Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b2.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b2.dll
Resource
win10v2004-20250217-en
General
-
Target
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b2.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 23 3736 rundll32.exe 29 3736 rundll32.exe 30 3736 rundll32.exe 57 3736 rundll32.exe 64 3736 rundll32.exe 65 3736 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3932 identity_helper.exe 3932 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3736 3888 rundll32.exe 86 PID 3888 wrote to memory of 3736 3888 rundll32.exe 86 PID 3888 wrote to memory of 3736 3888 rundll32.exe 86 PID 3736 wrote to memory of 3696 3736 rundll32.exe 109 PID 3736 wrote to memory of 3696 3736 rundll32.exe 109 PID 3696 wrote to memory of 2264 3696 msedge.exe 110 PID 3696 wrote to memory of 2264 3696 msedge.exe 110 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 116 3696 msedge.exe 111 PID 3696 wrote to memory of 4608 3696 msedge.exe 112 PID 3696 wrote to memory of 4608 3696 msedge.exe 112 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113 PID 3696 wrote to memory of 3296 3696 msedge.exe 113
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b2.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab9d046f8,0x7ffab9d04708,0x7ffab9d047184⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:24⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:84⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:84⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:14⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:14⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:14⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7170592723653645149,8432206239418372223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:14⤵PID:1808
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59f4a0b24e1ad3a25fc9435eb63195e60
SHA1052b5a37605d7e0e27d8b47bf162a000850196cd
SHA2567d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb
SHA51270897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284
-
Filesize
152B
MD54c9b7e612ef21ee665c70534d72524b0
SHA1e76e22880ffa7d643933bf09544ceb23573d5add
SHA256a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e
SHA512e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88
-
Filesize
5KB
MD5df6fdffb617097cae5b24554af01ee81
SHA146eb91a1eb6f116bdcfd253d5b9a2611f98621b0
SHA256a17ff593eccef159880797a853e48d739b84fcd127a42b88904aa58ec0eb2028
SHA51226e350b303fb9db5f1acd94d28593ddeebbb99132fc767c55cca49483c277c120a1e7023bb588f899269f548d5f6dea8d8623287b7a516b252b58d57b01ae03b
-
Filesize
6KB
MD50a9f34cfe666d51aa4747c15de994fac
SHA19c7cd0c97205a9d547ca3d144f77c9ba8bc73380
SHA256a4207cda676f83b9c37f801e611f6f0d1d54851239f60efb314b1f3d8b04ce1a
SHA512534d16546ddfd0dff3d4212023235efbdbe875f729bda19b692509ac7c7b5a418c484b761de2959be2f246d83fd26cc82c38ac091d961ffe8994497780e70e49
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD507843011fdd736d823ed6cffa52062c6
SHA13261c98e658510e658ecf78bc26dae0e56c64d13
SHA25661ead0099c615cbe730c9041f216cfb86981e6915b4124a165aecc65446e26ad
SHA51238082d8aad9fe11c3998175f0d6ad85225b45902138a58dc23d4cbc840aedbf1c9cd2445f85cf96e3f2d906708d14b6d40b1f23f11fdc61285b15df5c46be65d
-
Filesize
8KB
MD5b4d0dbe652ab135e237d4cdad2b4f10a
SHA1b118e0c1f9f367b9e47e3c0c42a5bd53db99dba6
SHA2566e82a517bc5997722742c85783bf97038ea8f097a79db7e313649ef8024d8c7d
SHA5123a5a0adcc930e1c7d26ce6f775db301455547bc4f80d1e6b5c48cbc3e3b1027684a24d5d7980b4d52a8f60b188f370f93d50f08dded74cc41aa11c26e212d6a1