Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
Akt1809.scr
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Akt1809.scr
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Akt1809.scr
-
Size
1.4MB
-
MD5
5d0e88d6b050cb55e79ebce600921ebd
-
SHA1
9ef793bb1d4152cf6b061301c80b8c2bd747e59b
-
SHA256
c2c8da21d472f2ef59895e6ebb5d610381040f1553e263aadd9b9232e0038a26
-
SHA512
9fe52094d3e038691c993357d72db9d2279fddc2106753a36f7b5ffec8c9d016292e4c961ffe0bfc3ced777dfbde9d094dca3325595580e9dc92ae6fd8516ef4
Score
10/10
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral2/memory/2912-131-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2912-133-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2912-134-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2912-136-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2912-137-0x0000000000400000-0x0000000000611000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Akt1809.scr Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Akt1809.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr 2912 Akt1809.scr -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2912 Akt1809.scr 2912 Akt1809.scr