Malware Analysis Report

2025-01-02 14:20

Sample ID 220524-n4xvbshcg6
Target 00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a
SHA256 00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a
Tags
troldesh discovery persistence ransomware trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a

Threat Level: Known bad

The file 00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a was found to be: Known bad.

Malicious Activity Summary

troldesh discovery persistence ransomware trojan upx

Troldesh, Shade, Encoder.858

UPX packed file

Checks installed software on the system

Adds Run key to start application

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of UnmapMainImage

Interacts with shadow copies

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-24 11:57

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-24 11:57

Reported

2022-05-24 12:00

Platform

win7-20220414-en

Max time kernel

30s

Max time network

30s

Command Line

"C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe

"C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe"

Network

Country Destination Domain Proto
DE 131.188.40.189:443 tcp
N/A 127.0.0.1:49163 tcp
N/A 86.59.21.38:443 tcp
N/A 185.163.204.206:9001 tcp
N/A 54.38.92.43:9001 tcp
N/A 185.149.207.66:9001 tcp

Files

memory/1664-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

memory/1664-55-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1664-56-0x0000000001EC0000-0x0000000001F95000-memory.dmp

memory/1664-57-0x0000000000400000-0x0000000000608000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-24 11:57

Reported

2022-05-24 12:00

Platform

win10v2004-20220414-en

Max time kernel

151s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe

"C:\Users\Admin\AppData\Local\Temp\00d3eb37f0b5f7dfbd86a87832aedec87426a4a2b089c8530eac5aa9f028974a.exe"

C:\Windows\system32\vssadmin.exe

C:\Windows\system32\vssadmin.exe List Shadows

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

Network

Country Destination Domain Proto
US 52.182.141.63:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
N/A 127.0.0.1:49753 tcp
DE 193.23.244.244:443 tcp
US 208.83.223.34:80 tcp
US 128.31.0.39:9101 tcp
FR 188.165.26.89:80 tcp
SE 178.132.78.148:443 tcp
FR 145.239.66.236:9001 tcp
N/A 127.0.0.1:22068 tcp
N/A 127.0.0.1:22068 tcp
N/A 127.0.0.1:22068 tcp
N/A 127.0.0.1:22068 tcp
N/A 127.0.0.1:22068 tcp

Files

memory/3036-130-0x00000000022D0000-0x00000000023A5000-memory.dmp

memory/3036-131-0x0000000000400000-0x0000000000608000-memory.dmp

memory/3036-132-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4544-133-0x0000000000000000-mapping.dmp