Analysis
-
max time kernel
203s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe
Resource
win10v2004-20220414-en
General
-
Target
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe
-
Size
308KB
-
MD5
7800dce6bbde60e92c43f767c137286b
-
SHA1
129d1703e459dde4b3e89f46f01b9bb826f962ec
-
SHA256
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
-
SHA512
90b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+xausw.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/59E1C6454D865CB1
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/59E1C6454D865CB1
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/59E1C6454D865CB1
http://xlowfznrg4wf7dli.ONION/59E1C6454D865CB1
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+xausw.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
wurwmfievarr.exewurwmfievarr.exepid Process 1088 wurwmfievarr.exe 1800 wurwmfievarr.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 520 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wurwmfievarr.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN wurwmfievarr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwstoqx = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\wurwmfievarr.exe" wurwmfievarr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exewurwmfievarr.exedescription pid Process procid_target PID 1324 set thread context of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1088 set thread context of 1800 1088 wurwmfievarr.exe 31 -
Drops file in Windows directory 2 IoCs
Processes:
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exedescription ioc Process File opened for modification C:\Windows\wurwmfievarr.exe 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe File created C:\Windows\wurwmfievarr.exe 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
wurwmfievarr.exepid Process 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe 1800 wurwmfievarr.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exewurwmfievarr.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe Token: SeDebugPrivilege 1800 wurwmfievarr.exe Token: SeIncreaseQuotaPrivilege 980 WMIC.exe Token: SeSecurityPrivilege 980 WMIC.exe Token: SeTakeOwnershipPrivilege 980 WMIC.exe Token: SeLoadDriverPrivilege 980 WMIC.exe Token: SeSystemProfilePrivilege 980 WMIC.exe Token: SeSystemtimePrivilege 980 WMIC.exe Token: SeProfSingleProcessPrivilege 980 WMIC.exe Token: SeIncBasePriorityPrivilege 980 WMIC.exe Token: SeCreatePagefilePrivilege 980 WMIC.exe Token: SeBackupPrivilege 980 WMIC.exe Token: SeRestorePrivilege 980 WMIC.exe Token: SeShutdownPrivilege 980 WMIC.exe Token: SeDebugPrivilege 980 WMIC.exe Token: SeSystemEnvironmentPrivilege 980 WMIC.exe Token: SeRemoteShutdownPrivilege 980 WMIC.exe Token: SeUndockPrivilege 980 WMIC.exe Token: SeManageVolumePrivilege 980 WMIC.exe Token: 33 980 WMIC.exe Token: 34 980 WMIC.exe Token: 35 980 WMIC.exe Token: SeIncreaseQuotaPrivilege 980 WMIC.exe Token: SeSecurityPrivilege 980 WMIC.exe Token: SeTakeOwnershipPrivilege 980 WMIC.exe Token: SeLoadDriverPrivilege 980 WMIC.exe Token: SeSystemProfilePrivilege 980 WMIC.exe Token: SeSystemtimePrivilege 980 WMIC.exe Token: SeProfSingleProcessPrivilege 980 WMIC.exe Token: SeIncBasePriorityPrivilege 980 WMIC.exe Token: SeCreatePagefilePrivilege 980 WMIC.exe Token: SeBackupPrivilege 980 WMIC.exe Token: SeRestorePrivilege 980 WMIC.exe Token: SeShutdownPrivilege 980 WMIC.exe Token: SeDebugPrivilege 980 WMIC.exe Token: SeSystemEnvironmentPrivilege 980 WMIC.exe Token: SeRemoteShutdownPrivilege 980 WMIC.exe Token: SeUndockPrivilege 980 WMIC.exe Token: SeManageVolumePrivilege 980 WMIC.exe Token: 33 980 WMIC.exe Token: 34 980 WMIC.exe Token: 35 980 WMIC.exe Token: SeBackupPrivilege 1612 vssvc.exe Token: SeRestorePrivilege 1612 vssvc.exe Token: SeAuditPrivilege 1612 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exewurwmfievarr.exewurwmfievarr.exedescription pid Process procid_target PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 1324 wrote to memory of 2028 1324 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 27 PID 2028 wrote to memory of 1088 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 28 PID 2028 wrote to memory of 1088 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 28 PID 2028 wrote to memory of 1088 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 28 PID 2028 wrote to memory of 1088 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 28 PID 2028 wrote to memory of 520 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 29 PID 2028 wrote to memory of 520 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 29 PID 2028 wrote to memory of 520 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 29 PID 2028 wrote to memory of 520 2028 3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe 29 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1088 wrote to memory of 1800 1088 wurwmfievarr.exe 31 PID 1800 wrote to memory of 980 1800 wurwmfievarr.exe 32 PID 1800 wrote to memory of 980 1800 wurwmfievarr.exe 32 PID 1800 wrote to memory of 980 1800 wurwmfievarr.exe 32 PID 1800 wrote to memory of 980 1800 wurwmfievarr.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
wurwmfievarr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wurwmfievarr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" wurwmfievarr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe"C:\Users\Admin\AppData\Local\Temp\3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe"C:\Users\Admin\AppData\Local\Temp\3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\wurwmfievarr.exeC:\Windows\wurwmfievarr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\wurwmfievarr.exeC:\Windows\wurwmfievarr.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1800 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\383551~1.EXE3⤵
- Deletes itself
PID:520
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD57800dce6bbde60e92c43f767c137286b
SHA1129d1703e459dde4b3e89f46f01b9bb826f962ec
SHA2563835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
SHA51290b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f
-
Filesize
308KB
MD57800dce6bbde60e92c43f767c137286b
SHA1129d1703e459dde4b3e89f46f01b9bb826f962ec
SHA2563835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
SHA51290b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f
-
Filesize
308KB
MD57800dce6bbde60e92c43f767c137286b
SHA1129d1703e459dde4b3e89f46f01b9bb826f962ec
SHA2563835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
SHA51290b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f