Analysis
-
max time kernel
160s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 18:21
Static task
static1
Behavioral task
behavioral1
Sample
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe
Resource
win10v2004-20220414-en
General
-
Target
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe
-
Size
396KB
-
MD5
794f78c8b950dc1a840d165892cb0596
-
SHA1
4667584f756b8e67a504ada9141f868e59f8dbb1
-
SHA256
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
-
SHA512
1151775fe618496334f1bf184e4f65bfb83125918ffa80274e7e560c49a10a838cf253e7b7404df37e8219a827d47117900b7a26c5f97041227d931138d708d0
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+brwih.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/4C9D79DF556F837F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4C9D79DF556F837F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/4C9D79DF556F837F
http://xlowfznrg4wf7dli.ONION/4C9D79DF556F837F
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+brwih.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
hovyatkvkoqb.exepid Process 3956 hovyatkvkoqb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exehovyatkvkoqb.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation hovyatkvkoqb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
hovyatkvkoqb.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run hovyatkvkoqb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jnrcmhvgmxdc = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\hovyatkvkoqb.exe\"" hovyatkvkoqb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
hovyatkvkoqb.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\an.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\History.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt hovyatkvkoqb.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt hovyatkvkoqb.exe -
Drops file in Windows directory 2 IoCs
Processes:
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exedescription ioc Process File created C:\Windows\hovyatkvkoqb.exe 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe File opened for modification C:\Windows\hovyatkvkoqb.exe 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
hovyatkvkoqb.exepid Process 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe 3956 hovyatkvkoqb.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exehovyatkvkoqb.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe Token: SeDebugPrivilege 3956 hovyatkvkoqb.exe Token: SeIncreaseQuotaPrivilege 4360 WMIC.exe Token: SeSecurityPrivilege 4360 WMIC.exe Token: SeTakeOwnershipPrivilege 4360 WMIC.exe Token: SeLoadDriverPrivilege 4360 WMIC.exe Token: SeSystemProfilePrivilege 4360 WMIC.exe Token: SeSystemtimePrivilege 4360 WMIC.exe Token: SeProfSingleProcessPrivilege 4360 WMIC.exe Token: SeIncBasePriorityPrivilege 4360 WMIC.exe Token: SeCreatePagefilePrivilege 4360 WMIC.exe Token: SeBackupPrivilege 4360 WMIC.exe Token: SeRestorePrivilege 4360 WMIC.exe Token: SeShutdownPrivilege 4360 WMIC.exe Token: SeDebugPrivilege 4360 WMIC.exe Token: SeSystemEnvironmentPrivilege 4360 WMIC.exe Token: SeRemoteShutdownPrivilege 4360 WMIC.exe Token: SeUndockPrivilege 4360 WMIC.exe Token: SeManageVolumePrivilege 4360 WMIC.exe Token: 33 4360 WMIC.exe Token: 34 4360 WMIC.exe Token: 35 4360 WMIC.exe Token: 36 4360 WMIC.exe Token: SeIncreaseQuotaPrivilege 4360 WMIC.exe Token: SeSecurityPrivilege 4360 WMIC.exe Token: SeTakeOwnershipPrivilege 4360 WMIC.exe Token: SeLoadDriverPrivilege 4360 WMIC.exe Token: SeSystemProfilePrivilege 4360 WMIC.exe Token: SeSystemtimePrivilege 4360 WMIC.exe Token: SeProfSingleProcessPrivilege 4360 WMIC.exe Token: SeIncBasePriorityPrivilege 4360 WMIC.exe Token: SeCreatePagefilePrivilege 4360 WMIC.exe Token: SeBackupPrivilege 4360 WMIC.exe Token: SeRestorePrivilege 4360 WMIC.exe Token: SeShutdownPrivilege 4360 WMIC.exe Token: SeDebugPrivilege 4360 WMIC.exe Token: SeSystemEnvironmentPrivilege 4360 WMIC.exe Token: SeRemoteShutdownPrivilege 4360 WMIC.exe Token: SeUndockPrivilege 4360 WMIC.exe Token: SeManageVolumePrivilege 4360 WMIC.exe Token: 33 4360 WMIC.exe Token: 34 4360 WMIC.exe Token: 35 4360 WMIC.exe Token: 36 4360 WMIC.exe Token: SeBackupPrivilege 4512 vssvc.exe Token: SeRestorePrivilege 4512 vssvc.exe Token: SeAuditPrivilege 4512 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exehovyatkvkoqb.exedescription pid Process procid_target PID 2652 wrote to memory of 3956 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 82 PID 2652 wrote to memory of 3956 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 82 PID 2652 wrote to memory of 3956 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 82 PID 2652 wrote to memory of 5092 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 83 PID 2652 wrote to memory of 5092 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 83 PID 2652 wrote to memory of 5092 2652 44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe 83 PID 3956 wrote to memory of 4360 3956 hovyatkvkoqb.exe 85 PID 3956 wrote to memory of 4360 3956 hovyatkvkoqb.exe 85 -
System policy modification 1 TTPs 2 IoCs
Processes:
hovyatkvkoqb.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hovyatkvkoqb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hovyatkvkoqb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe"C:\Users\Admin\AppData\Local\Temp\44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\hovyatkvkoqb.exeC:\Windows\hovyatkvkoqb.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3956 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\44BB8E~1.EXE2⤵PID:5092
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5794f78c8b950dc1a840d165892cb0596
SHA14667584f756b8e67a504ada9141f868e59f8dbb1
SHA25644bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
SHA5121151775fe618496334f1bf184e4f65bfb83125918ffa80274e7e560c49a10a838cf253e7b7404df37e8219a827d47117900b7a26c5f97041227d931138d708d0
-
Filesize
396KB
MD5794f78c8b950dc1a840d165892cb0596
SHA14667584f756b8e67a504ada9141f868e59f8dbb1
SHA25644bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
SHA5121151775fe618496334f1bf184e4f65bfb83125918ffa80274e7e560c49a10a838cf253e7b7404df37e8219a827d47117900b7a26c5f97041227d931138d708d0