Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14/07/2022, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe
Resource
win10v2004-20220414-en
General
-
Target
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe
-
Size
283KB
-
MD5
411b8d741dc16ceb2ad7f309304d79d7
-
SHA1
b8429977003d66f56ab1991bb0ffd5ae1653610c
-
SHA256
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
-
SHA512
80f2a384902490d22454e33964f9abd830a7ce417e21ed5abf4865c6a701ea9e1f2b48ed692ef89db2aad8be6fe5ec67b22e5af92814c8ad33f7dfa7b9a1d190
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cjsiu.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A11C53F98FBE374
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/A11C53F98FBE374
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/A11C53F98FBE374
http://xlowfznrg4wf7dli.ONION/A11C53F98FBE374
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cjsiu.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1052 ajnbpiwcekqy.exe -
Deletes itself 1 IoCs
pid Process 2024 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN ajnbpiwcekqy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\fawlscc = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\ajnbpiwcekqy.exe" ajnbpiwcekqy.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\shatter.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop_PAL.wmv ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIconSubpi.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_VideoInset.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-next-static.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576black.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_SelectionSubpicture.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\1047x576black.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationLeft_ButtonGraphic.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Services\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureB.png ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_ReCoVeRy_+cjsiu.html ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\_ReCoVeRy_+cjsiu.txt ajnbpiwcekqy.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_ReCoVeRy_+cjsiu.png ajnbpiwcekqy.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ajnbpiwcekqy.exe 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe File opened for modification C:\Windows\ajnbpiwcekqy.exe 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe 1052 ajnbpiwcekqy.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe Token: SeDebugPrivilege 1052 ajnbpiwcekqy.exe Token: SeIncreaseQuotaPrivilege 760 WMIC.exe Token: SeSecurityPrivilege 760 WMIC.exe Token: SeTakeOwnershipPrivilege 760 WMIC.exe Token: SeLoadDriverPrivilege 760 WMIC.exe Token: SeSystemProfilePrivilege 760 WMIC.exe Token: SeSystemtimePrivilege 760 WMIC.exe Token: SeProfSingleProcessPrivilege 760 WMIC.exe Token: SeIncBasePriorityPrivilege 760 WMIC.exe Token: SeCreatePagefilePrivilege 760 WMIC.exe Token: SeBackupPrivilege 760 WMIC.exe Token: SeRestorePrivilege 760 WMIC.exe Token: SeShutdownPrivilege 760 WMIC.exe Token: SeDebugPrivilege 760 WMIC.exe Token: SeSystemEnvironmentPrivilege 760 WMIC.exe Token: SeRemoteShutdownPrivilege 760 WMIC.exe Token: SeUndockPrivilege 760 WMIC.exe Token: SeManageVolumePrivilege 760 WMIC.exe Token: 33 760 WMIC.exe Token: 34 760 WMIC.exe Token: 35 760 WMIC.exe Token: SeIncreaseQuotaPrivilege 760 WMIC.exe Token: SeSecurityPrivilege 760 WMIC.exe Token: SeTakeOwnershipPrivilege 760 WMIC.exe Token: SeLoadDriverPrivilege 760 WMIC.exe Token: SeSystemProfilePrivilege 760 WMIC.exe Token: SeSystemtimePrivilege 760 WMIC.exe Token: SeProfSingleProcessPrivilege 760 WMIC.exe Token: SeIncBasePriorityPrivilege 760 WMIC.exe Token: SeCreatePagefilePrivilege 760 WMIC.exe Token: SeBackupPrivilege 760 WMIC.exe Token: SeRestorePrivilege 760 WMIC.exe Token: SeShutdownPrivilege 760 WMIC.exe Token: SeDebugPrivilege 760 WMIC.exe Token: SeSystemEnvironmentPrivilege 760 WMIC.exe Token: SeRemoteShutdownPrivilege 760 WMIC.exe Token: SeUndockPrivilege 760 WMIC.exe Token: SeManageVolumePrivilege 760 WMIC.exe Token: 33 760 WMIC.exe Token: 34 760 WMIC.exe Token: 35 760 WMIC.exe Token: SeBackupPrivilege 1044 vssvc.exe Token: SeRestorePrivilege 1044 vssvc.exe Token: SeAuditPrivilege 1044 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1052 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 28 PID 1976 wrote to memory of 1052 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 28 PID 1976 wrote to memory of 1052 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 28 PID 1976 wrote to memory of 1052 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 28 PID 1976 wrote to memory of 2024 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 29 PID 1976 wrote to memory of 2024 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 29 PID 1976 wrote to memory of 2024 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 29 PID 1976 wrote to memory of 2024 1976 473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe 29 PID 1052 wrote to memory of 760 1052 ajnbpiwcekqy.exe 31 PID 1052 wrote to memory of 760 1052 ajnbpiwcekqy.exe 31 PID 1052 wrote to memory of 760 1052 ajnbpiwcekqy.exe 31 PID 1052 wrote to memory of 760 1052 ajnbpiwcekqy.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ajnbpiwcekqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ajnbpiwcekqy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe"C:\Users\Admin\AppData\Local\Temp\473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\ajnbpiwcekqy.exeC:\Windows\ajnbpiwcekqy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1052 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\473B4C~1.EXE2⤵
- Deletes itself
PID:2024
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5411b8d741dc16ceb2ad7f309304d79d7
SHA1b8429977003d66f56ab1991bb0ffd5ae1653610c
SHA256473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
SHA51280f2a384902490d22454e33964f9abd830a7ce417e21ed5abf4865c6a701ea9e1f2b48ed692ef89db2aad8be6fe5ec67b22e5af92814c8ad33f7dfa7b9a1d190
-
Filesize
283KB
MD5411b8d741dc16ceb2ad7f309304d79d7
SHA1b8429977003d66f56ab1991bb0ffd5ae1653610c
SHA256473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
SHA51280f2a384902490d22454e33964f9abd830a7ce417e21ed5abf4865c6a701ea9e1f2b48ed692ef89db2aad8be6fe5ec67b22e5af92814c8ad33f7dfa7b9a1d190