Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe
Resource
win10v2004-20220812-en
General
-
Target
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe
-
Size
360KB
-
MD5
dbba8491644acf773a7ade54a01181b0
-
SHA1
60220c18cead8c45b77fc4bc431650e4793a97e6
-
SHA256
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9
-
SHA512
771efbea0cf149bc2448f5f7f4c8c16dfea660ed82035de3a67a090fb39cfe9efeb5f64e1e689bb671fd027a9448bec24e7b3a1f25fd623a5f1a1e2213c79f60
-
SSDEEP
6144:kbxWqS4cQubBuQEFpyPdD6pE7e6iWiSunrany7nZ+f5vSMnb3on:kb4rQ2BuxF7wl4n+y7Z+f5vdon
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\_ReCoVeRy_+yefej.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4C31E6BEDDAF2527
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/4C31E6BEDDAF2527
http://yyre45dbvn2nhbefbmh.begumvelic.at/4C31E6BEDDAF2527
http://xlowfznrg4wf7dli.ONION/4C31E6BEDDAF2527
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
dxpftlwfqjlq.exepid Process 4440 dxpftlwfqjlq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exedxpftlwfqjlq.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dxpftlwfqjlq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dxpftlwfqjlq.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN dxpftlwfqjlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nypnqcg = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\dxpftlwfqjlq.exe" dxpftlwfqjlq.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dxpftlwfqjlq.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\gl.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\ado\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\DESIGNER\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\en-US\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\ExportReset.cr2 dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\History.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\_ReCoVeRy_+yefej.png dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\System\es-ES\_ReCoVeRy_+yefej.html dxpftlwfqjlq.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt dxpftlwfqjlq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\_ReCoVeRy_+yefej.txt dxpftlwfqjlq.exe -
Drops file in Windows directory 2 IoCs
Processes:
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exedescription ioc Process File created C:\Windows\dxpftlwfqjlq.exe 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe File opened for modification C:\Windows\dxpftlwfqjlq.exe 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dxpftlwfqjlq.exepid Process 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe 4440 dxpftlwfqjlq.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exedxpftlwfqjlq.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe Token: SeDebugPrivilege 4440 dxpftlwfqjlq.exe Token: SeIncreaseQuotaPrivilege 4688 WMIC.exe Token: SeSecurityPrivilege 4688 WMIC.exe Token: SeTakeOwnershipPrivilege 4688 WMIC.exe Token: SeLoadDriverPrivilege 4688 WMIC.exe Token: SeSystemProfilePrivilege 4688 WMIC.exe Token: SeSystemtimePrivilege 4688 WMIC.exe Token: SeProfSingleProcessPrivilege 4688 WMIC.exe Token: SeIncBasePriorityPrivilege 4688 WMIC.exe Token: SeCreatePagefilePrivilege 4688 WMIC.exe Token: SeBackupPrivilege 4688 WMIC.exe Token: SeRestorePrivilege 4688 WMIC.exe Token: SeShutdownPrivilege 4688 WMIC.exe Token: SeDebugPrivilege 4688 WMIC.exe Token: SeSystemEnvironmentPrivilege 4688 WMIC.exe Token: SeRemoteShutdownPrivilege 4688 WMIC.exe Token: SeUndockPrivilege 4688 WMIC.exe Token: SeManageVolumePrivilege 4688 WMIC.exe Token: 33 4688 WMIC.exe Token: 34 4688 WMIC.exe Token: 35 4688 WMIC.exe Token: 36 4688 WMIC.exe Token: SeIncreaseQuotaPrivilege 4688 WMIC.exe Token: SeSecurityPrivilege 4688 WMIC.exe Token: SeTakeOwnershipPrivilege 4688 WMIC.exe Token: SeLoadDriverPrivilege 4688 WMIC.exe Token: SeSystemProfilePrivilege 4688 WMIC.exe Token: SeSystemtimePrivilege 4688 WMIC.exe Token: SeProfSingleProcessPrivilege 4688 WMIC.exe Token: SeIncBasePriorityPrivilege 4688 WMIC.exe Token: SeCreatePagefilePrivilege 4688 WMIC.exe Token: SeBackupPrivilege 4688 WMIC.exe Token: SeRestorePrivilege 4688 WMIC.exe Token: SeShutdownPrivilege 4688 WMIC.exe Token: SeDebugPrivilege 4688 WMIC.exe Token: SeSystemEnvironmentPrivilege 4688 WMIC.exe Token: SeRemoteShutdownPrivilege 4688 WMIC.exe Token: SeUndockPrivilege 4688 WMIC.exe Token: SeManageVolumePrivilege 4688 WMIC.exe Token: 33 4688 WMIC.exe Token: 34 4688 WMIC.exe Token: 35 4688 WMIC.exe Token: 36 4688 WMIC.exe Token: SeBackupPrivilege 2232 vssvc.exe Token: SeRestorePrivilege 2232 vssvc.exe Token: SeAuditPrivilege 2232 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exedxpftlwfqjlq.exedescription pid Process procid_target PID 848 wrote to memory of 4440 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 84 PID 848 wrote to memory of 4440 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 84 PID 848 wrote to memory of 4440 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 84 PID 848 wrote to memory of 4872 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 86 PID 848 wrote to memory of 4872 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 86 PID 848 wrote to memory of 4872 848 987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe 86 PID 4440 wrote to memory of 4688 4440 dxpftlwfqjlq.exe 89 PID 4440 wrote to memory of 4688 4440 dxpftlwfqjlq.exe 89 -
System policy modification 1 TTPs 2 IoCs
Processes:
dxpftlwfqjlq.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dxpftlwfqjlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" dxpftlwfqjlq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe"C:\Users\Admin\AppData\Local\Temp\987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\dxpftlwfqjlq.exeC:\Windows\dxpftlwfqjlq.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4440 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\987B53~1.EXE2⤵PID:4872
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD5dbba8491644acf773a7ade54a01181b0
SHA160220c18cead8c45b77fc4bc431650e4793a97e6
SHA256987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9
SHA512771efbea0cf149bc2448f5f7f4c8c16dfea660ed82035de3a67a090fb39cfe9efeb5f64e1e689bb671fd027a9448bec24e7b3a1f25fd623a5f1a1e2213c79f60
-
Filesize
360KB
MD5dbba8491644acf773a7ade54a01181b0
SHA160220c18cead8c45b77fc4bc431650e4793a97e6
SHA256987b53381225e6a6ceae4ec2f19d51d1beaa00cef55773c92ec31341fd3c8eb9
SHA512771efbea0cf149bc2448f5f7f4c8c16dfea660ed82035de3a67a090fb39cfe9efeb5f64e1e689bb671fd027a9448bec24e7b3a1f25fd623a5f1a1e2213c79f60