Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe
-
Size
142KB
-
MD5
1c2428365c1bcf5ea170a949a75a4e7e
-
SHA1
207b67aa344875ae4cf2e660dc0c55e8e6179f47
-
SHA256
1b0528fcbbc8476784150df855cdb2410fbc08ca825accf1622160c5900523be
-
SHA512
73d97bd231adc1075c7320071bb848ee1b009fd99beed78d4194d3f06e80bb26792d7722bcd828823cc3a7302b5e39f6c0c69f434b2ee2c02aec8d2c44ce03fa
-
SSDEEP
3072:bok+l9BrtPYPsZjRGRgVmJdfxT+pkJAKnecZeuv0v:bok+l5BZRGRBJ1xT2kJ7ecg1v
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\TileWallpaper = "0" 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\WallpaperStyle = "0" 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 2576 msedge.exe 2576 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 2576 3984 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe 97 PID 3984 wrote to memory of 2576 3984 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe 97 PID 2576 wrote to memory of 2600 2576 msedge.exe 98 PID 2576 wrote to memory of 2600 2576 msedge.exe 98 PID 3984 wrote to memory of 4936 3984 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe 99 PID 3984 wrote to memory of 4936 3984 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe 99 PID 3984 wrote to memory of 4936 3984 2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe 99 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 2304 2576 msedge.exe 101 PID 2576 wrote to memory of 5012 2576 msedge.exe 102 PID 2576 wrote to memory of 5012 2576 msedge.exe 102 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103 PID 2576 wrote to memory of 1168 2576 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff985a146f8,0x7ff985a14708,0x7ff985a147183⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:23⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:83⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:13⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:83⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:13⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:13⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:13⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,16829681998965047670,16375149944104864427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵PID:512
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD5dea4a7fe023adfde32f3606d79f58dcf
SHA130e3bb7ccc062ea40f669edbaee1deb2a82022c4
SHA2562e52fe9ed85c2d228cfb87b4dd95a1430aa7010dec8387337e86331fbf3d2c17
SHA512b04b91741224f3051fb19a450c1a4ae378186ccda0e194530f6bfa49591509fe5dbd10f19b3d348490b8dc53ee95752cda7cfb59e1eae9b61f62793c2a5e3bfc
-
Filesize
6KB
MD50917e8a7944bf6fe59664df06e1e089c
SHA1ccf82770832292e763701b0515a5d7c5effa736c
SHA2562c440bce821c6726f397a33fc0e354a5d9bc60d98d84a22c6c066258185b4e3a
SHA512df62a092c8b4bb25519bcaa09ed1602dbd0e7f39cdbc34506c200914bef95fb937ba689d1938e44807ce05161dbbd6f2f216774146d97981ce08a3b09f9670e8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ca6a0b66a6cd36108682f103c246054a
SHA1a9adbd68a7e5946f154851733ca4876c34414db8
SHA25669f9f1366c661a090c4825a9e052e9d5bc6213e17e9601aa71b03f7f7a3f2289
SHA512ccbdee764f56c6153e4111bb322a2dd8caaa3553b0d988fdea0f843fdf35c1976870e1ebc54c5fa08eed78958e6fbbb67f177287f28a3c575c8b6127910a7db5
-
Filesize
8KB
MD53e2f1163c58dfa7160b884b1e3f13d48
SHA15901a91d0cc2ccb17092e78b5df63625f3dc19c1
SHA2563c3702a0c9009bd21cb72a6380e84e6fc3816468d41c2cbe6ecd4564baf0a6d4
SHA512ac969a30e0659c98a95bdf711b4cf89dc18a1621faa1fd1215ea446a91c55c880e742a062b56d970b5a7157779562817034c928f1417b9958ab66186970df50e