Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 00:29
Static task
static1
Behavioral task
behavioral1
Sample
ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe
Resource
win10v2004-20220812-en
General
-
Target
ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe
-
Size
428KB
-
MD5
bbef617aa4842cc8c85ef7dfc686239c
-
SHA1
e8672962fd43d169f5d375d6afaa01dd70f3b129
-
SHA256
ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be
-
SHA512
24353a0d67c2782943861c11b40b8b923f99d0cefbd2ef0770b6b13fc68724a3d49cc93404b7cc5e5bb0904791905c0049d5c8ef8a0a9ef866dd06585775e74f
-
SSDEEP
12288:FGWf3BWLqi/f3xF7PxqViWValazc5ICyPFblCJxfS6:7BSqi/fxWiWVQqJOR1
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\_RECoVERY_+flqxs.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C3FE775A84F913D
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C3FE775A84F913D
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C3FE775A84F913D
http://xlowfznrg4wf7dli.ONION/C3FE775A84F913D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 3732 yubfvuhmgtsm.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation yubfvuhmgtsm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run yubfvuhmgtsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sctnvvlvysdk = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\yubfvuhmgtsm.exe\"" yubfvuhmgtsm.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\CheckpointOpen.mov yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\License.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\DESIGNER\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sk-SK\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\_RECoVERY_+flqxs.png yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\_RECoVERY_+flqxs.txt yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\_RECoVERY_+flqxs.html yubfvuhmgtsm.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\yubfvuhmgtsm.exe ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe File opened for modification C:\Windows\yubfvuhmgtsm.exe ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe 3732 yubfvuhmgtsm.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe Token: SeDebugPrivilege 3732 yubfvuhmgtsm.exe Token: SeIncreaseQuotaPrivilege 2808 WMIC.exe Token: SeSecurityPrivilege 2808 WMIC.exe Token: SeTakeOwnershipPrivilege 2808 WMIC.exe Token: SeLoadDriverPrivilege 2808 WMIC.exe Token: SeSystemProfilePrivilege 2808 WMIC.exe Token: SeSystemtimePrivilege 2808 WMIC.exe Token: SeProfSingleProcessPrivilege 2808 WMIC.exe Token: SeIncBasePriorityPrivilege 2808 WMIC.exe Token: SeCreatePagefilePrivilege 2808 WMIC.exe Token: SeBackupPrivilege 2808 WMIC.exe Token: SeRestorePrivilege 2808 WMIC.exe Token: SeShutdownPrivilege 2808 WMIC.exe Token: SeDebugPrivilege 2808 WMIC.exe Token: SeSystemEnvironmentPrivilege 2808 WMIC.exe Token: SeRemoteShutdownPrivilege 2808 WMIC.exe Token: SeUndockPrivilege 2808 WMIC.exe Token: SeManageVolumePrivilege 2808 WMIC.exe Token: 33 2808 WMIC.exe Token: 34 2808 WMIC.exe Token: 35 2808 WMIC.exe Token: 36 2808 WMIC.exe Token: SeIncreaseQuotaPrivilege 2808 WMIC.exe Token: SeSecurityPrivilege 2808 WMIC.exe Token: SeTakeOwnershipPrivilege 2808 WMIC.exe Token: SeLoadDriverPrivilege 2808 WMIC.exe Token: SeSystemProfilePrivilege 2808 WMIC.exe Token: SeSystemtimePrivilege 2808 WMIC.exe Token: SeProfSingleProcessPrivilege 2808 WMIC.exe Token: SeIncBasePriorityPrivilege 2808 WMIC.exe Token: SeCreatePagefilePrivilege 2808 WMIC.exe Token: SeBackupPrivilege 2808 WMIC.exe Token: SeRestorePrivilege 2808 WMIC.exe Token: SeShutdownPrivilege 2808 WMIC.exe Token: SeDebugPrivilege 2808 WMIC.exe Token: SeSystemEnvironmentPrivilege 2808 WMIC.exe Token: SeRemoteShutdownPrivilege 2808 WMIC.exe Token: SeUndockPrivilege 2808 WMIC.exe Token: SeManageVolumePrivilege 2808 WMIC.exe Token: 33 2808 WMIC.exe Token: 34 2808 WMIC.exe Token: 35 2808 WMIC.exe Token: 36 2808 WMIC.exe Token: SeBackupPrivilege 1020 vssvc.exe Token: SeRestorePrivilege 1020 vssvc.exe Token: SeAuditPrivilege 1020 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3732 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 77 PID 2980 wrote to memory of 3732 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 77 PID 2980 wrote to memory of 3732 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 77 PID 2980 wrote to memory of 4048 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 78 PID 2980 wrote to memory of 4048 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 78 PID 2980 wrote to memory of 4048 2980 ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe 78 PID 3732 wrote to memory of 2808 3732 yubfvuhmgtsm.exe 80 PID 3732 wrote to memory of 2808 3732 yubfvuhmgtsm.exe 80 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yubfvuhmgtsm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" yubfvuhmgtsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe"C:\Users\Admin\AppData\Local\Temp\ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\yubfvuhmgtsm.exeC:\Windows\yubfvuhmgtsm.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3732 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\CA04EE~1.EXE2⤵PID:4048
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5bbef617aa4842cc8c85ef7dfc686239c
SHA1e8672962fd43d169f5d375d6afaa01dd70f3b129
SHA256ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be
SHA51224353a0d67c2782943861c11b40b8b923f99d0cefbd2ef0770b6b13fc68724a3d49cc93404b7cc5e5bb0904791905c0049d5c8ef8a0a9ef866dd06585775e74f
-
Filesize
428KB
MD5bbef617aa4842cc8c85ef7dfc686239c
SHA1e8672962fd43d169f5d375d6afaa01dd70f3b129
SHA256ca04eefe38697f6406b489562fc163d26f08169e18d11bb18dcb75ba713827be
SHA51224353a0d67c2782943861c11b40b8b923f99d0cefbd2ef0770b6b13fc68724a3d49cc93404b7cc5e5bb0904791905c0049d5c8ef8a0a9ef866dd06585775e74f