Analysis
-
max time kernel
171s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19/06/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
Resource
win10v2004-20220414-en
General
-
Target
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
-
Size
344KB
-
MD5
09824e2affd2a72f2dd030ed4e7dae15
-
SHA1
33a6b92cd5dce872e24723372d4e49396ea7fd1b
-
SHA256
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
-
SHA512
e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\Recovery+oewfp.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/97A646C491597319
http://tes543berda73i48fsdfsd.keratadze.at/97A646C491597319
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/97A646C491597319
http://xlowfznrg4wf7dli.ONION/97A646C491597319
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1248 juegxsqltthy.exe 1064 juegxsqltthy.exe -
Deletes itself 1 IoCs
pid Process 592 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run juegxsqltthy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\rfvyhetubsek = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\juegxsqltthy.exe\"" juegxsqltthy.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 876 set thread context of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 1248 set thread context of 1064 1248 juegxsqltthy.exe 31 -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\History.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt juegxsqltthy.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt juegxsqltthy.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\juegxsqltthy.exe 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe File opened for modification C:\Windows\juegxsqltthy.exe 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe 1064 juegxsqltthy.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe Token: SeDebugPrivilege 1064 juegxsqltthy.exe Token: SeIncreaseQuotaPrivilege 1700 WMIC.exe Token: SeSecurityPrivilege 1700 WMIC.exe Token: SeTakeOwnershipPrivilege 1700 WMIC.exe Token: SeLoadDriverPrivilege 1700 WMIC.exe Token: SeSystemProfilePrivilege 1700 WMIC.exe Token: SeSystemtimePrivilege 1700 WMIC.exe Token: SeProfSingleProcessPrivilege 1700 WMIC.exe Token: SeIncBasePriorityPrivilege 1700 WMIC.exe Token: SeCreatePagefilePrivilege 1700 WMIC.exe Token: SeBackupPrivilege 1700 WMIC.exe Token: SeRestorePrivilege 1700 WMIC.exe Token: SeShutdownPrivilege 1700 WMIC.exe Token: SeDebugPrivilege 1700 WMIC.exe Token: SeSystemEnvironmentPrivilege 1700 WMIC.exe Token: SeRemoteShutdownPrivilege 1700 WMIC.exe Token: SeUndockPrivilege 1700 WMIC.exe Token: SeManageVolumePrivilege 1700 WMIC.exe Token: 33 1700 WMIC.exe Token: 34 1700 WMIC.exe Token: 35 1700 WMIC.exe Token: SeIncreaseQuotaPrivilege 1700 WMIC.exe Token: SeSecurityPrivilege 1700 WMIC.exe Token: SeTakeOwnershipPrivilege 1700 WMIC.exe Token: SeLoadDriverPrivilege 1700 WMIC.exe Token: SeSystemProfilePrivilege 1700 WMIC.exe Token: SeSystemtimePrivilege 1700 WMIC.exe Token: SeProfSingleProcessPrivilege 1700 WMIC.exe Token: SeIncBasePriorityPrivilege 1700 WMIC.exe Token: SeCreatePagefilePrivilege 1700 WMIC.exe Token: SeBackupPrivilege 1700 WMIC.exe Token: SeRestorePrivilege 1700 WMIC.exe Token: SeShutdownPrivilege 1700 WMIC.exe Token: SeDebugPrivilege 1700 WMIC.exe Token: SeSystemEnvironmentPrivilege 1700 WMIC.exe Token: SeRemoteShutdownPrivilege 1700 WMIC.exe Token: SeUndockPrivilege 1700 WMIC.exe Token: SeManageVolumePrivilege 1700 WMIC.exe Token: 33 1700 WMIC.exe Token: 34 1700 WMIC.exe Token: 35 1700 WMIC.exe Token: SeBackupPrivilege 1428 vssvc.exe Token: SeRestorePrivilege 1428 vssvc.exe Token: SeAuditPrivilege 1428 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 876 wrote to memory of 964 876 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 27 PID 964 wrote to memory of 1248 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 28 PID 964 wrote to memory of 1248 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 28 PID 964 wrote to memory of 1248 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 28 PID 964 wrote to memory of 1248 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 28 PID 964 wrote to memory of 592 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 29 PID 964 wrote to memory of 592 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 29 PID 964 wrote to memory of 592 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 29 PID 964 wrote to memory of 592 964 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 29 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1248 wrote to memory of 1064 1248 juegxsqltthy.exe 31 PID 1064 wrote to memory of 1700 1064 juegxsqltthy.exe 32 PID 1064 wrote to memory of 1700 1064 juegxsqltthy.exe 32 PID 1064 wrote to memory of 1700 1064 juegxsqltthy.exe 32 PID 1064 wrote to memory of 1700 1064 juegxsqltthy.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System juegxsqltthy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" juegxsqltthy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\juegxsqltthy.exeC:\Windows\juegxsqltthy.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\juegxsqltthy.exeC:\Windows\juegxsqltthy.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1064 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\34EB8F~1.EXE3⤵
- Deletes itself
PID:592
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b