Analysis
-
max time kernel
153s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25/06/2022, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
Resource
win10v2004-20220414-en
General
-
Target
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe
-
Size
340KB
-
MD5
6bcc066e2a81f34c7e052895001f44c6
-
SHA1
6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
-
SHA256
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
-
SHA512
b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\Recovery+mlgsw.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/1F2CB52EF3EE7DFC
http://tes543berda73i48fsdfsd.keratadze.at/1F2CB52EF3EE7DFC
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/1F2CB52EF3EE7DFC
http://xlowfznrg4wf7dli.ONION/1F2CB52EF3EE7DFC
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 5064 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation fvvpkuhyqihw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run fvvpkuhyqihw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sbaokmuvpxxo = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\fvvpkuhyqihw.exe\"" fvvpkuhyqihw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4932 set thread context of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 5064 set thread context of 4764 5064 fvvpkuhyqihw.exe 93 -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\hi.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt fvvpkuhyqihw.exe File opened for modification C:\Program Files\7-Zip\History.txt fvvpkuhyqihw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fvvpkuhyqihw.exe 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe File opened for modification C:\Windows\fvvpkuhyqihw.exe 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe 4764 fvvpkuhyqihw.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe Token: SeDebugPrivilege 4764 fvvpkuhyqihw.exe Token: SeIncreaseQuotaPrivilege 4748 WMIC.exe Token: SeSecurityPrivilege 4748 WMIC.exe Token: SeTakeOwnershipPrivilege 4748 WMIC.exe Token: SeLoadDriverPrivilege 4748 WMIC.exe Token: SeSystemProfilePrivilege 4748 WMIC.exe Token: SeSystemtimePrivilege 4748 WMIC.exe Token: SeProfSingleProcessPrivilege 4748 WMIC.exe Token: SeIncBasePriorityPrivilege 4748 WMIC.exe Token: SeCreatePagefilePrivilege 4748 WMIC.exe Token: SeBackupPrivilege 4748 WMIC.exe Token: SeRestorePrivilege 4748 WMIC.exe Token: SeShutdownPrivilege 4748 WMIC.exe Token: SeDebugPrivilege 4748 WMIC.exe Token: SeSystemEnvironmentPrivilege 4748 WMIC.exe Token: SeRemoteShutdownPrivilege 4748 WMIC.exe Token: SeUndockPrivilege 4748 WMIC.exe Token: SeManageVolumePrivilege 4748 WMIC.exe Token: 33 4748 WMIC.exe Token: 34 4748 WMIC.exe Token: 35 4748 WMIC.exe Token: 36 4748 WMIC.exe Token: SeIncreaseQuotaPrivilege 4748 WMIC.exe Token: SeSecurityPrivilege 4748 WMIC.exe Token: SeTakeOwnershipPrivilege 4748 WMIC.exe Token: SeLoadDriverPrivilege 4748 WMIC.exe Token: SeSystemProfilePrivilege 4748 WMIC.exe Token: SeSystemtimePrivilege 4748 WMIC.exe Token: SeProfSingleProcessPrivilege 4748 WMIC.exe Token: SeIncBasePriorityPrivilege 4748 WMIC.exe Token: SeCreatePagefilePrivilege 4748 WMIC.exe Token: SeBackupPrivilege 4748 WMIC.exe Token: SeRestorePrivilege 4748 WMIC.exe Token: SeShutdownPrivilege 4748 WMIC.exe Token: SeDebugPrivilege 4748 WMIC.exe Token: SeSystemEnvironmentPrivilege 4748 WMIC.exe Token: SeRemoteShutdownPrivilege 4748 WMIC.exe Token: SeUndockPrivilege 4748 WMIC.exe Token: SeManageVolumePrivilege 4748 WMIC.exe Token: 33 4748 WMIC.exe Token: 34 4748 WMIC.exe Token: 35 4748 WMIC.exe Token: 36 4748 WMIC.exe Token: SeBackupPrivilege 3520 vssvc.exe Token: SeRestorePrivilege 3520 vssvc.exe Token: SeAuditPrivilege 3520 vssvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 4932 wrote to memory of 1700 4932 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 86 PID 1700 wrote to memory of 5064 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 88 PID 1700 wrote to memory of 5064 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 88 PID 1700 wrote to memory of 5064 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 88 PID 1700 wrote to memory of 4328 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 89 PID 1700 wrote to memory of 4328 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 89 PID 1700 wrote to memory of 4328 1700 39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe 89 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 5064 wrote to memory of 4764 5064 fvvpkuhyqihw.exe 93 PID 4764 wrote to memory of 4748 4764 fvvpkuhyqihw.exe 94 PID 4764 wrote to memory of 4748 4764 fvvpkuhyqihw.exe 94 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fvvpkuhyqihw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fvvpkuhyqihw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"C:\Users\Admin\AppData\Local\Temp\39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\fvvpkuhyqihw.exeC:\Windows\fvvpkuhyqihw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\fvvpkuhyqihw.exeC:\Windows\fvvpkuhyqihw.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4764 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\39A709~1.EXE3⤵PID:4328
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c