Analysis
-
max time kernel
166s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 20:01
Static task
static1
Behavioral task
behavioral1
Sample
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
Resource
win10v2004-20220721-en
General
-
Target
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe
-
Size
368KB
-
MD5
0d3571a8ca8ef2fede9e3e11b8761582
-
SHA1
f2b0416e2afe93050816f62646ecae6080a9e559
-
SHA256
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
-
SHA512
1474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_RECoVERY_+tepye.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F17D8283F1CC45
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F17D8283F1CC45
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/F17D8283F1CC45
http://xlowfznrg4wf7dli.ONION/F17D8283F1CC45
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1204 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation awmlmdgrwebk.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\Run awmlmdgrwebk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lfjhhaxlsxvu = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\awmlmdgrwebk.exe\"" awmlmdgrwebk.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2224 set thread context of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 1204 set thread context of 956 1204 awmlmdgrwebk.exe 87 -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\da.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\History.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt awmlmdgrwebk.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt awmlmdgrwebk.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\awmlmdgrwebk.exe 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe File opened for modification C:\Windows\awmlmdgrwebk.exe 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe 956 awmlmdgrwebk.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe Token: SeDebugPrivilege 956 awmlmdgrwebk.exe Token: SeIncreaseQuotaPrivilege 3988 WMIC.exe Token: SeSecurityPrivilege 3988 WMIC.exe Token: SeTakeOwnershipPrivilege 3988 WMIC.exe Token: SeLoadDriverPrivilege 3988 WMIC.exe Token: SeSystemProfilePrivilege 3988 WMIC.exe Token: SeSystemtimePrivilege 3988 WMIC.exe Token: SeProfSingleProcessPrivilege 3988 WMIC.exe Token: SeIncBasePriorityPrivilege 3988 WMIC.exe Token: SeCreatePagefilePrivilege 3988 WMIC.exe Token: SeBackupPrivilege 3988 WMIC.exe Token: SeRestorePrivilege 3988 WMIC.exe Token: SeShutdownPrivilege 3988 WMIC.exe Token: SeDebugPrivilege 3988 WMIC.exe Token: SeSystemEnvironmentPrivilege 3988 WMIC.exe Token: SeRemoteShutdownPrivilege 3988 WMIC.exe Token: SeUndockPrivilege 3988 WMIC.exe Token: SeManageVolumePrivilege 3988 WMIC.exe Token: 33 3988 WMIC.exe Token: 34 3988 WMIC.exe Token: 35 3988 WMIC.exe Token: 36 3988 WMIC.exe Token: SeIncreaseQuotaPrivilege 3988 WMIC.exe Token: SeSecurityPrivilege 3988 WMIC.exe Token: SeTakeOwnershipPrivilege 3988 WMIC.exe Token: SeLoadDriverPrivilege 3988 WMIC.exe Token: SeSystemProfilePrivilege 3988 WMIC.exe Token: SeSystemtimePrivilege 3988 WMIC.exe Token: SeProfSingleProcessPrivilege 3988 WMIC.exe Token: SeIncBasePriorityPrivilege 3988 WMIC.exe Token: SeCreatePagefilePrivilege 3988 WMIC.exe Token: SeBackupPrivilege 3988 WMIC.exe Token: SeRestorePrivilege 3988 WMIC.exe Token: SeShutdownPrivilege 3988 WMIC.exe Token: SeDebugPrivilege 3988 WMIC.exe Token: SeSystemEnvironmentPrivilege 3988 WMIC.exe Token: SeRemoteShutdownPrivilege 3988 WMIC.exe Token: SeUndockPrivilege 3988 WMIC.exe Token: SeManageVolumePrivilege 3988 WMIC.exe Token: 33 3988 WMIC.exe Token: 34 3988 WMIC.exe Token: 35 3988 WMIC.exe Token: 36 3988 WMIC.exe Token: SeBackupPrivilege 2136 vssvc.exe Token: SeRestorePrivilege 2136 vssvc.exe Token: SeAuditPrivilege 2136 vssvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 2224 wrote to memory of 1492 2224 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 83 PID 1492 wrote to memory of 1204 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 84 PID 1492 wrote to memory of 1204 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 84 PID 1492 wrote to memory of 1204 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 84 PID 1492 wrote to memory of 2744 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 85 PID 1492 wrote to memory of 2744 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 85 PID 1492 wrote to memory of 2744 1492 543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe 85 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 1204 wrote to memory of 956 1204 awmlmdgrwebk.exe 87 PID 956 wrote to memory of 3988 956 awmlmdgrwebk.exe 88 PID 956 wrote to memory of 3988 956 awmlmdgrwebk.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System awmlmdgrwebk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" awmlmdgrwebk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"C:\Users\Admin\AppData\Local\Temp\543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\awmlmdgrwebk.exeC:\Windows\awmlmdgrwebk.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\awmlmdgrwebk.exeC:\Windows\awmlmdgrwebk.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:956 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\543144~1.EXE3⤵PID:2744
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
-
Filesize
368KB
MD50d3571a8ca8ef2fede9e3e11b8761582
SHA1f2b0416e2afe93050816f62646ecae6080a9e559
SHA256543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
SHA5121474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c