Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 06:11
Static task
static1
Behavioral task
behavioral1
Sample
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe
Resource
win10v2004-20220722-en
General
-
Target
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe
-
Size
276KB
-
MD5
1337977b7af4214aedeb3c4b237bc9e8
-
SHA1
7f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
-
SHA256
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
-
SHA512
a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ylgku.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4C4896E112CC541C
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/4C4896E112CC541C
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/4C4896E112CC541C
http://xlowfznrg4wf7dli.ONION/4C4896E112CC541C
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ylgku.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
nuugtvehtvlf.exenuugtvehtvlf.exepid process 1048 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2016 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
nuugtvehtvlf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN nuugtvehtvlf.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqncvgu = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\nuugtvehtvlf.exe" nuugtvehtvlf.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exenuugtvehtvlf.exedescription pid process target process PID 1476 set thread context of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1048 set thread context of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe -
Drops file in Program Files directory 41 IoCs
Processes:
nuugtvehtvlf.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\cy.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\History.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt nuugtvehtvlf.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt nuugtvehtvlf.exe -
Drops file in Windows directory 2 IoCs
Processes:
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exedescription ioc process File created C:\Windows\nuugtvehtvlf.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe File opened for modification C:\Windows\nuugtvehtvlf.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
nuugtvehtvlf.exepid process 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe 332 nuugtvehtvlf.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exenuugtvehtvlf.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe Token: SeDebugPrivilege 332 nuugtvehtvlf.exe Token: SeIncreaseQuotaPrivilege 892 WMIC.exe Token: SeSecurityPrivilege 892 WMIC.exe Token: SeTakeOwnershipPrivilege 892 WMIC.exe Token: SeLoadDriverPrivilege 892 WMIC.exe Token: SeSystemProfilePrivilege 892 WMIC.exe Token: SeSystemtimePrivilege 892 WMIC.exe Token: SeProfSingleProcessPrivilege 892 WMIC.exe Token: SeIncBasePriorityPrivilege 892 WMIC.exe Token: SeCreatePagefilePrivilege 892 WMIC.exe Token: SeBackupPrivilege 892 WMIC.exe Token: SeRestorePrivilege 892 WMIC.exe Token: SeShutdownPrivilege 892 WMIC.exe Token: SeDebugPrivilege 892 WMIC.exe Token: SeSystemEnvironmentPrivilege 892 WMIC.exe Token: SeRemoteShutdownPrivilege 892 WMIC.exe Token: SeUndockPrivilege 892 WMIC.exe Token: SeManageVolumePrivilege 892 WMIC.exe Token: 33 892 WMIC.exe Token: 34 892 WMIC.exe Token: 35 892 WMIC.exe Token: SeIncreaseQuotaPrivilege 892 WMIC.exe Token: SeSecurityPrivilege 892 WMIC.exe Token: SeTakeOwnershipPrivilege 892 WMIC.exe Token: SeLoadDriverPrivilege 892 WMIC.exe Token: SeSystemProfilePrivilege 892 WMIC.exe Token: SeSystemtimePrivilege 892 WMIC.exe Token: SeProfSingleProcessPrivilege 892 WMIC.exe Token: SeIncBasePriorityPrivilege 892 WMIC.exe Token: SeCreatePagefilePrivilege 892 WMIC.exe Token: SeBackupPrivilege 892 WMIC.exe Token: SeRestorePrivilege 892 WMIC.exe Token: SeShutdownPrivilege 892 WMIC.exe Token: SeDebugPrivilege 892 WMIC.exe Token: SeSystemEnvironmentPrivilege 892 WMIC.exe Token: SeRemoteShutdownPrivilege 892 WMIC.exe Token: SeUndockPrivilege 892 WMIC.exe Token: SeManageVolumePrivilege 892 WMIC.exe Token: 33 892 WMIC.exe Token: 34 892 WMIC.exe Token: 35 892 WMIC.exe Token: SeBackupPrivilege 992 vssvc.exe Token: SeRestorePrivilege 992 vssvc.exe Token: SeAuditPrivilege 992 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exenuugtvehtvlf.exenuugtvehtvlf.exedescription pid process target process PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 1476 wrote to memory of 528 1476 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe PID 528 wrote to memory of 1048 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe nuugtvehtvlf.exe PID 528 wrote to memory of 1048 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe nuugtvehtvlf.exe PID 528 wrote to memory of 1048 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe nuugtvehtvlf.exe PID 528 wrote to memory of 1048 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe nuugtvehtvlf.exe PID 528 wrote to memory of 2016 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe cmd.exe PID 528 wrote to memory of 2016 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe cmd.exe PID 528 wrote to memory of 2016 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe cmd.exe PID 528 wrote to memory of 2016 528 6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe cmd.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 1048 wrote to memory of 332 1048 nuugtvehtvlf.exe nuugtvehtvlf.exe PID 332 wrote to memory of 892 332 nuugtvehtvlf.exe WMIC.exe PID 332 wrote to memory of 892 332 nuugtvehtvlf.exe WMIC.exe PID 332 wrote to memory of 892 332 nuugtvehtvlf.exe WMIC.exe PID 332 wrote to memory of 892 332 nuugtvehtvlf.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
nuugtvehtvlf.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nuugtvehtvlf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nuugtvehtvlf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe"C:\Users\Admin\AppData\Local\Temp\6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe"C:\Users\Admin\AppData\Local\Temp\6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\nuugtvehtvlf.exeC:\Windows\nuugtvehtvlf.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\nuugtvehtvlf.exeC:\Windows\nuugtvehtvlf.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:332 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\6039A3~1.EXE3⤵
- Deletes itself
PID:2016
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD51337977b7af4214aedeb3c4b237bc9e8
SHA17f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
SHA2566039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
SHA512a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d
-
Filesize
276KB
MD51337977b7af4214aedeb3c4b237bc9e8
SHA17f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
SHA2566039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
SHA512a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d
-
Filesize
276KB
MD51337977b7af4214aedeb3c4b237bc9e8
SHA17f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
SHA2566039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
SHA512a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d