Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe
Resource
win10v2004-20220812-en
General
-
Target
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe
-
Size
424KB
-
MD5
a2801a0ac7d6204ec19ec708228e5a0b
-
SHA1
692a926583bcf3aed9fa28678435b6d7921e49ab
-
SHA256
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915
-
SHA512
b62f40f4ef79a4538afa609a0e66838339c1e54e3340d917fbf2ac7e59d6b7487b4807a1f18088736963b4030c0f28de8c43b6bfc2ddd7d72235cc3a6ea05190
-
SSDEEP
6144:tgqUTWoodwYn0vpNnjB6SZk+L6gmo/b7EqAAwp8oXbftChXW3AxfulDGgB:DUTRoKN7nt6S2+LN/AqgpZblCJxfS6
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\_RECoVERY_+hvmrl.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/512376AAEA8267
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/512376AAEA8267
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/512376AAEA8267
http://xlowfznrg4wf7dli.ONION/512376AAEA8267
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
oiftsttecacq.exepid process 4928 oiftsttecacq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exeoiftsttecacq.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation oiftsttecacq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
oiftsttecacq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run oiftsttecacq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuufcecornc = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\oiftsttecacq.exe\"" oiftsttecacq.exe -
Drops file in Windows directory 2 IoCs
Processes:
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exedescription ioc process File created C:\Windows\oiftsttecacq.exe 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe File opened for modification C:\Windows\oiftsttecacq.exe 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
oiftsttecacq.exepid process 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe 4928 oiftsttecacq.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exeoiftsttecacq.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe Token: SeDebugPrivilege 4928 oiftsttecacq.exe Token: SeIncreaseQuotaPrivilege 1896 WMIC.exe Token: SeSecurityPrivilege 1896 WMIC.exe Token: SeTakeOwnershipPrivilege 1896 WMIC.exe Token: SeLoadDriverPrivilege 1896 WMIC.exe Token: SeSystemProfilePrivilege 1896 WMIC.exe Token: SeSystemtimePrivilege 1896 WMIC.exe Token: SeProfSingleProcessPrivilege 1896 WMIC.exe Token: SeIncBasePriorityPrivilege 1896 WMIC.exe Token: SeCreatePagefilePrivilege 1896 WMIC.exe Token: SeBackupPrivilege 1896 WMIC.exe Token: SeRestorePrivilege 1896 WMIC.exe Token: SeShutdownPrivilege 1896 WMIC.exe Token: SeDebugPrivilege 1896 WMIC.exe Token: SeSystemEnvironmentPrivilege 1896 WMIC.exe Token: SeRemoteShutdownPrivilege 1896 WMIC.exe Token: SeUndockPrivilege 1896 WMIC.exe Token: SeManageVolumePrivilege 1896 WMIC.exe Token: 33 1896 WMIC.exe Token: 34 1896 WMIC.exe Token: 35 1896 WMIC.exe Token: 36 1896 WMIC.exe Token: SeIncreaseQuotaPrivilege 1896 WMIC.exe Token: SeSecurityPrivilege 1896 WMIC.exe Token: SeTakeOwnershipPrivilege 1896 WMIC.exe Token: SeLoadDriverPrivilege 1896 WMIC.exe Token: SeSystemProfilePrivilege 1896 WMIC.exe Token: SeSystemtimePrivilege 1896 WMIC.exe Token: SeProfSingleProcessPrivilege 1896 WMIC.exe Token: SeIncBasePriorityPrivilege 1896 WMIC.exe Token: SeCreatePagefilePrivilege 1896 WMIC.exe Token: SeBackupPrivilege 1896 WMIC.exe Token: SeRestorePrivilege 1896 WMIC.exe Token: SeShutdownPrivilege 1896 WMIC.exe Token: SeDebugPrivilege 1896 WMIC.exe Token: SeSystemEnvironmentPrivilege 1896 WMIC.exe Token: SeRemoteShutdownPrivilege 1896 WMIC.exe Token: SeUndockPrivilege 1896 WMIC.exe Token: SeManageVolumePrivilege 1896 WMIC.exe Token: 33 1896 WMIC.exe Token: 34 1896 WMIC.exe Token: 35 1896 WMIC.exe Token: 36 1896 WMIC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exeoiftsttecacq.exedescription pid process target process PID 4636 wrote to memory of 4928 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe oiftsttecacq.exe PID 4636 wrote to memory of 4928 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe oiftsttecacq.exe PID 4636 wrote to memory of 4928 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe oiftsttecacq.exe PID 4636 wrote to memory of 4388 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe cmd.exe PID 4636 wrote to memory of 4388 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe cmd.exe PID 4636 wrote to memory of 4388 4636 323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe cmd.exe PID 4928 wrote to memory of 1896 4928 oiftsttecacq.exe WMIC.exe PID 4928 wrote to memory of 1896 4928 oiftsttecacq.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
oiftsttecacq.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System oiftsttecacq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" oiftsttecacq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe"C:\Users\Admin\AppData\Local\Temp\323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\oiftsttecacq.exeC:\Windows\oiftsttecacq.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4928 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\323B85~1.EXE2⤵PID:4388
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5a2801a0ac7d6204ec19ec708228e5a0b
SHA1692a926583bcf3aed9fa28678435b6d7921e49ab
SHA256323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915
SHA512b62f40f4ef79a4538afa609a0e66838339c1e54e3340d917fbf2ac7e59d6b7487b4807a1f18088736963b4030c0f28de8c43b6bfc2ddd7d72235cc3a6ea05190
-
Filesize
424KB
MD5a2801a0ac7d6204ec19ec708228e5a0b
SHA1692a926583bcf3aed9fa28678435b6d7921e49ab
SHA256323b8534996ed1f42e206831aa00b77c91f20e428263b1534a1db3c2abab4915
SHA512b62f40f4ef79a4538afa609a0e66838339c1e54e3340d917fbf2ac7e59d6b7487b4807a1f18088736963b4030c0f28de8c43b6bfc2ddd7d72235cc3a6ea05190