Analysis
-
max time kernel
172s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 20:01
Static task
static1
Behavioral task
behavioral1
Sample
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
Resource
win10v2004-20220721-en
General
-
Target
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
-
Size
368KB
-
MD5
0d3571a8ca8ef2fede9e3e11b8761582
-
SHA1
f2b0416e2afe93050816f62646ecae6080a9e559
-
SHA256
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
-
SHA512
1474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\_RECoVERY_+gmkad.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6357AFB260F5AAC6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6357AFB260F5AAC6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6357AFB260F5AAC6
http://xlowfznrg4wf7dli.ONION/6357AFB260F5AAC6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
xpikpifqaqsw.exexpikpifqaqsw.exepid Process 1696 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1084 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
xpikpifqaqsw.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run xpikpifqaqsw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\iausiwragjit = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xpikpifqaqsw.exe\"" xpikpifqaqsw.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exexpikpifqaqsw.exedescription pid Process procid_target PID 1660 set thread context of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1696 set thread context of 984 1696 xpikpifqaqsw.exe 31 -
Drops file in Program Files directory 1 IoCs
Processes:
xpikpifqaqsw.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\History.txt xpikpifqaqsw.exe -
Drops file in Windows directory 2 IoCs
Processes:
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exedescription ioc Process File created C:\Windows\xpikpifqaqsw.exe 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe File opened for modification C:\Windows\xpikpifqaqsw.exe 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
xpikpifqaqsw.exepid Process 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe 984 xpikpifqaqsw.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exexpikpifqaqsw.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe Token: SeDebugPrivilege 984 xpikpifqaqsw.exe Token: SeIncreaseQuotaPrivilege 1020 WMIC.exe Token: SeSecurityPrivilege 1020 WMIC.exe Token: SeTakeOwnershipPrivilege 1020 WMIC.exe Token: SeLoadDriverPrivilege 1020 WMIC.exe Token: SeSystemProfilePrivilege 1020 WMIC.exe Token: SeSystemtimePrivilege 1020 WMIC.exe Token: SeProfSingleProcessPrivilege 1020 WMIC.exe Token: SeIncBasePriorityPrivilege 1020 WMIC.exe Token: SeCreatePagefilePrivilege 1020 WMIC.exe Token: SeBackupPrivilege 1020 WMIC.exe Token: SeRestorePrivilege 1020 WMIC.exe Token: SeShutdownPrivilege 1020 WMIC.exe Token: SeDebugPrivilege 1020 WMIC.exe Token: SeSystemEnvironmentPrivilege 1020 WMIC.exe Token: SeRemoteShutdownPrivilege 1020 WMIC.exe Token: SeUndockPrivilege 1020 WMIC.exe Token: SeManageVolumePrivilege 1020 WMIC.exe Token: 33 1020 WMIC.exe Token: 34 1020 WMIC.exe Token: 35 1020 WMIC.exe Token: SeIncreaseQuotaPrivilege 1020 WMIC.exe Token: SeSecurityPrivilege 1020 WMIC.exe Token: SeTakeOwnershipPrivilege 1020 WMIC.exe Token: SeLoadDriverPrivilege 1020 WMIC.exe Token: SeSystemProfilePrivilege 1020 WMIC.exe Token: SeSystemtimePrivilege 1020 WMIC.exe Token: SeProfSingleProcessPrivilege 1020 WMIC.exe Token: SeIncBasePriorityPrivilege 1020 WMIC.exe Token: SeCreatePagefilePrivilege 1020 WMIC.exe Token: SeBackupPrivilege 1020 WMIC.exe Token: SeRestorePrivilege 1020 WMIC.exe Token: SeShutdownPrivilege 1020 WMIC.exe Token: SeDebugPrivilege 1020 WMIC.exe Token: SeSystemEnvironmentPrivilege 1020 WMIC.exe Token: SeRemoteShutdownPrivilege 1020 WMIC.exe Token: SeUndockPrivilege 1020 WMIC.exe Token: SeManageVolumePrivilege 1020 WMIC.exe Token: 33 1020 WMIC.exe Token: 34 1020 WMIC.exe Token: 35 1020 WMIC.exe Token: SeBackupPrivilege 268 vssvc.exe Token: SeRestorePrivilege 268 vssvc.exe Token: SeAuditPrivilege 268 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exexpikpifqaqsw.exexpikpifqaqsw.exedescription pid Process procid_target PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1660 wrote to memory of 1756 1660 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 27 PID 1756 wrote to memory of 1696 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 28 PID 1756 wrote to memory of 1696 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 28 PID 1756 wrote to memory of 1696 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 28 PID 1756 wrote to memory of 1696 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 28 PID 1756 wrote to memory of 1084 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 29 PID 1756 wrote to memory of 1084 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 29 PID 1756 wrote to memory of 1084 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 29 PID 1756 wrote to memory of 1084 1756 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 29 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 1696 wrote to memory of 984 1696 xpikpifqaqsw.exe 31 PID 984 wrote to memory of 1020 984 xpikpifqaqsw.exe 32 PID 984 wrote to memory of 1020 984 xpikpifqaqsw.exe 32 PID 984 wrote to memory of 1020 984 xpikpifqaqsw.exe 32 PID 984 wrote to memory of 1020 984 xpikpifqaqsw.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
xpikpifqaqsw.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xpikpifqaqsw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xpikpifqaqsw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\xpikpifqaqsw.exeC:\Windows\xpikpifqaqsw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\xpikpifqaqsw.exeC:\Windows\xpikpifqaqsw.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:984 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\543144~1.EXE3⤵
- Deletes itself
PID:1084
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c