Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 05:32
Static task
static1
Behavioral task
behavioral1
Sample
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe
Resource
win10v2004-20220721-en
General
-
Target
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe
-
Size
360KB
-
MD5
85315030e7efbe46eb1318d0bd0a558e
-
SHA1
1ed6de7ca6f0ab330bba35c15301ae0dc5338234
-
SHA256
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
-
SHA512
6c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+wydlt.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/33661A5894EB23A4
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/33661A5894EB23A4
http://yyre45dbvn2nhbefbmh.begumvelic.at/33661A5894EB23A4
http://xlowfznrg4wf7dli.ONION/33661A5894EB23A4
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+wydlt.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
dexposfdmwfe.exedexposfdmwfe.exepid process 1252 dexposfdmwfe.exe 1320 dexposfdmwfe.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1752 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dexposfdmwfe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN dexposfdmwfe.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkhgbdm = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\dexposfdmwfe.exe" dexposfdmwfe.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exedexposfdmwfe.exedescription pid process target process PID 1908 set thread context of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1252 set thread context of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe -
Drops file in Program Files directory 35 IoCs
Processes:
dexposfdmwfe.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\ar.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\History.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt dexposfdmwfe.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt dexposfdmwfe.exe -
Drops file in Windows directory 2 IoCs
Processes:
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exedescription ioc process File created C:\Windows\dexposfdmwfe.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe File opened for modification C:\Windows\dexposfdmwfe.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dexposfdmwfe.exepid process 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe 1320 dexposfdmwfe.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exedexposfdmwfe.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe Token: SeDebugPrivilege 1320 dexposfdmwfe.exe Token: SeIncreaseQuotaPrivilege 388 WMIC.exe Token: SeSecurityPrivilege 388 WMIC.exe Token: SeTakeOwnershipPrivilege 388 WMIC.exe Token: SeLoadDriverPrivilege 388 WMIC.exe Token: SeSystemProfilePrivilege 388 WMIC.exe Token: SeSystemtimePrivilege 388 WMIC.exe Token: SeProfSingleProcessPrivilege 388 WMIC.exe Token: SeIncBasePriorityPrivilege 388 WMIC.exe Token: SeCreatePagefilePrivilege 388 WMIC.exe Token: SeBackupPrivilege 388 WMIC.exe Token: SeRestorePrivilege 388 WMIC.exe Token: SeShutdownPrivilege 388 WMIC.exe Token: SeDebugPrivilege 388 WMIC.exe Token: SeSystemEnvironmentPrivilege 388 WMIC.exe Token: SeRemoteShutdownPrivilege 388 WMIC.exe Token: SeUndockPrivilege 388 WMIC.exe Token: SeManageVolumePrivilege 388 WMIC.exe Token: 33 388 WMIC.exe Token: 34 388 WMIC.exe Token: 35 388 WMIC.exe Token: SeIncreaseQuotaPrivilege 388 WMIC.exe Token: SeSecurityPrivilege 388 WMIC.exe Token: SeTakeOwnershipPrivilege 388 WMIC.exe Token: SeLoadDriverPrivilege 388 WMIC.exe Token: SeSystemProfilePrivilege 388 WMIC.exe Token: SeSystemtimePrivilege 388 WMIC.exe Token: SeProfSingleProcessPrivilege 388 WMIC.exe Token: SeIncBasePriorityPrivilege 388 WMIC.exe Token: SeCreatePagefilePrivilege 388 WMIC.exe Token: SeBackupPrivilege 388 WMIC.exe Token: SeRestorePrivilege 388 WMIC.exe Token: SeShutdownPrivilege 388 WMIC.exe Token: SeDebugPrivilege 388 WMIC.exe Token: SeSystemEnvironmentPrivilege 388 WMIC.exe Token: SeRemoteShutdownPrivilege 388 WMIC.exe Token: SeUndockPrivilege 388 WMIC.exe Token: SeManageVolumePrivilege 388 WMIC.exe Token: 33 388 WMIC.exe Token: 34 388 WMIC.exe Token: 35 388 WMIC.exe Token: SeBackupPrivilege 1768 vssvc.exe Token: SeRestorePrivilege 1768 vssvc.exe Token: SeAuditPrivilege 1768 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exedexposfdmwfe.exedexposfdmwfe.exedescription pid process target process PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 1908 wrote to memory of 992 1908 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe PID 992 wrote to memory of 1252 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe dexposfdmwfe.exe PID 992 wrote to memory of 1252 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe dexposfdmwfe.exe PID 992 wrote to memory of 1252 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe dexposfdmwfe.exe PID 992 wrote to memory of 1252 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe dexposfdmwfe.exe PID 992 wrote to memory of 1752 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe cmd.exe PID 992 wrote to memory of 1752 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe cmd.exe PID 992 wrote to memory of 1752 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe cmd.exe PID 992 wrote to memory of 1752 992 5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe cmd.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1252 wrote to memory of 1320 1252 dexposfdmwfe.exe dexposfdmwfe.exe PID 1320 wrote to memory of 388 1320 dexposfdmwfe.exe WMIC.exe PID 1320 wrote to memory of 388 1320 dexposfdmwfe.exe WMIC.exe PID 1320 wrote to memory of 388 1320 dexposfdmwfe.exe WMIC.exe PID 1320 wrote to memory of 388 1320 dexposfdmwfe.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
dexposfdmwfe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dexposfdmwfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" dexposfdmwfe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe"C:\Users\Admin\AppData\Local\Temp\5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe"C:\Users\Admin\AppData\Local\Temp\5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\dexposfdmwfe.exeC:\Windows\dexposfdmwfe.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\dexposfdmwfe.exeC:\Windows\dexposfdmwfe.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1320 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5CB5F1~1.EXE3⤵
- Deletes itself
PID:1752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD585315030e7efbe46eb1318d0bd0a558e
SHA11ed6de7ca6f0ab330bba35c15301ae0dc5338234
SHA2565cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
SHA5126c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958
-
Filesize
360KB
MD585315030e7efbe46eb1318d0bd0a558e
SHA11ed6de7ca6f0ab330bba35c15301ae0dc5338234
SHA2565cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
SHA5126c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958
-
Filesize
360KB
MD585315030e7efbe46eb1318d0bd0a558e
SHA11ed6de7ca6f0ab330bba35c15301ae0dc5338234
SHA2565cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
SHA5126c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958