Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe
-
Size
517KB
-
MD5
6df9fb974921b6450a0dc2a052f32279
-
SHA1
c4f14c84ebde71755248ea68736fa05713c798b6
-
SHA256
0152f123ede46e76fb1193b1393b8e34dd2f2718ee108794414c2cc7734c73eb
-
SHA512
4936a3c6a66804392e0248c4fc1f9ce0f68238bf639a8245681485cc75dfc7269fc103b7bcdfa959870c00145ab12a0d0dc1745cea55532cae38e9566ac59805
-
SSDEEP
12288:zVRm47ugq9QLXzNWVn4Fkl6BQ2yLhxPtIS4GudgBXllbXtdjy:zVzzzjNO4FkUQ2yL7PtIdGudqlb9djy
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\WallpaperStyle = "0" 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\TileWallpaper = "0" 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFCD5EB1-1E3A-11EF-92F7-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0683ba447b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e53eabf11f3b2744950d1a8cb766c9cd000000000200000000001066000000010000200000008a7736d136ae5e3c3328e6e436f2b67167d7ea8373f7dfc52d0d30dee08b9323000000000e8000000002000020000000a87137df21fd24770bca993fc6aae7bf01814468fbcef460ede8169af10cd2462000000002ffa0ccd0cd6f786658b1424fb9ad491c30dce4a5068b1baa3671b12c530bea40000000104a18283d7cee2c1b00708195a36b1390edbbd2bc81afc9ad799d44ddd5a3a5b5519f740c455e30dc7c2c3a41460af9bf53f5f9f075d28224fa261a3cdda452 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2540 iexplore.exe 2960 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2540 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 31 PID 2864 wrote to memory of 2540 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 31 PID 2864 wrote to memory of 2540 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 31 PID 2864 wrote to memory of 2540 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 31 PID 2540 wrote to memory of 2180 2540 iexplore.exe 33 PID 2540 wrote to memory of 2180 2540 iexplore.exe 33 PID 2540 wrote to memory of 2180 2540 iexplore.exe 33 PID 2540 wrote to memory of 2180 2540 iexplore.exe 33 PID 2864 wrote to memory of 2648 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 34 PID 2864 wrote to memory of 2648 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 34 PID 2864 wrote to memory of 2648 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 34 PID 2864 wrote to memory of 2648 2864 2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\2024-05-30_6df9fb974921b6450a0dc2a052f32279_locky.exe"2⤵
- Deletes itself
PID:2648
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f85cdf95d849f89252bb199b54665c5
SHA113ec88489c5f7e5f572ba38a7a5dd73ec5896661
SHA256efeddbcc3b39cfa1133c0496aaf7dc13a9a7fe9d451dba5a7e594058d93b521c
SHA5129db64aecae74d956e77cea976b7e1f7ddadd73dc39ca4d61342d18552706d2dc86683d37c81f864643cb8a1f85f0e55f2d08886c45f781de213c6ea0ea2eac7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d7c5b6cc0d9779b008c4b0ccd9c507
SHA1f5a03664a5239cf59c68f47507c808296931cb26
SHA2561bb3ff69483be494d7841303138a954eccd24e168d0268ff9d64fe94e8ce2bbe
SHA5127054b98ad5e5ac491b2b543f5a48d13cb4e6b6bd28723991b84b1a6ae64f63be5cf385ba0c07941bf11c09332961d10bd3e696031a6cac00dd27c52e08425c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f38aaa0c8ca7cf378366e543d7bc7a
SHA166e133a55207448a3660116574255de646db7b1e
SHA256c6dc787aed617070ba790540d7974c7eea3c4c437dac9556ba6bbcd2ebe7a379
SHA51283997cefdaa43932a52e0157349cc295398686d685d65835ec986bc1fa5d9b11b8ec7f6c1fa6d3032864bdbf2fc4f5360a7cc36869205f62bb27734bf6f573b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdebcd8265805f46748ac080f1c1de6b
SHA141d6ae8a9aeeb4b6812f03e4b5ef2977ad9a8520
SHA256bc6de0942548b2323c1c9922a2d4ad6aa2e325addad0c46ae8b49919a9570615
SHA5126e5f92852600436369f19001a9dca1eaf9158251f2422fcb072d8e6ece7efbb0877dcf51f624ed82a610236ed6857e7c16545bcec457e2192f4a7ac59581dd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91400885a9e8a9022dece2079fd2527
SHA15854eba7c65fac11f17e6a0f2526b5e3f00f7bfa
SHA2569e2ccca31fcb5cbe3548a73be22ec680042633cad50719832c771eee98b7fad0
SHA512db2effe7e22a8c30963e708863b17533ff80722d69984138324e238ab9fed483f608b38fd9219d0558c3b94885ab3cd22c0e4a1b01d3efc2d5449aeddc5fa94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe7654825572408b34f48a586e84e34
SHA1c4a864e934698829a61783406be54db1de3b1027
SHA256834c46b90d8d48661716a0d1c345c01427157ec11f219be4a6f3cb6511c052e6
SHA5129dda9896de09f9d0015f49c4645051bcc2d9839c1c081d020aff3158570ac9d32e2c6620e8f3ffac75b599f7da82563e0543aeb86ec832145937a189ff7288d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d898e19bc9c2d01bd47958ae0f2d8ec
SHA14738da5c04c7b996a664d3416b56f631f332aff4
SHA256f1067915aaeb7bb1b37bd30a6be441f5d76a82b73a0aa4b150c937640e002abe
SHA5120c4bbbedbfb6205e6e169ef97bd04d01be6afab3c0f398cc6c85770bfb1a9ce172606c7f613511b8b9fd6e87d5582b02d0cae7d5ac385a34cfa54acf2f951ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd01b3a21360f9fe9ed18e520443b7c
SHA19ec2d519a9bd1ea8a07fd2c957cf3b587a7f6076
SHA256933094ff1cb20adf5c9a9bcff0c8ba4e501b0325a3dbd797d91f9b2e6cd20ba9
SHA5129913790fe8a8aaf1c6f8a3c6333bc485f4a662b25a43d314a376e3b8a9dfddd590cf8d5114211eb7df6d0650edbe3bd171b6ef8d44bd338c58098b4eeaaf83aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fabc50b051f8c27526fdfbfdb24320a
SHA1d643b59cb1addd1baefcaaaef901e21ca6fd8a64
SHA256f9f30c750984ee93129fc60f6d39156d3a2fe8a916127f2ea3f7f4b13bad49f5
SHA5126213c725cefa7859c14dc091a18874354206eba41e192122a13e0a3d39f9fef7f9904e2a7919e209a43861f1d234e50f2d08608f5ad972d72a25c27be6dda034
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.4MB
MD560c27850c006406863165ccab3ffc344
SHA1830d4a398ba81df7945a26ce6827fbe8b44703e2
SHA2567c0207edcbf1699ec1cc6dd224f604f8b30271e6800f8d56ca97d59f70143542
SHA512404cdc9a76bfee51a79e608446d0ad107b27570ea08bdd6eecb13554ad31fe734732a50458ec7fa417c87f4ac95d9cb620f9225fb7064f010a0748cb8582af6a
-
Filesize
8KB
MD55c0c0df80ccab3282868767bc26418fe
SHA1525f4e3e2e071ceba87871fa27316a794b5dde35
SHA256f3e24fd36b9d8962ae63df4cba569e2171a05ffcffe4989b8523f52aaeb41669
SHA512ca958febf70c06b8b77df64b7623af4d65dac99a30d6ee25a556302bcbf55c2ea1837df48027af31869a738740fe7b2d197464a6aecc73647f3057b4efc15f71