Analysis
-
max time kernel
12s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe
Resource
win10v2004-20220901-en
General
-
Target
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe
-
Size
424KB
-
MD5
325f660b6e6802581315052c0d9b190c
-
SHA1
48b6692d89e64f513a48b51dc84bf14cb535b84b
-
SHA256
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5
-
SHA512
bdf1800aaa75effe7faeaf65fc253588253333408d7f623b923dd741b4778512f666e0b26fecdda3a51b1e3fa27c377f4a7d77ab37bfbd1c1612c5d4a497939d
-
SSDEEP
12288:Zj6qMoki2//HuarKqen05/QexvmBG3zbblCJxfS6:ZjPQ/HdQoq2fOR1
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+dfaer.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F3E1CB5427CBCA2A
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F3E1CB5427CBCA2A
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/F3E1CB5427CBCA2A
http://xlowfznrg4wf7dli.ONION/F3E1CB5427CBCA2A
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
mjxokffihtoq.exepid process 2236 mjxokffihtoq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exemjxokffihtoq.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mjxokffihtoq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mjxokffihtoq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run mjxokffihtoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fwgpgpysjtpn = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mjxokffihtoq.exe\"" mjxokffihtoq.exe -
Drops file in Program Files directory 64 IoCs
Processes:
mjxokffihtoq.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\fa.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\History.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt mjxokffihtoq.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt mjxokffihtoq.exe -
Drops file in Windows directory 2 IoCs
Processes:
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exedescription ioc process File opened for modification C:\Windows\mjxokffihtoq.exe 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe File created C:\Windows\mjxokffihtoq.exe 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
mjxokffihtoq.exepid process 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe 2236 mjxokffihtoq.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exemjxokffihtoq.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe Token: SeDebugPrivilege 2236 mjxokffihtoq.exe Token: SeIncreaseQuotaPrivilege 4436 WMIC.exe Token: SeSecurityPrivilege 4436 WMIC.exe Token: SeTakeOwnershipPrivilege 4436 WMIC.exe Token: SeLoadDriverPrivilege 4436 WMIC.exe Token: SeSystemProfilePrivilege 4436 WMIC.exe Token: SeSystemtimePrivilege 4436 WMIC.exe Token: SeProfSingleProcessPrivilege 4436 WMIC.exe Token: SeIncBasePriorityPrivilege 4436 WMIC.exe Token: SeCreatePagefilePrivilege 4436 WMIC.exe Token: SeBackupPrivilege 4436 WMIC.exe Token: SeRestorePrivilege 4436 WMIC.exe Token: SeShutdownPrivilege 4436 WMIC.exe Token: SeDebugPrivilege 4436 WMIC.exe Token: SeSystemEnvironmentPrivilege 4436 WMIC.exe Token: SeRemoteShutdownPrivilege 4436 WMIC.exe Token: SeUndockPrivilege 4436 WMIC.exe Token: SeManageVolumePrivilege 4436 WMIC.exe Token: 33 4436 WMIC.exe Token: 34 4436 WMIC.exe Token: 35 4436 WMIC.exe Token: 36 4436 WMIC.exe Token: SeIncreaseQuotaPrivilege 4436 WMIC.exe Token: SeSecurityPrivilege 4436 WMIC.exe Token: SeTakeOwnershipPrivilege 4436 WMIC.exe Token: SeLoadDriverPrivilege 4436 WMIC.exe Token: SeSystemProfilePrivilege 4436 WMIC.exe Token: SeSystemtimePrivilege 4436 WMIC.exe Token: SeProfSingleProcessPrivilege 4436 WMIC.exe Token: SeIncBasePriorityPrivilege 4436 WMIC.exe Token: SeCreatePagefilePrivilege 4436 WMIC.exe Token: SeBackupPrivilege 4436 WMIC.exe Token: SeRestorePrivilege 4436 WMIC.exe Token: SeShutdownPrivilege 4436 WMIC.exe Token: SeDebugPrivilege 4436 WMIC.exe Token: SeSystemEnvironmentPrivilege 4436 WMIC.exe Token: SeRemoteShutdownPrivilege 4436 WMIC.exe Token: SeUndockPrivilege 4436 WMIC.exe Token: SeManageVolumePrivilege 4436 WMIC.exe Token: 33 4436 WMIC.exe Token: 34 4436 WMIC.exe Token: 35 4436 WMIC.exe Token: 36 4436 WMIC.exe Token: SeBackupPrivilege 3108 vssvc.exe Token: SeRestorePrivilege 3108 vssvc.exe Token: SeAuditPrivilege 3108 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exemjxokffihtoq.exedescription pid process target process PID 1128 wrote to memory of 2236 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe mjxokffihtoq.exe PID 1128 wrote to memory of 2236 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe mjxokffihtoq.exe PID 1128 wrote to memory of 2236 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe mjxokffihtoq.exe PID 1128 wrote to memory of 4460 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe cmd.exe PID 1128 wrote to memory of 4460 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe cmd.exe PID 1128 wrote to memory of 4460 1128 72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe cmd.exe PID 2236 wrote to memory of 4436 2236 mjxokffihtoq.exe WMIC.exe PID 2236 wrote to memory of 4436 2236 mjxokffihtoq.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
mjxokffihtoq.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mjxokffihtoq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mjxokffihtoq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe"C:\Users\Admin\AppData\Local\Temp\72ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\mjxokffihtoq.exeC:\Windows\mjxokffihtoq.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2236 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\72EBC6~1.EXE2⤵PID:4460
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5325f660b6e6802581315052c0d9b190c
SHA148b6692d89e64f513a48b51dc84bf14cb535b84b
SHA25672ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5
SHA512bdf1800aaa75effe7faeaf65fc253588253333408d7f623b923dd741b4778512f666e0b26fecdda3a51b1e3fa27c377f4a7d77ab37bfbd1c1612c5d4a497939d
-
Filesize
424KB
MD5325f660b6e6802581315052c0d9b190c
SHA148b6692d89e64f513a48b51dc84bf14cb535b84b
SHA25672ebc64f86ef3c07e200b7b575c87baec6b150340b58dc948d4c15390a7a52a5
SHA512bdf1800aaa75effe7faeaf65fc253588253333408d7f623b923dd741b4778512f666e0b26fecdda3a51b1e3fa27c377f4a7d77ab37bfbd1c1612c5d4a497939d