Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
sample01_deob.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample01_deob.dll
Resource
win10v2004-20240802-en
General
-
Target
sample01_deob.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 2384 rundll32.exe 3 2384 rundll32.exe 5 2384 rundll32.exe 6 2384 rundll32.exe 7 2384 rundll32.exe 8 2384 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17D5DF91-7E29-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000018794e8956bccf6b41f1be70ff5451ec1fa73c39affd7ee8e7a92080989e5c68000000000e800000000200002000000019b3779700646f543fe6d168edd83c88844d73ae5cde9761cb391da509f1c42f200000006010d7373ebc61d51e2e9299f2ff649e985a3d99b34ed46d7e26b6b253aeda77400000002cde425c4529c6797362938bf9006d8d6dde7061f46d1abb867a4b6a3200b006224bcae57772e7a3021bd21fda5b4b96f40b680f8d502a0d2d0b460e191d7cb4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03e59ec3512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2760 iexplore.exe 2324 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 1732 wrote to memory of 2384 1732 rundll32.exe 30 PID 2384 wrote to memory of 2760 2384 rundll32.exe 35 PID 2384 wrote to memory of 2760 2384 rundll32.exe 35 PID 2384 wrote to memory of 2760 2384 rundll32.exe 35 PID 2384 wrote to memory of 2760 2384 rundll32.exe 35 PID 2760 wrote to memory of 2668 2760 iexplore.exe 36 PID 2760 wrote to memory of 2668 2760 iexplore.exe 36 PID 2760 wrote to memory of 2668 2760 iexplore.exe 36 PID 2760 wrote to memory of 2668 2760 iexplore.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample01_deob.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample01_deob.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2420
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5df5da6d2f4cd542296e43590bbbcdcf0
SHA161ffdec9a486d7be7da6605eb5ef40f7426402a8
SHA256848365e4d9ef13388301ce03406506c5f71bb10f60e45c08f6d86d1b0739eda1
SHA5124f1a6e11c4146c6149372c7901f9a97fdadde96509dd93799c6f962a4b16392f92270db8cdd39ede78c697cc03f80a2469c55bc8a2d33b99a84e13e616c32df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a33cc7860ae26212d4d95ad13e60c9f
SHA10ab66493eddfdb383a94db8e867d258bfec94cd6
SHA25616e6ae22e4e3b45b4236797fdbaea0f8dc18d4aafc0d85df66ff5b0cd89ef32c
SHA512161540efa66129c9377c2c181235505eda940e988adf795365075165fe68891495d443b2f33d23fa5d92fc85d159e328cb38b5c724fc4c217a8f33582dbd8930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfab926ad11397dc094404d9884111df
SHA1685bd7cf6047458f6f28ab8a81ed5b44114e11e6
SHA256da3d3f1503050e716dcc1905da30fd36199daffb2f1c9a6e243f64cbd3a3f3e3
SHA512206156564c2893699adb6d34acf99a0aca5f86abd0130797684c2120352d9ce01dbcd9f4403c917e249e16c003d03543dd5f83132856888b7515fba08282354a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56879d3b1fea8029d2add46dd0721b16c
SHA177e9325c84ef2b2bc67dc7adfff93f159d5a9fbb
SHA256c276eda62ee7d06f7d1a13edc0f3daa5ebc3fda76aab375eb59e5d36275e3f94
SHA5120dd8de854be07294b06734278631798547a8a2638e32bceacd4b86a7d3eacd91b4f14400381156c08836fa4c34b5c57c546a44da012840df95044c85a2b0aa45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3c04d75d2ce1e2be9a1ae3e4fcdb34
SHA1707c4e1d71bccf538f191896ab859f04ca6b92bc
SHA256dce44f75096aee2387592247b84566d13ef74a53db85af60891e23f9ffbac0a2
SHA5128050a7843fda6a990f51f0c45b3101e341846495efdc6fbc1c209d2d1a8ecb38d1b9f378ce489f5f25f86125ca9376f8941484a076a656c247efccd5b632f543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e16707347cf1deac97ffc7dd485bd24
SHA130c85e46ecd6426a42cc9f28cd64da3b43134270
SHA25643ee0cbc3bdcc939f523ed57a009c1c3871f2072601dd7db0ae6099d047f87c6
SHA512df37523dfe3618a86415c90f68bee56fc9fa63d844c2deeb5925628b49c0b67b7aff4c87677d7d68459aa30c828c0f38b73f205f7641aa304d0f72e2e93073c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4037923a7b8cc98ba0ac933e156fcfe
SHA1553930906f442da0e4f7e10c4a4b03859d3bf13d
SHA256bc4439a23837d31cd24b718b112e95a366d6240755ff1194a56a632f6064af3b
SHA512f04d8cd3f8bb5ab7b045b2be6b4442a349e2968b29b8db1ef15fde21a274a2adc108fe4a65af2c3507d9f7634338c5360ddd5514fb22bc454bb8723f639519cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aead0af1e07270ed6a7c3c2348f8de72
SHA161c3cbd51e891fa64d02cb23503f887898e28ece
SHA25683aad3b16476950f7be7fb6d2821e54829b3646fae85868f1a187e5b5998d34c
SHA5128f278f922e49d590369677e66e9c4cff19747cb1f882dbe025b56e8495f0c9422da71f9608229e6ed04229301e2db7f5f15f0b0e463150cc8a62c7b869c69ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef41d58ce8f4222e94635a7d3e6210a2
SHA189dd6f33ffbf57b5f2de32ab511ae3f635279ef7
SHA2567535083efffaff804a3e41b8c7c035dc5c6c8213ab17400b3094f3ccb8000dd9
SHA5124d76035fb438475ffa21a24873b61718a926468b66b4da83b5a852907c71c7b793551585a09522ee853704aea0b412413c05bb25e2d44815c8c65cecf58d643e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a35f0c44ce095c4dd2979228dafc76
SHA153503a7f901a87b4293b0d1e19b8093589b525b4
SHA256de93f98fc12b03ed788bc23f4c5f6cd95f7ec73ddb72b0236f5a68124d4ac66b
SHA512e0e76460b449a772896b7003329d70c5f4844f90baf9cc0940bc05a7b792df9cef63e6e1166bf47503c72b8bdfa1cd87196e4f6ab3a90ecbae66c58e36800add
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.4MB
MD57faffd2f546a9db305995ed1f59636fb
SHA1863a0fda13f71c4c8c16d7dd448dbbd931491863
SHA2563cb2d43c1845ebc7edace2a36b05f84ce4dfaa55a6e45c0d6597920bca80dcc2
SHA512448dabf77e165ff5313017223bfb90ee31d5b57a2863c460dd13b47ccc2b21dc121f348eb9206feb95803e4b02bddf971e29cc1831d8140f612409d540131485