Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03/07/2022, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe
Resource
win10v2004-20220414-en
General
-
Target
3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe
-
Size
352KB
-
MD5
66472e1306d9be948e3de935649ea5e6
-
SHA1
e96168a585a63f052ff86d1c6002b8d3ca0d5a3e
-
SHA256
3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f
-
SHA512
f895b6af4c0b2f1ebc6639704fe44759be8053579012cbe2c0b67127c3c4f000cdcc8c8c3d6125135ea683674cebf2d81f5f0acd4b0219c1dc7346ad86362c66
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+jsbrn.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A7B6D9A0CBAAF3C1
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A7B6D9A0CBAAF3C1
http://yyre45dbvn2nhbefbmh.begumvelic.at/A7B6D9A0CBAAF3C1
http://xlowfznrg4wf7dli.ONION/A7B6D9A0CBAAF3C1
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+jsbrn.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1744 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe -
Deletes itself 1 IoCs
pid Process 1008 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN nlxnqkvkwxtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\fwttqgm = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\nlxnqkvkwxtu.exe" nlxnqkvkwxtu.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1744 set thread context of 1768 1744 nlxnqkvkwxtu.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\History.txt nlxnqkvkwxtu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\nlxnqkvkwxtu.exe 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe File created C:\Windows\nlxnqkvkwxtu.exe 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe 1768 nlxnqkvkwxtu.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe Token: SeDebugPrivilege 1768 nlxnqkvkwxtu.exe Token: SeIncreaseQuotaPrivilege 268 WMIC.exe Token: SeSecurityPrivilege 268 WMIC.exe Token: SeTakeOwnershipPrivilege 268 WMIC.exe Token: SeLoadDriverPrivilege 268 WMIC.exe Token: SeSystemProfilePrivilege 268 WMIC.exe Token: SeSystemtimePrivilege 268 WMIC.exe Token: SeProfSingleProcessPrivilege 268 WMIC.exe Token: SeIncBasePriorityPrivilege 268 WMIC.exe Token: SeCreatePagefilePrivilege 268 WMIC.exe Token: SeBackupPrivilege 268 WMIC.exe Token: SeRestorePrivilege 268 WMIC.exe Token: SeShutdownPrivilege 268 WMIC.exe Token: SeDebugPrivilege 268 WMIC.exe Token: SeSystemEnvironmentPrivilege 268 WMIC.exe Token: SeRemoteShutdownPrivilege 268 WMIC.exe Token: SeUndockPrivilege 268 WMIC.exe Token: SeManageVolumePrivilege 268 WMIC.exe Token: 33 268 WMIC.exe Token: 34 268 WMIC.exe Token: 35 268 WMIC.exe Token: SeIncreaseQuotaPrivilege 268 WMIC.exe Token: SeSecurityPrivilege 268 WMIC.exe Token: SeTakeOwnershipPrivilege 268 WMIC.exe Token: SeLoadDriverPrivilege 268 WMIC.exe Token: SeSystemProfilePrivilege 268 WMIC.exe Token: SeSystemtimePrivilege 268 WMIC.exe Token: SeProfSingleProcessPrivilege 268 WMIC.exe Token: SeIncBasePriorityPrivilege 268 WMIC.exe Token: SeCreatePagefilePrivilege 268 WMIC.exe Token: SeBackupPrivilege 268 WMIC.exe Token: SeRestorePrivilege 268 WMIC.exe Token: SeShutdownPrivilege 268 WMIC.exe Token: SeDebugPrivilege 268 WMIC.exe Token: SeSystemEnvironmentPrivilege 268 WMIC.exe Token: SeRemoteShutdownPrivilege 268 WMIC.exe Token: SeUndockPrivilege 268 WMIC.exe Token: SeManageVolumePrivilege 268 WMIC.exe Token: 33 268 WMIC.exe Token: 34 268 WMIC.exe Token: 35 268 WMIC.exe Token: SeBackupPrivilege 1640 vssvc.exe Token: SeRestorePrivilege 1640 vssvc.exe Token: SeAuditPrivilege 1640 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 1460 wrote to memory of 2008 1460 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 27 PID 2008 wrote to memory of 1744 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 28 PID 2008 wrote to memory of 1744 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 28 PID 2008 wrote to memory of 1744 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 28 PID 2008 wrote to memory of 1744 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 28 PID 2008 wrote to memory of 1008 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 29 PID 2008 wrote to memory of 1008 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 29 PID 2008 wrote to memory of 1008 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 29 PID 2008 wrote to memory of 1008 2008 3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe 29 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1744 wrote to memory of 1768 1744 nlxnqkvkwxtu.exe 31 PID 1768 wrote to memory of 268 1768 nlxnqkvkwxtu.exe 32 PID 1768 wrote to memory of 268 1768 nlxnqkvkwxtu.exe 32 PID 1768 wrote to memory of 268 1768 nlxnqkvkwxtu.exe 32 PID 1768 wrote to memory of 268 1768 nlxnqkvkwxtu.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nlxnqkvkwxtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nlxnqkvkwxtu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe"C:\Users\Admin\AppData\Local\Temp\3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe"C:\Users\Admin\AppData\Local\Temp\3bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\nlxnqkvkwxtu.exeC:\Windows\nlxnqkvkwxtu.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\nlxnqkvkwxtu.exeC:\Windows\nlxnqkvkwxtu.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1768 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\3BD9E5~1.EXE3⤵
- Deletes itself
PID:1008
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD566472e1306d9be948e3de935649ea5e6
SHA1e96168a585a63f052ff86d1c6002b8d3ca0d5a3e
SHA2563bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f
SHA512f895b6af4c0b2f1ebc6639704fe44759be8053579012cbe2c0b67127c3c4f000cdcc8c8c3d6125135ea683674cebf2d81f5f0acd4b0219c1dc7346ad86362c66
-
Filesize
352KB
MD566472e1306d9be948e3de935649ea5e6
SHA1e96168a585a63f052ff86d1c6002b8d3ca0d5a3e
SHA2563bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f
SHA512f895b6af4c0b2f1ebc6639704fe44759be8053579012cbe2c0b67127c3c4f000cdcc8c8c3d6125135ea683674cebf2d81f5f0acd4b0219c1dc7346ad86362c66
-
Filesize
352KB
MD566472e1306d9be948e3de935649ea5e6
SHA1e96168a585a63f052ff86d1c6002b8d3ca0d5a3e
SHA2563bd9e5265d09e77894effb7e5c3c67e60701dcd5f7dad4b4f0d13198e6fd6f5f
SHA512f895b6af4c0b2f1ebc6639704fe44759be8053579012cbe2c0b67127c3c4f000cdcc8c8c3d6125135ea683674cebf2d81f5f0acd4b0219c1dc7346ad86362c66