba253ddc40f449c156f6f8e8580c4162805ada380cc22caf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd82905d03cfd7330de990e7c0e82f0
SHA19ebcd3d31beb905c98971106cc11304ae55224d8
SHA25603795c8ab4a27d1ba02c9b7d6188f507d667a8d2639b261986d5e35249b001c0
SHA5125235c72d31ed504d19d2ec76bb0841ef08a1cc17165828da2fed8b655c8e106f175d21a9c0d943396260109d9e607cb7c75be657d882d4d40aa2a67aea788423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c3942960f8c568deb0a22e26886dc6
SHA1c400c95ef27dd5434e15c7ab0d2a3490156f2b5d
SHA2560bb56acd975ff5e7300a8e3f50bc457d8f7239f84edf61d9658909daef5529d7
SHA5129c4575481124870a298ea9d84456b2db3d0a7cc17c4f1a3863d28ce3a916c57d21dc1b900fa503ed9ce401ce4972f2ac3bf2143a0b38207ef7ad9686b12556a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3df88331df0feeed25c32f0f0fc38c
SHA163b61f2019072fcf8c9b6afc4b45aa74270ed792
SHA25640b0652c197372a02e76d44ff6cda1a5a36a1efe9b9e794b9526e760d1404da5
SHA51253ce43727f13780bc879a4c48347c02c7354326c56555de5ede6088056427a4148e8db72f85ea43a9cdbb3a5bb677d2500e160aea8c748cbc1a653e0251b1a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ccd53c53a3ee02c00077183171d90e
SHA1cfd820ebca9907da85ce083cd280dd8a9d37d496
SHA25687da88b4d6bac88efe8e0d2b73d8a2efada4030ee899012ccbfff776e34efc55
SHA512e629b07c8e4ce3b5a8a7a401d90792acecb560559f014c10f5f35d4b5b6531e72c38ad178aba2e30f0f385a9318aef9343ac33bf6fb93877171ddb2c5781711c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd1e01b2449e5734ccc56359f228bbb
SHA1fe7c2cd506bc7cae44273d9c8bec497fde996845
SHA256441576a6d033d6238d0d4122c485c8ddbc26c4660f555346f9e7210a9307df9d
SHA512db2a09df5efe4c3f397b914eacc18f0e5c268396610790b0edc80a556a908f806fef428e2769f20a9a1c17e1900edfd7a1ac2071373b72a4d003f56754472108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575af4ea55e72541f0bd135a127b9666
SHA11edb99478b8a7bb150a1c60d4a9895c6e5ce909c
SHA256af94307dfcc655ae73e7fe461033aa5b4879de6382f99f4a067d6d85ee1fc7fd
SHA5125b08feddbd580c83037c8f5fc915a969cccaf93443b26e742e8020f0ab27e78fe49b4f10a4a9df6b5a3092cd521c50ae65e8065511bdf0deec08091a013c33db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8abd270ddea5229429864408ff1ad7
SHA156610246e339f082d81aac8b48172db3fe4d2c1d
SHA256c5abca54cfbc62f7f9a5a8e9ed799eb4e2f02a4243b1492f7c37e2a4507e89c2
SHA512d4cdddda102ed233081175db6467bb3b9ddbc8b34084e372fde33a48ad65a12d251840fb59f04b4f3eaa5f8973ac9c5aafc7550fcbc8478d95dadc7efa0a9b72
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.4MB
MD5be1fc0aa41556442ed25d0b48db892fc
SHA1564f2afd1ff17fbac2ebf14f32a3e189074c2bb8
SHA256f603da8c4cb327448f1769aa3a83f27ed5fb9e53235086f60b94364496448c18
SHA51208ad9e2c66d2057f20db788313ca8b51230140f2413f3fabc6a96d68a91cf55073c0fac16a0f82ff7d02387bd1f407558cc0541f5f8f7d233251983119e2cc36
-
Filesize
8KB
MD55c0c0df80ccab3282868767bc26418fe
SHA1525f4e3e2e071ceba87871fa27316a794b5dde35
SHA256f3e24fd36b9d8962ae63df4cba569e2171a05ffcffe4989b8523f52aaeb41669
SHA512ca958febf70c06b8b77df64b7623af4d65dac99a30d6ee25a556302bcbf55c2ea1837df48027af31869a738740fe7b2d197464a6aecc73647f3057b4efc15f71