Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 19:21
Static task
static1
Behavioral task
behavioral1
Sample
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe
Resource
win10v2004-20220414-en
General
-
Target
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe
-
Size
424KB
-
MD5
55c77c21b6e70c1c4d4e3df4b0152e40
-
SHA1
e50611bae7fc6fc98841c15867c2cef45d3bf7c1
-
SHA256
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9
-
SHA512
2083e4c600051d0500c3a999fdb0f337b3a90e440f8f791fd78e2e37d1a1a39adb7ac742e489ac853c1acc893754fbaaf233c7466ec92a29b0d2e4a034ab9c66
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+qwpjx.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/4E187367B06D3E83
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4E187367B06D3E83
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/4E187367B06D3E83
http://xlowfznrg4wf7dli.ONION/4E187367B06D3E83
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+qwpjx.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
posndflyhpdf.exepid Process 1204 posndflyhpdf.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2028 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
posndflyhpdf.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\ehkthxyynsqv = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\posndflyhpdf.exe\"" posndflyhpdf.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run posndflyhpdf.exe -
Drops file in Program Files directory 64 IoCs
Processes:
posndflyhpdf.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\en-US\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\CompleteSearch.jpeg posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\History.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\_RECoVERY_+qwpjx.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\_RECoVERY_+qwpjx.png posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt posndflyhpdf.exe File opened for modification C:\Program Files\7-Zip\readme.txt posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECoVERY_+qwpjx.html posndflyhpdf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+qwpjx.png posndflyhpdf.exe -
Drops file in Windows directory 2 IoCs
Processes:
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exedescription ioc Process File created C:\Windows\posndflyhpdf.exe 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe File opened for modification C:\Windows\posndflyhpdf.exe 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
posndflyhpdf.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 posndflyhpdf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 posndflyhpdf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 posndflyhpdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
posndflyhpdf.exepid Process 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe 1204 posndflyhpdf.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exeposndflyhpdf.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe Token: SeDebugPrivilege 1204 posndflyhpdf.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: SeBackupPrivilege 1820 vssvc.exe Token: SeRestorePrivilege 1820 vssvc.exe Token: SeAuditPrivilege 1820 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exeposndflyhpdf.exedescription pid Process procid_target PID 912 wrote to memory of 1204 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 28 PID 912 wrote to memory of 1204 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 28 PID 912 wrote to memory of 1204 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 28 PID 912 wrote to memory of 1204 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 28 PID 912 wrote to memory of 2028 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 29 PID 912 wrote to memory of 2028 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 29 PID 912 wrote to memory of 2028 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 29 PID 912 wrote to memory of 2028 912 446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe 29 PID 1204 wrote to memory of 1988 1204 posndflyhpdf.exe 31 PID 1204 wrote to memory of 1988 1204 posndflyhpdf.exe 31 PID 1204 wrote to memory of 1988 1204 posndflyhpdf.exe 31 PID 1204 wrote to memory of 1988 1204 posndflyhpdf.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
posndflyhpdf.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System posndflyhpdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" posndflyhpdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe"C:\Users\Admin\AppData\Local\Temp\446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\posndflyhpdf.exeC:\Windows\posndflyhpdf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1204 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\446A85~1.EXE2⤵
- Deletes itself
PID:2028
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD555c77c21b6e70c1c4d4e3df4b0152e40
SHA1e50611bae7fc6fc98841c15867c2cef45d3bf7c1
SHA256446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9
SHA5122083e4c600051d0500c3a999fdb0f337b3a90e440f8f791fd78e2e37d1a1a39adb7ac742e489ac853c1acc893754fbaaf233c7466ec92a29b0d2e4a034ab9c66
-
Filesize
424KB
MD555c77c21b6e70c1c4d4e3df4b0152e40
SHA1e50611bae7fc6fc98841c15867c2cef45d3bf7c1
SHA256446a85755a16fb242c67c7c24ae86b0cf85cd8620cc50f711385ecd371b510f9
SHA5122083e4c600051d0500c3a999fdb0f337b3a90e440f8f791fd78e2e37d1a1a39adb7ac742e489ac853c1acc893754fbaaf233c7466ec92a29b0d2e4a034ab9c66