Analysis
-
max time kernel
152s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 06:43
Static task
static1
Behavioral task
behavioral1
Sample
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe
Resource
win10v2004-20220721-en
General
-
Target
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe
-
Size
504KB
-
MD5
18920c2e6371a4b823ae25b3551312ad
-
SHA1
f8b6a50bfdd7d2165f5213eadf7963e47133fdbb
-
SHA256
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
-
SHA512
db5888e3dae86858fe367801622a277acb334592cbf90833651e5e0683dc7eff204fd2e109da9964e965b8b4c3d1c702aa6b83e6b3c550dab3272fa0889712b9
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+rpiac.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/179B25D15862461
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/179B25D15862461
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/179B25D15862461
http://xlowfznrg4wf7dli.ONION/179B25D15862461
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+rpiac.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1236 vlajrqrycdpp.exe -
Deletes itself 1 IoCs
pid Process 1772 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN vlajrqrycdpp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\haioesf = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\vlajrqrycdpp.exe" vlajrqrycdpp.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Mozilla Firefox\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ca.pak vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_ButtonGraphic.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\rollinghills.png vlajrqrycdpp.exe File opened for modification C:\Program Files\ExitDisconnect.pptx vlajrqrycdpp.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_ReCoVeRy_+rpiac.txt vlajrqrycdpp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\flight_recorder.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_ReCoVeRy_+rpiac.html vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_ReCoVeRy_+rpiac.png vlajrqrycdpp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png vlajrqrycdpp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vlajrqrycdpp.exe 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe File opened for modification C:\Windows\vlajrqrycdpp.exe 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe 1236 vlajrqrycdpp.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe Token: SeDebugPrivilege 1236 vlajrqrycdpp.exe Token: SeIncreaseQuotaPrivilege 1732 WMIC.exe Token: SeSecurityPrivilege 1732 WMIC.exe Token: SeTakeOwnershipPrivilege 1732 WMIC.exe Token: SeLoadDriverPrivilege 1732 WMIC.exe Token: SeSystemProfilePrivilege 1732 WMIC.exe Token: SeSystemtimePrivilege 1732 WMIC.exe Token: SeProfSingleProcessPrivilege 1732 WMIC.exe Token: SeIncBasePriorityPrivilege 1732 WMIC.exe Token: SeCreatePagefilePrivilege 1732 WMIC.exe Token: SeBackupPrivilege 1732 WMIC.exe Token: SeRestorePrivilege 1732 WMIC.exe Token: SeShutdownPrivilege 1732 WMIC.exe Token: SeDebugPrivilege 1732 WMIC.exe Token: SeSystemEnvironmentPrivilege 1732 WMIC.exe Token: SeRemoteShutdownPrivilege 1732 WMIC.exe Token: SeUndockPrivilege 1732 WMIC.exe Token: SeManageVolumePrivilege 1732 WMIC.exe Token: 33 1732 WMIC.exe Token: 34 1732 WMIC.exe Token: 35 1732 WMIC.exe Token: SeIncreaseQuotaPrivilege 1732 WMIC.exe Token: SeSecurityPrivilege 1732 WMIC.exe Token: SeTakeOwnershipPrivilege 1732 WMIC.exe Token: SeLoadDriverPrivilege 1732 WMIC.exe Token: SeSystemProfilePrivilege 1732 WMIC.exe Token: SeSystemtimePrivilege 1732 WMIC.exe Token: SeProfSingleProcessPrivilege 1732 WMIC.exe Token: SeIncBasePriorityPrivilege 1732 WMIC.exe Token: SeCreatePagefilePrivilege 1732 WMIC.exe Token: SeBackupPrivilege 1732 WMIC.exe Token: SeRestorePrivilege 1732 WMIC.exe Token: SeShutdownPrivilege 1732 WMIC.exe Token: SeDebugPrivilege 1732 WMIC.exe Token: SeSystemEnvironmentPrivilege 1732 WMIC.exe Token: SeRemoteShutdownPrivilege 1732 WMIC.exe Token: SeUndockPrivilege 1732 WMIC.exe Token: SeManageVolumePrivilege 1732 WMIC.exe Token: 33 1732 WMIC.exe Token: 34 1732 WMIC.exe Token: 35 1732 WMIC.exe Token: SeBackupPrivilege 1912 vssvc.exe Token: SeRestorePrivilege 1912 vssvc.exe Token: SeAuditPrivilege 1912 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1236 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 28 PID 1616 wrote to memory of 1236 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 28 PID 1616 wrote to memory of 1236 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 28 PID 1616 wrote to memory of 1236 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 28 PID 1616 wrote to memory of 1772 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 29 PID 1616 wrote to memory of 1772 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 29 PID 1616 wrote to memory of 1772 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 29 PID 1616 wrote to memory of 1772 1616 58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe 29 PID 1236 wrote to memory of 1732 1236 vlajrqrycdpp.exe 31 PID 1236 wrote to memory of 1732 1236 vlajrqrycdpp.exe 31 PID 1236 wrote to memory of 1732 1236 vlajrqrycdpp.exe 31 PID 1236 wrote to memory of 1732 1236 vlajrqrycdpp.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vlajrqrycdpp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" vlajrqrycdpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe"C:\Users\Admin\AppData\Local\Temp\58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\vlajrqrycdpp.exeC:\Windows\vlajrqrycdpp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1236 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\58BB6F~1.EXE2⤵
- Deletes itself
PID:1772
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD518920c2e6371a4b823ae25b3551312ad
SHA1f8b6a50bfdd7d2165f5213eadf7963e47133fdbb
SHA25658bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
SHA512db5888e3dae86858fe367801622a277acb334592cbf90833651e5e0683dc7eff204fd2e109da9964e965b8b4c3d1c702aa6b83e6b3c550dab3272fa0889712b9
-
Filesize
504KB
MD518920c2e6371a4b823ae25b3551312ad
SHA1f8b6a50bfdd7d2165f5213eadf7963e47133fdbb
SHA25658bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
SHA512db5888e3dae86858fe367801622a277acb334592cbf90833651e5e0683dc7eff204fd2e109da9964e965b8b4c3d1c702aa6b83e6b3c550dab3272fa0889712b9