Analysis
-
max time kernel
187s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/06/2022, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
Resource
win10v2004-20220414-en
General
-
Target
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
-
Size
340KB
-
MD5
6bcc066e2a81f34c7e052895001f44c6
-
SHA1
6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
-
SHA256
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
-
SHA512
b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\Recovery+lmsfv.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/223AC7FFAFCAB4E3
http://tes543berda73i48fsdfsd.keratadze.at/223AC7FFAFCAB4E3
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/223AC7FFAFCAB4E3
http://xlowfznrg4wf7dli.ONION/223AC7FFAFCAB4E3
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1980 kayabeoyswlm.exe 860 kayabeoyswlm.exe -
Deletes itself 1 IoCs
pid Process 692 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run kayabeoyswlm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\wghhbjomdjtp = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\kayabeoyswlm.exe\"" kayabeoyswlm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1324 set thread context of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1980 set thread context of 860 1980 kayabeoyswlm.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\History.txt kayabeoyswlm.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\kayabeoyswlm.exe 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe File opened for modification C:\Windows\kayabeoyswlm.exe 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe 860 kayabeoyswlm.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe Token: SeDebugPrivilege 860 kayabeoyswlm.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe Token: SeSystemtimePrivilege 1684 WMIC.exe Token: SeProfSingleProcessPrivilege 1684 WMIC.exe Token: SeIncBasePriorityPrivilege 1684 WMIC.exe Token: SeCreatePagefilePrivilege 1684 WMIC.exe Token: SeBackupPrivilege 1684 WMIC.exe Token: SeRestorePrivilege 1684 WMIC.exe Token: SeShutdownPrivilege 1684 WMIC.exe Token: SeDebugPrivilege 1684 WMIC.exe Token: SeSystemEnvironmentPrivilege 1684 WMIC.exe Token: SeRemoteShutdownPrivilege 1684 WMIC.exe Token: SeUndockPrivilege 1684 WMIC.exe Token: SeManageVolumePrivilege 1684 WMIC.exe Token: 33 1684 WMIC.exe Token: 34 1684 WMIC.exe Token: 35 1684 WMIC.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe Token: SeSystemtimePrivilege 1684 WMIC.exe Token: SeProfSingleProcessPrivilege 1684 WMIC.exe Token: SeIncBasePriorityPrivilege 1684 WMIC.exe Token: SeCreatePagefilePrivilege 1684 WMIC.exe Token: SeBackupPrivilege 1684 WMIC.exe Token: SeRestorePrivilege 1684 WMIC.exe Token: SeShutdownPrivilege 1684 WMIC.exe Token: SeDebugPrivilege 1684 WMIC.exe Token: SeSystemEnvironmentPrivilege 1684 WMIC.exe Token: SeRemoteShutdownPrivilege 1684 WMIC.exe Token: SeUndockPrivilege 1684 WMIC.exe Token: SeManageVolumePrivilege 1684 WMIC.exe Token: 33 1684 WMIC.exe Token: 34 1684 WMIC.exe Token: 35 1684 WMIC.exe Token: SeBackupPrivilege 572 vssvc.exe Token: SeRestorePrivilege 572 vssvc.exe Token: SeAuditPrivilege 572 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 1324 wrote to memory of 2044 1324 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 27 PID 2044 wrote to memory of 1980 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 28 PID 2044 wrote to memory of 1980 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 28 PID 2044 wrote to memory of 1980 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 28 PID 2044 wrote to memory of 1980 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 28 PID 2044 wrote to memory of 692 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 29 PID 2044 wrote to memory of 692 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 29 PID 2044 wrote to memory of 692 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 29 PID 2044 wrote to memory of 692 2044 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 29 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 1980 wrote to memory of 860 1980 kayabeoyswlm.exe 31 PID 860 wrote to memory of 1684 860 kayabeoyswlm.exe 32 PID 860 wrote to memory of 1684 860 kayabeoyswlm.exe 32 PID 860 wrote to memory of 1684 860 kayabeoyswlm.exe 32 PID 860 wrote to memory of 1684 860 kayabeoyswlm.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kayabeoyswlm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" kayabeoyswlm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\kayabeoyswlm.exeC:\Windows\kayabeoyswlm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\kayabeoyswlm.exeC:\Windows\kayabeoyswlm.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:860 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\39A709~1.EXE3⤵
- Deletes itself
PID:692
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c