Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 12:47
Static task
static1
Behavioral task
behavioral1
Sample
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe
Resource
win10v2004-20220414-en
General
-
Target
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe
-
Size
308KB
-
MD5
90f3a27d1bef1b2a76190b7b33d0aaae
-
SHA1
a5f543122e5d917b38bb7d76895864ceb6599998
-
SHA256
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
-
SHA512
ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+amciw.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/7F578D61299896E9
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/7F578D61299896E9
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/7F578D61299896E9
http://xlowfznrg4wf7dli.ONION/7F578D61299896E9
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+amciw.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
mqmudhqfynai.exemqmudhqfynai.exepid Process 1780 mqmudhqfynai.exe 1796 mqmudhqfynai.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1560 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mqmudhqfynai.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN mqmudhqfynai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\dqouyvy = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\mqmudhqfynai.exe" mqmudhqfynai.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exemqmudhqfynai.exedescription pid Process procid_target PID 1408 set thread context of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1780 set thread context of 1796 1780 mqmudhqfynai.exe 32 -
Drops file in Program Files directory 19 IoCs
Processes:
mqmudhqfynai.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\an.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\History.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt mqmudhqfynai.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt mqmudhqfynai.exe -
Drops file in Windows directory 2 IoCs
Processes:
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exedescription ioc Process File created C:\Windows\mqmudhqfynai.exe 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe File opened for modification C:\Windows\mqmudhqfynai.exe 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mqmudhqfynai.exepid Process 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe 1796 mqmudhqfynai.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exemqmudhqfynai.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe Token: SeDebugPrivilege 1796 mqmudhqfynai.exe Token: SeIncreaseQuotaPrivilege 288 WMIC.exe Token: SeSecurityPrivilege 288 WMIC.exe Token: SeTakeOwnershipPrivilege 288 WMIC.exe Token: SeLoadDriverPrivilege 288 WMIC.exe Token: SeSystemProfilePrivilege 288 WMIC.exe Token: SeSystemtimePrivilege 288 WMIC.exe Token: SeProfSingleProcessPrivilege 288 WMIC.exe Token: SeIncBasePriorityPrivilege 288 WMIC.exe Token: SeCreatePagefilePrivilege 288 WMIC.exe Token: SeBackupPrivilege 288 WMIC.exe Token: SeRestorePrivilege 288 WMIC.exe Token: SeShutdownPrivilege 288 WMIC.exe Token: SeDebugPrivilege 288 WMIC.exe Token: SeSystemEnvironmentPrivilege 288 WMIC.exe Token: SeRemoteShutdownPrivilege 288 WMIC.exe Token: SeUndockPrivilege 288 WMIC.exe Token: SeManageVolumePrivilege 288 WMIC.exe Token: 33 288 WMIC.exe Token: 34 288 WMIC.exe Token: 35 288 WMIC.exe Token: SeIncreaseQuotaPrivilege 288 WMIC.exe Token: SeSecurityPrivilege 288 WMIC.exe Token: SeTakeOwnershipPrivilege 288 WMIC.exe Token: SeLoadDriverPrivilege 288 WMIC.exe Token: SeSystemProfilePrivilege 288 WMIC.exe Token: SeSystemtimePrivilege 288 WMIC.exe Token: SeProfSingleProcessPrivilege 288 WMIC.exe Token: SeIncBasePriorityPrivilege 288 WMIC.exe Token: SeCreatePagefilePrivilege 288 WMIC.exe Token: SeBackupPrivilege 288 WMIC.exe Token: SeRestorePrivilege 288 WMIC.exe Token: SeShutdownPrivilege 288 WMIC.exe Token: SeDebugPrivilege 288 WMIC.exe Token: SeSystemEnvironmentPrivilege 288 WMIC.exe Token: SeRemoteShutdownPrivilege 288 WMIC.exe Token: SeUndockPrivilege 288 WMIC.exe Token: SeManageVolumePrivilege 288 WMIC.exe Token: 33 288 WMIC.exe Token: 34 288 WMIC.exe Token: 35 288 WMIC.exe Token: SeBackupPrivilege 1624 vssvc.exe Token: SeRestorePrivilege 1624 vssvc.exe Token: SeAuditPrivilege 1624 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exemqmudhqfynai.exemqmudhqfynai.exedescription pid Process procid_target PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 1408 wrote to memory of 900 1408 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 28 PID 900 wrote to memory of 1780 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 29 PID 900 wrote to memory of 1780 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 29 PID 900 wrote to memory of 1780 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 29 PID 900 wrote to memory of 1780 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 29 PID 900 wrote to memory of 1560 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 30 PID 900 wrote to memory of 1560 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 30 PID 900 wrote to memory of 1560 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 30 PID 900 wrote to memory of 1560 900 4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe 30 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1780 wrote to memory of 1796 1780 mqmudhqfynai.exe 32 PID 1796 wrote to memory of 288 1796 mqmudhqfynai.exe 33 PID 1796 wrote to memory of 288 1796 mqmudhqfynai.exe 33 PID 1796 wrote to memory of 288 1796 mqmudhqfynai.exe 33 PID 1796 wrote to memory of 288 1796 mqmudhqfynai.exe 33 -
System policy modification 1 TTPs 2 IoCs
Processes:
mqmudhqfynai.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mqmudhqfynai.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mqmudhqfynai.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe"C:\Users\Admin\AppData\Local\Temp\4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe"C:\Users\Admin\AppData\Local\Temp\4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\mqmudhqfynai.exeC:\Windows\mqmudhqfynai.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\mqmudhqfynai.exeC:\Windows\mqmudhqfynai.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1796 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4A955B~1.EXE3⤵
- Deletes itself
PID:1560
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD590f3a27d1bef1b2a76190b7b33d0aaae
SHA1a5f543122e5d917b38bb7d76895864ceb6599998
SHA2564a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
SHA512ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43
-
Filesize
308KB
MD590f3a27d1bef1b2a76190b7b33d0aaae
SHA1a5f543122e5d917b38bb7d76895864ceb6599998
SHA2564a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
SHA512ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43
-
Filesize
308KB
MD590f3a27d1bef1b2a76190b7b33d0aaae
SHA1a5f543122e5d917b38bb7d76895864ceb6599998
SHA2564a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
SHA512ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43