Analysis
-
max time kernel
158s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe
Resource
win10v2004-20220414-en
General
-
Target
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe
-
Size
424KB
-
MD5
1f6c2ee7195acf760cb3be66590d70fb
-
SHA1
483fe52b42e290a146b9b01ddd0aed4615a31508
-
SHA256
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245
-
SHA512
a0fb9d84671c5db5dce2482a5b348b7ebc6d8af5cd098304c3ce43fa34f58aff15c90daaedeef5ddb2f852b44aba67b88fda69631a07ce88b4869fdee1f86934
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+uwuhg.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/EB202A70418E531F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/EB202A70418E531F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/EB202A70418E531F
http://xlowfznrg4wf7dli.ONION/EB202A70418E531F
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
gifgtqirggym.exepid Process 1100 gifgtqirggym.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1032 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gifgtqirggym.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run gifgtqirggym.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ljelyaclukam = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\gifgtqirggym.exe\"" gifgtqirggym.exe -
Drops file in Program Files directory 56 IoCs
Processes:
gifgtqirggym.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ast.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\History.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt gifgtqirggym.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt gifgtqirggym.exe -
Drops file in Windows directory 2 IoCs
Processes:
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exedescription ioc Process File created C:\Windows\gifgtqirggym.exe 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe File opened for modification C:\Windows\gifgtqirggym.exe 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
gifgtqirggym.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 gifgtqirggym.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 gifgtqirggym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 gifgtqirggym.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 gifgtqirggym.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 gifgtqirggym.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 gifgtqirggym.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gifgtqirggym.exepid Process 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe 1100 gifgtqirggym.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exegifgtqirggym.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe Token: SeDebugPrivilege 1100 gifgtqirggym.exe Token: SeIncreaseQuotaPrivilege 276 WMIC.exe Token: SeSecurityPrivilege 276 WMIC.exe Token: SeTakeOwnershipPrivilege 276 WMIC.exe Token: SeLoadDriverPrivilege 276 WMIC.exe Token: SeSystemProfilePrivilege 276 WMIC.exe Token: SeSystemtimePrivilege 276 WMIC.exe Token: SeProfSingleProcessPrivilege 276 WMIC.exe Token: SeIncBasePriorityPrivilege 276 WMIC.exe Token: SeCreatePagefilePrivilege 276 WMIC.exe Token: SeBackupPrivilege 276 WMIC.exe Token: SeRestorePrivilege 276 WMIC.exe Token: SeShutdownPrivilege 276 WMIC.exe Token: SeDebugPrivilege 276 WMIC.exe Token: SeSystemEnvironmentPrivilege 276 WMIC.exe Token: SeRemoteShutdownPrivilege 276 WMIC.exe Token: SeUndockPrivilege 276 WMIC.exe Token: SeManageVolumePrivilege 276 WMIC.exe Token: 33 276 WMIC.exe Token: 34 276 WMIC.exe Token: 35 276 WMIC.exe Token: SeIncreaseQuotaPrivilege 276 WMIC.exe Token: SeSecurityPrivilege 276 WMIC.exe Token: SeTakeOwnershipPrivilege 276 WMIC.exe Token: SeLoadDriverPrivilege 276 WMIC.exe Token: SeSystemProfilePrivilege 276 WMIC.exe Token: SeSystemtimePrivilege 276 WMIC.exe Token: SeProfSingleProcessPrivilege 276 WMIC.exe Token: SeIncBasePriorityPrivilege 276 WMIC.exe Token: SeCreatePagefilePrivilege 276 WMIC.exe Token: SeBackupPrivilege 276 WMIC.exe Token: SeRestorePrivilege 276 WMIC.exe Token: SeShutdownPrivilege 276 WMIC.exe Token: SeDebugPrivilege 276 WMIC.exe Token: SeSystemEnvironmentPrivilege 276 WMIC.exe Token: SeRemoteShutdownPrivilege 276 WMIC.exe Token: SeUndockPrivilege 276 WMIC.exe Token: SeManageVolumePrivilege 276 WMIC.exe Token: 33 276 WMIC.exe Token: 34 276 WMIC.exe Token: 35 276 WMIC.exe Token: SeBackupPrivilege 600 vssvc.exe Token: SeRestorePrivilege 600 vssvc.exe Token: SeAuditPrivilege 600 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exegifgtqirggym.exedescription pid Process procid_target PID 272 wrote to memory of 1100 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 28 PID 272 wrote to memory of 1100 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 28 PID 272 wrote to memory of 1100 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 28 PID 272 wrote to memory of 1100 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 28 PID 272 wrote to memory of 1032 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 29 PID 272 wrote to memory of 1032 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 29 PID 272 wrote to memory of 1032 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 29 PID 272 wrote to memory of 1032 272 3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe 29 PID 1100 wrote to memory of 276 1100 gifgtqirggym.exe 31 PID 1100 wrote to memory of 276 1100 gifgtqirggym.exe 31 PID 1100 wrote to memory of 276 1100 gifgtqirggym.exe 31 PID 1100 wrote to memory of 276 1100 gifgtqirggym.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
gifgtqirggym.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gifgtqirggym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gifgtqirggym.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe"C:\Users\Admin\AppData\Local\Temp\3af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\gifgtqirggym.exeC:\Windows\gifgtqirggym.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1100 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\3AF265~1.EXE2⤵
- Deletes itself
PID:1032
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD51f6c2ee7195acf760cb3be66590d70fb
SHA1483fe52b42e290a146b9b01ddd0aed4615a31508
SHA2563af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245
SHA512a0fb9d84671c5db5dce2482a5b348b7ebc6d8af5cd098304c3ce43fa34f58aff15c90daaedeef5ddb2f852b44aba67b88fda69631a07ce88b4869fdee1f86934
-
Filesize
424KB
MD51f6c2ee7195acf760cb3be66590d70fb
SHA1483fe52b42e290a146b9b01ddd0aed4615a31508
SHA2563af2655c4fc69d0ac9713bc32d00950a3f62e46bfacfec63d9028a8659fcd245
SHA512a0fb9d84671c5db5dce2482a5b348b7ebc6d8af5cd098304c3ce43fa34f58aff15c90daaedeef5ddb2f852b44aba67b88fda69631a07ce88b4869fdee1f86934