Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe
-
Size
517KB
-
MD5
cc60f1fef7151af6d07cf08e30cd119b
-
SHA1
70beea7df6b48c35f12ce9be10b09c89c1fcddb5
-
SHA256
2646ec67308fdc3f42794bda0f9533e4624dc9b53cd74f321439df77963bfc06
-
SHA512
570e75f3e30dad4c70bc6a9bf5db5fea8aeef121c6ed2d69bd772d58c2fa6f75659ab063e764397bf59f18dc5a4ceb7ad8020a412eaf022058f13f29b44a49c1
-
SSDEEP
12288:zVRm47ugq9QLXzNWVn4Fkl6BQ2yLhxPtIS4GudgBXllbXtQK:zVzzzjNO4FkUQ2yL7PtIdGudqlb9QK
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Control Panel\Desktop\WallpaperStyle = "0" 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Control Panel\Desktop\TileWallpaper = "0" 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F589AA01-2B73-11EF-AAA1-627D7EE66EFE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000001f905569eb2deeedd9ee7d0cabf3049a874ccabe564e1e8b7875083004b9a8a0000000000e8000000002000020000000afc3fcdf80d13665d3d8a28263d5b40e86dec51cddd131b7f0412a3bdc3653612000000040c689d0869f4f228508f5dcf5e7c8a888eb41ef967291927225eec0bd7d25b1400000009da71f3c79f51bcf9dc4cb9a366ebed5a6fb407bb39d6bbaa83981aef0a84d1f4b94fdddcf7e96cf30b6d426052e7225612dfbab386897315e89d752239542c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704608ca80bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2908 iexplore.exe 2824 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2908 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 31 PID 2384 wrote to memory of 2908 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 31 PID 2384 wrote to memory of 2908 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 31 PID 2384 wrote to memory of 2908 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 31 PID 2908 wrote to memory of 2712 2908 iexplore.exe 33 PID 2908 wrote to memory of 2712 2908 iexplore.exe 33 PID 2908 wrote to memory of 2712 2908 iexplore.exe 33 PID 2908 wrote to memory of 2712 2908 iexplore.exe 33 PID 2384 wrote to memory of 2832 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 34 PID 2384 wrote to memory of 2832 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 34 PID 2384 wrote to memory of 2832 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 34 PID 2384 wrote to memory of 2832 2384 2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\2024-06-15_cc60f1fef7151af6d07cf08e30cd119b_locky.exe"2⤵
- Deletes itself
PID:2832
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ccf5f560ee985b416f0f54fe1be697
SHA167b6c1ddccae50b5f0ef744e0cecf4f7ef78593c
SHA2569179a1b815df243557ce96713f0924c273b0a56eeeb63c677a28a1010dbb45a0
SHA512d51918733644ddf3c23200f83931b5ea9d71b8e69dc27352e5de12f75d436e7886cc424c13ea3f7bdf7ce6578347b9021dc24d5e4ffed71d703de0f29f761bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb01392ffbb9d1ac43b099f61cb9d16
SHA14036bc6fb0593a48971e446d60f6f7091614047e
SHA256f6adeb893b87abb4c16bc9ed6c0973c2c212971b1eea8dba8034f2d1aad05d8e
SHA512a4ed51be82037359122b938daea5d0ada94ad8feea00f49e0408b3c9c2f77ac31d752b9316a36a196e6953f4eadd7e195c8c9cd2c115571bf32c137a53f10e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514df2467db19f9246835bd82f53ebb42
SHA1947fd67ddf3ff1f163021407ad8d4cd22ac4380f
SHA2564ddb2d30b11ea417cf6c5507e3c55efdd7bcf6168b70e6ea931455784b4ffb47
SHA512cdad7352fc80fc163b2dcb8cf69c842ed914bb91b7abaf9e1f63536964bfbba80c641d96e701584f5f0340c9545ce76e4bec380a7d70599c799320a9e564b622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095a4faac5f68ae2da4ac73b4943cf3c
SHA166b8b5d3b96648cdfd7791ca3ba09d7f0a7b223b
SHA2562aac18af9151388263a1e3d1abb28a389281139c61cfbff4a844ed7582905949
SHA51280b8b875e5f670b5419150d856429908f291496b2eec09c01906322e042267575c45965ff025fb216b2d25af18c99a5606138a0f728377f31213d6dc94834e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848371f04411c5d027f5e2ea92e83a0b
SHA14589dfc94ba3a3bc92e87265b81a13f0931792fe
SHA256bd44a1b93fd0e3390be2f055e3953988106271c9f14cbe4eae9ee830f37faaff
SHA512fabd664f4d18dfcb20c07cc7fd333ab7198b3fc7adf8689e6a13749c577520b0bc60e8068c73ea20a887ab82d7645aea63021a803d33db61f3f2b15a195e37dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6dc9c8b9954c8090b60deb9a8fbbd96
SHA126dd6bfec0f914092075572c32bc99129f659d2d
SHA256db79b28f13347a9b59a45101e9e9a35f9699340a3030b8f02155d0616fe9ee8d
SHA512875bfe814b707583db32bbc4eeb1f66dcaac30d64af6c382f0388ed783c23143f0ed904703cb8490e062f7aa3bad4d3bca23103a6971b74ed7756dea41fc392b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e968384c0d5e0c9dd46ae4197cefe22a
SHA1b87d0ce9551e0c38c0a9d4eb73e6fbde1364e9cd
SHA256beea4d2856908ec02905839741c88b030e13dae8b2b18066f42675cabe983222
SHA512577f4719f1e12ab85d0dcf1573d6cecde212ac43d4e6f9264c0cdeea89da2206760356d23bd7126487274d2b2378e48ea398fd4875635866b253e8792ae15f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8ac9ba84fa9168acec74be9cdc783c
SHA1fed66498d8a4b636d09d68486670994d8ed75bb1
SHA256c697898a1f001ac3003e8a834b05c69075992098b27d54a17a49aac4124e21c8
SHA512d42d206656e484b70bff5b09e5d5a0d266543e184de7ad83630fc6d544592664ce3da450feba7d30419e1414a61c7241597bdcb1b3134ebce422259fa4cc3297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5999fdf9d04b969085442700c034013
SHA18e10b5321452105df96f4938714a73afdfc31ee8
SHA25605f79515ea3f9713437fe331b22828f37afb1be950e100fa9af9235ebc40b47c
SHA512e693ef119e089af8e6d6358fb6c3a621b23e24a315d13175b4e665d1bd59252d32b61ce3e6d489184d1060b6a9bf48f9fa5c46671b74946ae77fd76acc756492
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b
-
Filesize
3.4MB
MD52104aac51b058deb2c11131b827f348c
SHA1c095c64b748b41a699984e63872fadf1eef6aab6
SHA2568792550a53894f6de6ffa6b38cdf691233cb6fa7026623d1e175808d77273b20
SHA5122806db75b490c39b5683ab556e5e9e7d997cddbde7235af78a015c30e729ad443e9d99153279fe519373cd98444f1f4f8cac485a722745a36498dbe51e58a99b
-
Filesize
8KB
MD588a8d4c9dfdf8be4e2f2c9265c443478
SHA12cdab4825e9fca85e72e601bed59b40539c23337
SHA256503986a4cf3ac927034f5417ee64262ada1ac26e778a49faf8a12336fb4cf97a
SHA512811c9160671cefc2da141a47f8bb471a96036c959f94992421adbe93e0b6ed9fabe23eb1ea97d8768f240c70f649a5c4a953bc896b3b2a48dba79d6c29a64ad2