Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 16:11
Static task
static1
Behavioral task
behavioral1
Sample
5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe
Resource
win10v2004-20220722-en
General
-
Target
5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe
-
Size
384KB
-
MD5
644eaa7c99fcca51c624bff49d8c3050
-
SHA1
69d8df44b7f8b9eeceeb2473757d90f82189a867
-
SHA256
5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a
-
SHA512
0c8ee8ba29aac9bd9c9d2cb9ca8dd80bb9eb321d48874a7a3662491038f7611df3f0cb79bca3d84084acfdbd6b5cdb4ca33b2f68dd5f2118ba14227e2639f84a
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\Recovery+whtwn.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E3179BAC255FD9B
http://kkd47eh4hdjshb5t.angortra.at/E3179BAC255FD9B
http://ytrest84y5i456hghadefdsd.pontogrot.com/E3179BAC255FD9B
http://xlowfznrg4wf7dli.ONION/E3179BAC255FD9B
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1684 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe -
Deletes itself 1 IoCs
pid Process 988 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run ovthhtqarcjw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\uefqyfwhngyh = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ovthhtqarcjw.exe\"" ovthhtqarcjw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1828 set thread context of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1684 set thread context of 544 1684 ovthhtqarcjw.exe 32 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ovthhtqarcjw.exe 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe File opened for modification C:\Windows\ovthhtqarcjw.exe 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe 544 ovthhtqarcjw.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe Token: SeDebugPrivilege 544 ovthhtqarcjw.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeSecurityPrivilege 1728 WMIC.exe Token: SeTakeOwnershipPrivilege 1728 WMIC.exe Token: SeLoadDriverPrivilege 1728 WMIC.exe Token: SeSystemProfilePrivilege 1728 WMIC.exe Token: SeSystemtimePrivilege 1728 WMIC.exe Token: SeProfSingleProcessPrivilege 1728 WMIC.exe Token: SeIncBasePriorityPrivilege 1728 WMIC.exe Token: SeCreatePagefilePrivilege 1728 WMIC.exe Token: SeBackupPrivilege 1728 WMIC.exe Token: SeRestorePrivilege 1728 WMIC.exe Token: SeShutdownPrivilege 1728 WMIC.exe Token: SeDebugPrivilege 1728 WMIC.exe Token: SeSystemEnvironmentPrivilege 1728 WMIC.exe Token: SeRemoteShutdownPrivilege 1728 WMIC.exe Token: SeUndockPrivilege 1728 WMIC.exe Token: SeManageVolumePrivilege 1728 WMIC.exe Token: 33 1728 WMIC.exe Token: 34 1728 WMIC.exe Token: 35 1728 WMIC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 1828 wrote to memory of 944 1828 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 28 PID 944 wrote to memory of 1684 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 29 PID 944 wrote to memory of 1684 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 29 PID 944 wrote to memory of 1684 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 29 PID 944 wrote to memory of 1684 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 29 PID 944 wrote to memory of 988 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 30 PID 944 wrote to memory of 988 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 30 PID 944 wrote to memory of 988 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 30 PID 944 wrote to memory of 988 944 5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe 30 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 1684 wrote to memory of 544 1684 ovthhtqarcjw.exe 32 PID 544 wrote to memory of 1728 544 ovthhtqarcjw.exe 33 PID 544 wrote to memory of 1728 544 ovthhtqarcjw.exe 33 PID 544 wrote to memory of 1728 544 ovthhtqarcjw.exe 33 PID 544 wrote to memory of 1728 544 ovthhtqarcjw.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ovthhtqarcjw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ovthhtqarcjw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe"C:\Users\Admin\AppData\Local\Temp\5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe"C:\Users\Admin\AppData\Local\Temp\5bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\ovthhtqarcjw.exeC:\Windows\ovthhtqarcjw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\ovthhtqarcjw.exeC:\Windows\ovthhtqarcjw.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:544 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5BED0B~1.EXE3⤵
- Deletes itself
PID:988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5644eaa7c99fcca51c624bff49d8c3050
SHA169d8df44b7f8b9eeceeb2473757d90f82189a867
SHA2565bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a
SHA5120c8ee8ba29aac9bd9c9d2cb9ca8dd80bb9eb321d48874a7a3662491038f7611df3f0cb79bca3d84084acfdbd6b5cdb4ca33b2f68dd5f2118ba14227e2639f84a
-
Filesize
384KB
MD5644eaa7c99fcca51c624bff49d8c3050
SHA169d8df44b7f8b9eeceeb2473757d90f82189a867
SHA2565bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a
SHA5120c8ee8ba29aac9bd9c9d2cb9ca8dd80bb9eb321d48874a7a3662491038f7611df3f0cb79bca3d84084acfdbd6b5cdb4ca33b2f68dd5f2118ba14227e2639f84a
-
Filesize
384KB
MD5644eaa7c99fcca51c624bff49d8c3050
SHA169d8df44b7f8b9eeceeb2473757d90f82189a867
SHA2565bed0b42438cb4bcc5a5dc9a5c441ae97acbb2b09dc80ec9affe06e8589b482a
SHA5120c8ee8ba29aac9bd9c9d2cb9ca8dd80bb9eb321d48874a7a3662491038f7611df3f0cb79bca3d84084acfdbd6b5cdb4ca33b2f68dd5f2118ba14227e2639f84a