Analysis

  • max time kernel
    64s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-05-2022 17:54

General

  • Target

    01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7.exe

  • Size

    384KB

  • MD5

    380623574a4955f0cc60f397669f9461

  • SHA1

    39c1bfffe33b24053c54f66620a68b494d8a9d0e

  • SHA256

    01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7

  • SHA512

    d74ba7671937c9703b077765c3cfdda1b294227a227f4d6df5dc69dd60966c67c7a766b018ab58203003cb462c522475693d061f7ec0d1b5db3a2fc29418d2f4

Malware Config

Signatures

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

    suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7.exe
    "C:\Users\Admin\AppData\Local\Temp\01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7.exe
      "C:\Users\Admin\AppData\Local\Temp\01ceb3445a65c9eff5fcc0e559ee8616a59c9c0f8fa4576cf51103ce28cbd7a7.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\tasbjkloxbjw.exe
        C:\Windows\tasbjkloxbjw.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\Windows\tasbjkloxbjw.exe
          C:\Windows\tasbjkloxbjw.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:4364
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
              PID:1452
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\01CEB3~1.EXE
          3⤵
            PID:4320
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:1332

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        File Deletion

        1
        T1107

        Modify Registry

        2
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Impact

        Inhibit System Recovery

        1
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\tasbjkloxbjw.exe
          Filesize

          242KB

          MD5

          64835a3265f9fa9b5e05e3a82affda2e

          SHA1

          2a2d8415d53492a7ed3b5a68bdbbe87e2cbd8c92

          SHA256

          942bc329b40ae00a8e3f93868454cc51625bbdaab0fc60b8c3251aa27f67ca6b

          SHA512

          9eb80b4228453dc3b2e2bd73abe68884a01f5fdddb9a3ea30a9cbe18fc00cdefaed250e18999a55e752aabbf9acc52163a708009bee71240e742c2e7872a3903

        • C:\Windows\tasbjkloxbjw.exe
          Filesize

          175KB

          MD5

          08cdbc2309d647ed2f9342610e2ffbe1

          SHA1

          f5452434f7f54fdcaefed64c07bf00b860a9986a

          SHA256

          87ca3e761a99cb161b8fed118f295cc242f890d53c90a27d5f457861b9de3538

          SHA512

          ba7b39248d5197a8b8cc2ad71ff77a5a60cc79a8c42d444b1fc1dd719bd2ac87b943b93192130d19ae31b921159e92b8054f040129062b25769bb7875299426b

        • C:\Windows\tasbjkloxbjw.exe
          Filesize

          169KB

          MD5

          4a16a89ccd45867dae7834c0fea35add

          SHA1

          703e69acd91e2a7a023f2e5759df17a974d46dc3

          SHA256

          5f3957fd03a562dd2b41002752c8c7eae6a8cbce186843bdf3f7759403b3d37e

          SHA512

          14020b7709af86cd8ffe0cad50cb651c160acad0141c69b7506d7763f45840be5eb8068ca8ef966b7f38a391fe420f919ece1322e2693c768b05eba80174fccc

        • memory/1452-146-0x0000000000000000-mapping.dmp
        • memory/1708-130-0x0000000002880000-0x0000000002883000-memory.dmp
          Filesize

          12KB

        • memory/3876-135-0x0000000000000000-mapping.dmp
        • memory/4136-139-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4136-132-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4136-133-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4136-134-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4136-131-0x0000000000000000-mapping.dmp
        • memory/4320-138-0x0000000000000000-mapping.dmp
        • memory/4364-140-0x0000000000000000-mapping.dmp
        • memory/4364-144-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4364-143-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB

        • memory/4364-145-0x0000000000400000-0x0000000000486000-memory.dmp
          Filesize

          536KB