Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe
Resource
win10v2004-20220414-en
General
-
Target
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe
-
Size
366KB
-
MD5
6e8553bd03e63431388120b6a772e1ee
-
SHA1
ab5ffbed5e461e453431a3ab1ea7019e555dee5f
-
SHA256
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
-
SHA512
c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+wvtsw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6FCB4ECA58D14FA
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6FCB4ECA58D14FA
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6FCB4ECA58D14FA
http://xlowfznrg4wf7dli.ONION/6FCB4ECA58D14FA
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
mlqymetxhphs.exemlqymetxhphs.exepid Process 1996 mlqymetxhphs.exe 1840 mlqymetxhphs.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1812 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mlqymetxhphs.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run mlqymetxhphs.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\cdscikxbgpke = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mlqymetxhphs.exe\"" mlqymetxhphs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exemlqymetxhphs.exedescription pid Process procid_target PID 1524 set thread context of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1996 set thread context of 1840 1996 mlqymetxhphs.exe 32 -
Drops file in Program Files directory 15 IoCs
Processes:
mlqymetxhphs.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\History.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt mlqymetxhphs.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt mlqymetxhphs.exe -
Drops file in Windows directory 2 IoCs
Processes:
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exedescription ioc Process File created C:\Windows\mlqymetxhphs.exe 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe File opened for modification C:\Windows\mlqymetxhphs.exe 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
mlqymetxhphs.exepid Process 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe 1840 mlqymetxhphs.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exemlqymetxhphs.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe Token: SeDebugPrivilege 1840 mlqymetxhphs.exe Token: SeIncreaseQuotaPrivilege 1932 WMIC.exe Token: SeSecurityPrivilege 1932 WMIC.exe Token: SeTakeOwnershipPrivilege 1932 WMIC.exe Token: SeLoadDriverPrivilege 1932 WMIC.exe Token: SeSystemProfilePrivilege 1932 WMIC.exe Token: SeSystemtimePrivilege 1932 WMIC.exe Token: SeProfSingleProcessPrivilege 1932 WMIC.exe Token: SeIncBasePriorityPrivilege 1932 WMIC.exe Token: SeCreatePagefilePrivilege 1932 WMIC.exe Token: SeBackupPrivilege 1932 WMIC.exe Token: SeRestorePrivilege 1932 WMIC.exe Token: SeShutdownPrivilege 1932 WMIC.exe Token: SeDebugPrivilege 1932 WMIC.exe Token: SeSystemEnvironmentPrivilege 1932 WMIC.exe Token: SeRemoteShutdownPrivilege 1932 WMIC.exe Token: SeUndockPrivilege 1932 WMIC.exe Token: SeManageVolumePrivilege 1932 WMIC.exe Token: 33 1932 WMIC.exe Token: 34 1932 WMIC.exe Token: 35 1932 WMIC.exe Token: SeIncreaseQuotaPrivilege 1932 WMIC.exe Token: SeSecurityPrivilege 1932 WMIC.exe Token: SeTakeOwnershipPrivilege 1932 WMIC.exe Token: SeLoadDriverPrivilege 1932 WMIC.exe Token: SeSystemProfilePrivilege 1932 WMIC.exe Token: SeSystemtimePrivilege 1932 WMIC.exe Token: SeProfSingleProcessPrivilege 1932 WMIC.exe Token: SeIncBasePriorityPrivilege 1932 WMIC.exe Token: SeCreatePagefilePrivilege 1932 WMIC.exe Token: SeBackupPrivilege 1932 WMIC.exe Token: SeRestorePrivilege 1932 WMIC.exe Token: SeShutdownPrivilege 1932 WMIC.exe Token: SeDebugPrivilege 1932 WMIC.exe Token: SeSystemEnvironmentPrivilege 1932 WMIC.exe Token: SeRemoteShutdownPrivilege 1932 WMIC.exe Token: SeUndockPrivilege 1932 WMIC.exe Token: SeManageVolumePrivilege 1932 WMIC.exe Token: 33 1932 WMIC.exe Token: 34 1932 WMIC.exe Token: 35 1932 WMIC.exe Token: SeBackupPrivilege 1016 vssvc.exe Token: SeRestorePrivilege 1016 vssvc.exe Token: SeAuditPrivilege 1016 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exemlqymetxhphs.exemlqymetxhphs.exedescription pid Process procid_target PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 1524 wrote to memory of 812 1524 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 28 PID 812 wrote to memory of 1996 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 29 PID 812 wrote to memory of 1996 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 29 PID 812 wrote to memory of 1996 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 29 PID 812 wrote to memory of 1996 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 29 PID 812 wrote to memory of 1812 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 30 PID 812 wrote to memory of 1812 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 30 PID 812 wrote to memory of 1812 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 30 PID 812 wrote to memory of 1812 812 469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe 30 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1996 wrote to memory of 1840 1996 mlqymetxhphs.exe 32 PID 1840 wrote to memory of 1932 1840 mlqymetxhphs.exe 33 PID 1840 wrote to memory of 1932 1840 mlqymetxhphs.exe 33 PID 1840 wrote to memory of 1932 1840 mlqymetxhphs.exe 33 PID 1840 wrote to memory of 1932 1840 mlqymetxhphs.exe 33 -
System policy modification 1 TTPs 2 IoCs
Processes:
mlqymetxhphs.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mlqymetxhphs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mlqymetxhphs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe"C:\Users\Admin\AppData\Local\Temp\469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe"C:\Users\Admin\AppData\Local\Temp\469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\mlqymetxhphs.exeC:\Windows\mlqymetxhphs.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\mlqymetxhphs.exeC:\Windows\mlqymetxhphs.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1840 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\469F8D~1.EXE3⤵
- Deletes itself
PID:1812
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD56e8553bd03e63431388120b6a772e1ee
SHA1ab5ffbed5e461e453431a3ab1ea7019e555dee5f
SHA256469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
SHA512c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960
-
Filesize
366KB
MD56e8553bd03e63431388120b6a772e1ee
SHA1ab5ffbed5e461e453431a3ab1ea7019e555dee5f
SHA256469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
SHA512c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960
-
Filesize
366KB
MD56e8553bd03e63431388120b6a772e1ee
SHA1ab5ffbed5e461e453431a3ab1ea7019e555dee5f
SHA256469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
SHA512c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960