Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
sample01_deob.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample01_deob.dll
Resource
win10v2004-20240802-en
General
-
Target
sample01_deob.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 16 976 rundll32.exe 27 976 rundll32.exe 41 976 rundll32.exe 42 976 rundll32.exe 47 976 rundll32.exe 48 976 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 924 msedge.exe 924 msedge.exe 4408 msedge.exe 4408 msedge.exe 4580 identity_helper.exe 4580 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 976 1084 rundll32.exe 82 PID 1084 wrote to memory of 976 1084 rundll32.exe 82 PID 1084 wrote to memory of 976 1084 rundll32.exe 82 PID 976 wrote to memory of 4408 976 rundll32.exe 93 PID 976 wrote to memory of 4408 976 rundll32.exe 93 PID 4408 wrote to memory of 4880 4408 msedge.exe 94 PID 4408 wrote to memory of 4880 4408 msedge.exe 94 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 4936 4408 msedge.exe 95 PID 4408 wrote to memory of 924 4408 msedge.exe 96 PID 4408 wrote to memory of 924 4408 msedge.exe 96 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97 PID 4408 wrote to memory of 4180 4408 msedge.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample01_deob.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\sample01_deob.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4bb146f8,0x7fff4bb14708,0x7fff4bb147184⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:24⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:84⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:14⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:14⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:84⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:14⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:14⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:14⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17130913724928754037,814782368592215359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:14⤵PID:3544
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
5KB
MD52a69408974991f8512d202cb2888b8bb
SHA124e83aac4e726697421e7138b5536a7acda9749d
SHA25690b861832b47766074b4cf87b52c9960b5226ad70874a0ee105c614729d77d89
SHA512d4ab0eb884d4c7918347e3b52d76bbd8db8fa55ad14ba22040a881785261ce4caaaa9f894f5e5e4a71ab564c14fec1967eee1d3432ff292b5976ae6228df06ac
-
Filesize
6KB
MD56fcfe136a4b21df51b4e33ba4c751ddb
SHA19da32c55917653839bead8a1e73b857b99ad2555
SHA256e2d845238fe57ff1b17d96e81f9b8a106fedcee45c583b250165c2e3cc82379c
SHA512268666ea0d51d3512eef605af839ca143586ebb7f53e56cc8008f8cb32c43cb7387a23ad73a3243e243d0f313039790e9dad6963541bf0e81a5267715316c60a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50396d89a0a38b7e7a76d2f5d175f5e37
SHA12982bc14094e077873f5328bc97bf5fd7cef790b
SHA25636fbc0939beb681c4dbb571e3479f5d51204a2633b73ac66e46a2bf422b477ba
SHA512b0bc5124b166ee6e8a9e3e3f227e39b8adbbb2281cf09c96d2a5c86cd7307575857d11a9b2cf270d7df5879d19e8b082d28d8552252e8b08d1be8d8433e42209
-
Filesize
8KB
MD575979f5f51412a5ca9dcb499a04ea898
SHA1afb01defac8d9013150f523f0d06adaba87c1ef4
SHA256c0fff43e56c4c21e03683b7693b739064f9b37cab7b1b19426f63f7c4c39dabc
SHA512753d36acf8ef75662bddec41f2ed7127880f4e615776e32d01f043a6a45f9090dbd7f946f74b461f8dba8570ca018c87dae143e24174cac6944248b3ffa9e206