Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
19-06-2020 09:55
Static task
static1
Behavioral task
behavioral1
Sample
1e287a45c732a13d06d635e1989b8cb0.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
1e287a45c732a13d06d635e1989b8cb0.exe
Resource
win10
General
-
Target
1e287a45c732a13d06d635e1989b8cb0.exe
-
Size
1.5MB
-
MD5
1e287a45c732a13d06d635e1989b8cb0
-
SHA1
6787c99908639ee40c29aae2047ddae75fb51550
-
SHA256
8dd8593366530bd2c626de06da3b3833e6256a5b67558ae9da44312d2f48cec6
-
SHA512
42c01c15fac390356031e1afb47e99de2b53172e2ffc25012a0309921421d7f748962bff3946782ca1e04b408d10c1d2d659357ea8b07d5d8aa3779de7e38460
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 1e287a45c732a13d06d635e1989b8cb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 1e287a45c732a13d06d635e1989b8cb0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1648 vssadmin.exe 1956 vssadmin.exe 1872 vssadmin.exe -
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1648 1312 1e287a45c732a13d06d635e1989b8cb0.exe 28 PID 1312 wrote to memory of 1648 1312 1e287a45c732a13d06d635e1989b8cb0.exe 28 PID 1312 wrote to memory of 1648 1312 1e287a45c732a13d06d635e1989b8cb0.exe 28 PID 1312 wrote to memory of 1648 1312 1e287a45c732a13d06d635e1989b8cb0.exe 28 PID 1312 wrote to memory of 1956 1312 1e287a45c732a13d06d635e1989b8cb0.exe 32 PID 1312 wrote to memory of 1956 1312 1e287a45c732a13d06d635e1989b8cb0.exe 32 PID 1312 wrote to memory of 1956 1312 1e287a45c732a13d06d635e1989b8cb0.exe 32 PID 1312 wrote to memory of 1956 1312 1e287a45c732a13d06d635e1989b8cb0.exe 32 PID 1312 wrote to memory of 1872 1312 1e287a45c732a13d06d635e1989b8cb0.exe 34 PID 1312 wrote to memory of 1872 1312 1e287a45c732a13d06d635e1989b8cb0.exe 34 PID 1312 wrote to memory of 1872 1312 1e287a45c732a13d06d635e1989b8cb0.exe 34 PID 1312 wrote to memory of 1872 1312 1e287a45c732a13d06d635e1989b8cb0.exe 34 PID 1312 wrote to memory of 1980 1312 1e287a45c732a13d06d635e1989b8cb0.exe 36 PID 1312 wrote to memory of 1980 1312 1e287a45c732a13d06d635e1989b8cb0.exe 36 PID 1312 wrote to memory of 1980 1312 1e287a45c732a13d06d635e1989b8cb0.exe 36 PID 1312 wrote to memory of 1980 1312 1e287a45c732a13d06d635e1989b8cb0.exe 36 PID 1980 wrote to memory of 1056 1980 cmd.exe 38 PID 1980 wrote to memory of 1056 1980 cmd.exe 38 PID 1980 wrote to memory of 1056 1980 cmd.exe 38 PID 1980 wrote to memory of 1056 1980 cmd.exe 38 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1560 vssvc.exe Token: SeRestorePrivilege 1560 vssvc.exe Token: SeAuditPrivilege 1560 vssvc.exe -
UPX packed file 1 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral1/memory/1312-0-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Checks for installed software on the system 1 TTPs 29 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1312 1e287a45c732a13d06d635e1989b8cb0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1312 1e287a45c732a13d06d635e1989b8cb0.exe 1312 1e287a45c732a13d06d635e1989b8cb0.exe -
js 1 IoCs
resource yara_rule behavioral1/memory/1312-0-0x0000000000400000-0x0000000000608000-memory.dmp js -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e287a45c732a13d06d635e1989b8cb0.exe"C:\Users\Admin\AppData\Local\Temp\1e287a45c732a13d06d635e1989b8cb0.exe"1⤵
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
- Suspicious use of UnmapMainImage
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1648
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1956
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:1056
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:1560