Analysis
-
max time kernel
81s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
Akt1809.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Akt1809.scr
Resource
win10v2004-20220414-en
General
-
Target
Akt1809.scr
-
Size
1.4MB
-
MD5
5d0e88d6b050cb55e79ebce600921ebd
-
SHA1
9ef793bb1d4152cf6b061301c80b8c2bd747e59b
-
SHA256
c2c8da21d472f2ef59895e6ebb5d610381040f1553e263aadd9b9232e0038a26
-
SHA512
9fe52094d3e038691c993357d72db9d2279fddc2106753a36f7b5ffec8c9d016292e4c961ffe0bfc3ced777dfbde9d094dca3325595580e9dc92ae6fd8516ef4
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral1/memory/388-56-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/388-58-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/388-59-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/388-60-0x0000000000400000-0x0000000000611000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Akt1809.scr Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Akt1809.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Akt1809.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr 388 Akt1809.scr -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 388 Akt1809.scr 388 Akt1809.scr