Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2022 20:03
Static task
static1
Behavioral task
behavioral1
Sample
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe
Resource
win10v2004-20220721-en
General
-
Target
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe
-
Size
344KB
-
MD5
2bba3e4d34098cc1ffbb8ddd8cd64086
-
SHA1
e353968444ce29d8a23a24506ed9f68604c6ad15
-
SHA256
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f
-
SHA512
35a9a77d93070a60ee8dfb4150754da61b59641df4b619f44ce94933ddb43d6d88ab1ad612a50541d15e7dc5711922d42b31a5accaf33ab8b9f8dad2eee4cc0e
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\Recovery+vikuv.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/13D51CDE2F1E29D0
http://tes543berda73i48fsdfsd.keratadze.at/13D51CDE2F1E29D0
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/13D51CDE2F1E29D0
http://xlowfznrg4wf7dli.ONION/13D51CDE2F1E29D0
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
etjimshewmcq.exeetjimshewmcq.exepid Process 4888 etjimshewmcq.exe 544 etjimshewmcq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exeetjimshewmcq.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation etjimshewmcq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
etjimshewmcq.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\Run etjimshewmcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\itanoemvmtkh = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\etjimshewmcq.exe\"" etjimshewmcq.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exeetjimshewmcq.exedescription pid Process procid_target PID 4084 set thread context of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4888 set thread context of 544 4888 etjimshewmcq.exe 89 -
Drops file in Program Files directory 64 IoCs
Processes:
etjimshewmcq.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\cy.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt etjimshewmcq.exe File opened for modification C:\Program Files\7-Zip\History.txt etjimshewmcq.exe -
Drops file in Windows directory 2 IoCs
Processes:
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exedescription ioc Process File created C:\Windows\etjimshewmcq.exe 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe File opened for modification C:\Windows\etjimshewmcq.exe 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
etjimshewmcq.exepid Process 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe 544 etjimshewmcq.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exeetjimshewmcq.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe Token: SeDebugPrivilege 544 etjimshewmcq.exe Token: SeIncreaseQuotaPrivilege 4932 WMIC.exe Token: SeSecurityPrivilege 4932 WMIC.exe Token: SeTakeOwnershipPrivilege 4932 WMIC.exe Token: SeLoadDriverPrivilege 4932 WMIC.exe Token: SeSystemProfilePrivilege 4932 WMIC.exe Token: SeSystemtimePrivilege 4932 WMIC.exe Token: SeProfSingleProcessPrivilege 4932 WMIC.exe Token: SeIncBasePriorityPrivilege 4932 WMIC.exe Token: SeCreatePagefilePrivilege 4932 WMIC.exe Token: SeBackupPrivilege 4932 WMIC.exe Token: SeRestorePrivilege 4932 WMIC.exe Token: SeShutdownPrivilege 4932 WMIC.exe Token: SeDebugPrivilege 4932 WMIC.exe Token: SeSystemEnvironmentPrivilege 4932 WMIC.exe Token: SeRemoteShutdownPrivilege 4932 WMIC.exe Token: SeUndockPrivilege 4932 WMIC.exe Token: SeManageVolumePrivilege 4932 WMIC.exe Token: 33 4932 WMIC.exe Token: 34 4932 WMIC.exe Token: 35 4932 WMIC.exe Token: 36 4932 WMIC.exe Token: SeIncreaseQuotaPrivilege 4932 WMIC.exe Token: SeSecurityPrivilege 4932 WMIC.exe Token: SeTakeOwnershipPrivilege 4932 WMIC.exe Token: SeLoadDriverPrivilege 4932 WMIC.exe Token: SeSystemProfilePrivilege 4932 WMIC.exe Token: SeSystemtimePrivilege 4932 WMIC.exe Token: SeProfSingleProcessPrivilege 4932 WMIC.exe Token: SeIncBasePriorityPrivilege 4932 WMIC.exe Token: SeCreatePagefilePrivilege 4932 WMIC.exe Token: SeBackupPrivilege 4932 WMIC.exe Token: SeRestorePrivilege 4932 WMIC.exe Token: SeShutdownPrivilege 4932 WMIC.exe Token: SeDebugPrivilege 4932 WMIC.exe Token: SeSystemEnvironmentPrivilege 4932 WMIC.exe Token: SeRemoteShutdownPrivilege 4932 WMIC.exe Token: SeUndockPrivilege 4932 WMIC.exe Token: SeManageVolumePrivilege 4932 WMIC.exe Token: 33 4932 WMIC.exe Token: 34 4932 WMIC.exe Token: 35 4932 WMIC.exe Token: 36 4932 WMIC.exe Token: SeBackupPrivilege 4432 vssvc.exe Token: SeRestorePrivilege 4432 vssvc.exe Token: SeAuditPrivilege 4432 vssvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exeetjimshewmcq.exeetjimshewmcq.exedescription pid Process procid_target PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4084 wrote to memory of 4900 4084 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 82 PID 4900 wrote to memory of 4888 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 84 PID 4900 wrote to memory of 4888 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 84 PID 4900 wrote to memory of 4888 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 84 PID 4900 wrote to memory of 4924 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 85 PID 4900 wrote to memory of 4924 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 85 PID 4900 wrote to memory of 4924 4900 61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe 85 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 4888 wrote to memory of 544 4888 etjimshewmcq.exe 89 PID 544 wrote to memory of 4932 544 etjimshewmcq.exe 92 PID 544 wrote to memory of 4932 544 etjimshewmcq.exe 92 -
System policy modification 1 TTPs 2 IoCs
Processes:
etjimshewmcq.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System etjimshewmcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" etjimshewmcq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe"C:\Users\Admin\AppData\Local\Temp\61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe"C:\Users\Admin\AppData\Local\Temp\61cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\etjimshewmcq.exeC:\Windows\etjimshewmcq.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\etjimshewmcq.exeC:\Windows\etjimshewmcq.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:544 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\61CC8C~1.EXE3⤵PID:4924
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD52bba3e4d34098cc1ffbb8ddd8cd64086
SHA1e353968444ce29d8a23a24506ed9f68604c6ad15
SHA25661cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f
SHA51235a9a77d93070a60ee8dfb4150754da61b59641df4b619f44ce94933ddb43d6d88ab1ad612a50541d15e7dc5711922d42b31a5accaf33ab8b9f8dad2eee4cc0e
-
Filesize
344KB
MD52bba3e4d34098cc1ffbb8ddd8cd64086
SHA1e353968444ce29d8a23a24506ed9f68604c6ad15
SHA25661cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f
SHA51235a9a77d93070a60ee8dfb4150754da61b59641df4b619f44ce94933ddb43d6d88ab1ad612a50541d15e7dc5711922d42b31a5accaf33ab8b9f8dad2eee4cc0e
-
Filesize
344KB
MD52bba3e4d34098cc1ffbb8ddd8cd64086
SHA1e353968444ce29d8a23a24506ed9f68604c6ad15
SHA25661cc8c36085bc4a140f74d11b99ef047877d8f9d4107418627a3f978c495095f
SHA51235a9a77d93070a60ee8dfb4150754da61b59641df4b619f44ce94933ddb43d6d88ab1ad612a50541d15e7dc5711922d42b31a5accaf33ab8b9f8dad2eee4cc0e