Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
s1-d.bin.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
s1-d.bin.dll
Resource
win10v2004-20250217-en
General
-
Target
s1-d.bin.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 2612 rundll32.exe 3 2612 rundll32.exe 4 2612 rundll32.exe 5 2612 rundll32.exe 8 2612 rundll32.exe 9 2612 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a085abcca890db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c0ab75af7d31047a750e6e6739c3adf00000000020000000000106600000001000020000000b1c827a01727893f2cd441a3b34e32fb2e882a41f61dc857fc2d940017997e5f000000000e8000000002000020000000f4c6f46a12a93000dd2258f998feff3773b0fe329781018f6d15e4dd6e52a1ea20000000bf04497e6ab7a9b94577743415b7a00d113d998de895f07cc2b054aea4ac08db4000000012df545934514b47f700536b1227a60362dd14a3b0578ae250b0461a4a1e0d4371a9e8cc24627ca54678883e3ece8b37c599679538c4c456cf92c3261451b417 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8046A01-FC9B-11EF-9A80-6A3537B175DE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1744 iexplore.exe 2984 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2984 DllHost.exe 2984 DllHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2412 wrote to memory of 2612 2412 rundll32.exe 30 PID 2612 wrote to memory of 1744 2612 rundll32.exe 33 PID 2612 wrote to memory of 1744 2612 rundll32.exe 33 PID 2612 wrote to memory of 1744 2612 rundll32.exe 33 PID 2612 wrote to memory of 1744 2612 rundll32.exe 33 PID 1744 wrote to memory of 2952 1744 iexplore.exe 35 PID 1744 wrote to memory of 2952 1744 iexplore.exe 35 PID 1744 wrote to memory of 2952 1744 iexplore.exe 35 PID 1744 wrote to memory of 2952 1744 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\s1-d.bin.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5d5b2442e4f875ce44e84f74f6875d08f
SHA1d2de55195c69a4ad846735079ff17d1467d1bbe3
SHA2569cfb1d87fcfa698b80034c969c488348a5537e3f994312a327cc039a54afbcd2
SHA51228007358262c4e2329d212e3298d0c75c2d4aa8cd0ef95b20563e48a080ee3f8eb654f28bc699e7c1107392e6152a892dbee02e698b05e07f4585f943528d924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695f84554e3b5b134ae2aae08e3c384b
SHA18ca5d358c2182f78dd2f694ecbfa427591aea277
SHA2560139cbefe7dec9b1303a45064aeddf238726cc70669e39c3ea0f5591024ee5a6
SHA512775e45174617d6948de58fdd42287d17fde3fdcf28034b736085d730da4c334d24eb2623efcf793063a3ff02df742e7db2b4988d37d9811377a853af52d2f953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b6071375a2c68334a91d0fccee6500
SHA1b0b1d2e37b6ca060edace6d9c7bc765783b55d87
SHA25657f4dd7e6eeb9668e3298080039a7ef9b8940f82f41e634d40b054be3a2b46eb
SHA5121168f5c1e30d70cfeaf968807f5cbcb583f23bf288860332c8d1434bfde66fa8cf7e9c4ab8be15fe84dab4370ba191add4527a940fa82b00bb0741112babce09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c84b64257067a47f8b675cdd46ddfb
SHA176c250b15f8b80b3f58d1ca74504f1521ab8cc64
SHA2565b354d5c42614534915505e48696a14ce37a3ad85ba843e6ae47f66e2ca75743
SHA512131faead0b4a1ca3e8976d2e7bc72d39f15c242b267af6e64238b88769ced0861104f5973ee362e99e15c7f74251c3a8aa26a7f9a2e9261206ef272d0ea9c520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c46f872f9a3d4fc955e56ba4ea62b046
SHA160723c1087c4674f518b93ee6eeab24333b6513c
SHA2561869984ad92c049583edcb5ff09c8875cdb0b4ec02b9d3912aa681fff0bf20e1
SHA51235c25e37f700efa202b2b3a922ecafff5f1544925467090c13f686af3fe7385fe7ecd78991ad41edcc8d4722012355a93381b4e2f1b52a62098f09b91de617fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63d2ad12f0d72e7d6dcc7cbcc735475
SHA1acfeadf25358bc701849aac22ee2e79946ff62c4
SHA2560e30f5f9b1caf4a9aa82b6f5945724ea7bfa1383fd9658e72f712c7dfe82deec
SHA512380b00b8401d6eeae03ce81e2ea1ff3b3a6bf17951c5c0c8d98662e05fecba402740fb08a27350bfbb9f06e5ac77511afca8d0999edb6b0a90959bf8d5c2acf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512e8dcc852776a60756ed700fa727eb6
SHA1c9086cf9a2efd97fd7b97e0d2c437848bc51bb58
SHA2564ee256ac9d4178956bde30340d73c4606cae99721802e3bd08787e1088be6d2f
SHA512dc105d2575aa826c5a3dba06136e2d997790c5d97965a5af604aa67414302cee90b7b13936156103adc7300ede70105a79557f4f1c485af8e9dc737a137c62cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f2c2eee2673967a032332aaca49e30
SHA13791e55185a86a692080b3554772d19679f252b6
SHA256b7812b5869ec569daa36ad4ae7a9b69c0e717e628b5dd4037e8d015a42941ecd
SHA512c822e4daee70dff943ebad4f94138fc83b8fd2e880c572665edfa6933e019ae0553c5b5e8773c439b6c41a569e36791ec7fc1b2d7b547f23d2922ff239f05779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50855345955458b1be31b516cd9e56086
SHA1324cefca753053625b86d6752b7ddea432cc5b4f
SHA2563c82c87be42643645b5ae6bd8db10809356bd4087a1a4232d4e9baf07ff591ba
SHA512bb042a28ab8270de08f250ce6335ae77f820cad1d3f0dad5e99ab2343cb3d653178f9be6729b9e6e899cb7368e0c94c6b73d8dca0a212b9b824214d299460e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7e65d931cc7fda2db631e9e483ec002
SHA1f632fe983666c5e3f14e13b93f8846a3e0973ef8
SHA256e21766cfac410276fe37c0884c67aeb55e8257da04ed756a251be6ef667ed234
SHA512906a22dbd2e606866decc747295322921781a91a798a8e5dc6916df149221358c01ec948c56ac019a1b8a94e18af073718169ba83dc07c73865d8015116a4beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022e9c1c52b53305ba2fa656b2ddeae5
SHA13d3ca5b9a76b1160f0fe0c191e0cfc17d87d2dc2
SHA25650a19e22604a59666e947456fb3391dab254e16051891ae075cea4517666d0dc
SHA51289a064b7742149b1c4cdd0119f6e86a3405fc92b86fb718e94afd95d311f7953a98fcd6a2e8115acc50ca41df2f40ac3fa77c6d15f46deff228958551ca775bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588efcb4f340fd0068fcaca20b12e1a2c
SHA17309e3d12fd251014d79231745373d19b11b6ab7
SHA2563f6aca4c0257833a8b7fcb42190dc8d1b4b729e5a591d3607064a92ad5d017b0
SHA512c1a35221b35e6abc76861dceaa6861d64fee5a26ea68f7fe2ed91d0cbf9a262d2ae5b99821ebbd92539cbf504452d9e5200d929898b3f86875aa0b32c99a7880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db1e3faeef8718d3cae1e06cf2602eb
SHA1f0d90e9100c780d22a2d60a449a1383430c03eba
SHA256d3861cd22262545f81c29a244f82a4d7da866351371d1e4c127a853ba9403586
SHA5129d337d11d030ca8a6fc79f798ce1a1ab6946d0e2f66c4e2df94012769d0bf2714e0aac508835c234f4e36e7087957645ff1a9d3e338e6d9e271db190ba7e6619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf62c2501ab3ee1ad9a5c4bf28d955e3
SHA1a889640046c829acc7950fd65479b8c53602a337
SHA2560ec84da03d9dd41305bb333943207b81ae018afa8f72e611fb98178eb286b5ca
SHA512773d89874d312f7311d712c39f1d3f85eb595e84400a17e4fc38688b42b80f272c249cf869cbb5598997e0d438733cf041141014d50e67e8b0f79e3b81591818
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
3.4MB
MD5ff1454dfa452158266e8401a09fbcc58
SHA1e7e650df77b7e2b5da2d1b15c252ca16c779dca8
SHA2568ea46473697abf96b4b869d0eab9975e4f01f7f816437494f41442361473e24b
SHA512e1e0bbd40435bde522b66c4acfaa92470706f01eb01b235e79190f3d56b07ddf759ffc6aa010df0b1cd08629872509688a32b65be36a9d066efb3fee43ddfbde