Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b.dll
Resource
win10v2004-20250217-en
General
-
Target
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b.dll
-
Size
159KB
-
MD5
7932ee5fa6f83b149569752c47e04b87
-
SHA1
6eb115feadc5808507fb5a666dd18aa89a45616c
-
SHA256
f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b
-
SHA512
17ba26e69f7536f5adaa52454fbd407338be61d97bc396baa591de9fa19aab3e539b4ca32059b2ddb1b901ac7ecd341dff9ead706fc0d058086e6b3795642f58
-
SSDEEP
3072:pusrpo1j49JvKa0ePbh37E6ZO78buZKxrF:ZQcvKpE37E6nmKhF
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 25 3816 rundll32.exe 34 3816 rundll32.exe 48 3816 rundll32.exe 49 3816 rundll32.exe 56 3816 rundll32.exe 57 3816 rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\Desktop\TileWallpaper = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\Desktop\WallpaperStyle = "0" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 620 msedge.exe 620 msedge.exe 2488 msedge.exe 2488 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3816 1480 rundll32.exe 86 PID 1480 wrote to memory of 3816 1480 rundll32.exe 86 PID 1480 wrote to memory of 3816 1480 rundll32.exe 86 PID 3816 wrote to memory of 2488 3816 rundll32.exe 100 PID 3816 wrote to memory of 2488 3816 rundll32.exe 100 PID 2488 wrote to memory of 2000 2488 msedge.exe 101 PID 2488 wrote to memory of 2000 2488 msedge.exe 101 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 3548 2488 msedge.exe 102 PID 2488 wrote to memory of 620 2488 msedge.exe 103 PID 2488 wrote to memory of 620 2488 msedge.exe 103 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104 PID 2488 wrote to memory of 1168 2488 msedge.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f329ea2c754ab196d15c20fbf9abd722fa63630631144c5a409bd2a20172196b.dll,#12⤵
- Blocklisted process makes network request
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd71a046f8,0x7ffd71a04708,0x7ffd71a047184⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:84⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:14⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:14⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:14⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:14⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:14⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9276660524825219031,136883551129848597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:14⤵PID:212
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
5KB
MD5b7036a500e6da9d871951eccc0bc21fe
SHA1a5ee8dd6052fe22c576fcdd742bfd77dea0c95bf
SHA256dafe9d6c0728fd8b84be84cf6883639ef2f81bab27a79173a5caa060619685b3
SHA5128990cf936a3a44a95e5a491a0e780a6773f9f740d25d4aaef06b48f35e907fe3011a3e9a4209f7f65d168ac4558c864c165560da5c8ed7360cb15ffeae458802
-
Filesize
6KB
MD521318cc90b1f8d1c8042b8616a923812
SHA1ccc1c77b361b228533bd72e59218f8f2d5485fe6
SHA2567bb1b54a0e73643e8c5b270380810bb5eeb3a73ea56952edbe15685b89ec68a9
SHA512c9adb016ee7e6ac96c72975902d1593a73c962d69eab40b1cf7f4369b5e3541006cf319b150fab5698a5dca667a0115cd549cdc3de722b5495d94c32f18af97c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52709cfc4a346b8d225eb39ff1a7e187a
SHA1bc8e0f2975f03b00fac84cb7066e1a60d4553165
SHA25691fb6cc2ada987443aa0d521fe635b052aee2ff1b67cbdde0ee2d9b5f73415be
SHA512bc423c0834672d314fd09e720a8b35d39382c393d858552352ef64ea4010a45399fc3fb34996e4ffcf7271886077ee8afa96eab940acc14eaf62ca6a68c2df61
-
Filesize
8KB
MD5f2b0d918319d554ec5ec1e3311b1fe7c
SHA1ef5c210abab29015eb702728245eb1b5cd5c1b7f
SHA25625f41566ba5200d4a8abc5a2792bc1f8c3cc5cde6979b1cc5e015b51fd75bf98
SHA51294a7649b04ce35abe8f49b7f0906fe811205bdfd1af09787acc4568a24dd120415ea6facb84c5606b3a7918525ee26782e8475c19a6dac4eb89db85d4c70a293