Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe
Resource
win10v2004-20220901-en
General
-
Target
cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe
-
Size
424KB
-
MD5
a28a66e8a338631f3cfeb175cb843ff3
-
SHA1
50417f5223aa64f4b59df0f9bedf6b1eaabe5309
-
SHA256
cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd
-
SHA512
e18dff162e6b5924aa45c8dc784b47ac2812451b2ceae109b528ed63346028575c75447cd841091543c8cc315eeed29288bbadf86c9cc069c5f4135c975f6b56
-
SSDEEP
6144:1VA8n+saFT1r1Xu0MUHbhgD1fbVaQaYBK58vgVz8G8xypctxTmroXbftChXW3Ax4:1XJa71e01hqf8y46GYicnblCJxfS6
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+xcsxr.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/1DDB7055C8E58747
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1DDB7055C8E58747
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/1DDB7055C8E58747
http://xlowfznrg4wf7dli.ONION/1DDB7055C8E58747
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1788 aiibsshjsova.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation aiibsshjsova.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run aiibsshjsova.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xviyfdqmlmol = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\aiibsshjsova.exe\"" aiibsshjsova.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\ado\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_200_percent.pak aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\readme.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sk-SK\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\_RECoVERY_+xcsxr.png aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt aiibsshjsova.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\_RECoVERY_+xcsxr.html aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\_RECoVERY_+xcsxr.txt aiibsshjsova.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\_RECoVERY_+xcsxr.png aiibsshjsova.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\aiibsshjsova.exe cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe File opened for modification C:\Windows\aiibsshjsova.exe cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe 1788 aiibsshjsova.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe Token: SeDebugPrivilege 1788 aiibsshjsova.exe Token: SeIncreaseQuotaPrivilege 740 WMIC.exe Token: SeSecurityPrivilege 740 WMIC.exe Token: SeTakeOwnershipPrivilege 740 WMIC.exe Token: SeLoadDriverPrivilege 740 WMIC.exe Token: SeSystemProfilePrivilege 740 WMIC.exe Token: SeSystemtimePrivilege 740 WMIC.exe Token: SeProfSingleProcessPrivilege 740 WMIC.exe Token: SeIncBasePriorityPrivilege 740 WMIC.exe Token: SeCreatePagefilePrivilege 740 WMIC.exe Token: SeBackupPrivilege 740 WMIC.exe Token: SeRestorePrivilege 740 WMIC.exe Token: SeShutdownPrivilege 740 WMIC.exe Token: SeDebugPrivilege 740 WMIC.exe Token: SeSystemEnvironmentPrivilege 740 WMIC.exe Token: SeRemoteShutdownPrivilege 740 WMIC.exe Token: SeUndockPrivilege 740 WMIC.exe Token: SeManageVolumePrivilege 740 WMIC.exe Token: 33 740 WMIC.exe Token: 34 740 WMIC.exe Token: 35 740 WMIC.exe Token: 36 740 WMIC.exe Token: SeIncreaseQuotaPrivilege 740 WMIC.exe Token: SeSecurityPrivilege 740 WMIC.exe Token: SeTakeOwnershipPrivilege 740 WMIC.exe Token: SeLoadDriverPrivilege 740 WMIC.exe Token: SeSystemProfilePrivilege 740 WMIC.exe Token: SeSystemtimePrivilege 740 WMIC.exe Token: SeProfSingleProcessPrivilege 740 WMIC.exe Token: SeIncBasePriorityPrivilege 740 WMIC.exe Token: SeCreatePagefilePrivilege 740 WMIC.exe Token: SeBackupPrivilege 740 WMIC.exe Token: SeRestorePrivilege 740 WMIC.exe Token: SeShutdownPrivilege 740 WMIC.exe Token: SeDebugPrivilege 740 WMIC.exe Token: SeSystemEnvironmentPrivilege 740 WMIC.exe Token: SeRemoteShutdownPrivilege 740 WMIC.exe Token: SeUndockPrivilege 740 WMIC.exe Token: SeManageVolumePrivilege 740 WMIC.exe Token: 33 740 WMIC.exe Token: 34 740 WMIC.exe Token: 35 740 WMIC.exe Token: 36 740 WMIC.exe Token: SeBackupPrivilege 1068 vssvc.exe Token: SeRestorePrivilege 1068 vssvc.exe Token: SeAuditPrivilege 1068 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1788 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 84 PID 4828 wrote to memory of 1788 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 84 PID 4828 wrote to memory of 1788 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 84 PID 4828 wrote to memory of 1904 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 85 PID 4828 wrote to memory of 1904 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 85 PID 4828 wrote to memory of 1904 4828 cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe 85 PID 1788 wrote to memory of 740 1788 aiibsshjsova.exe 88 PID 1788 wrote to memory of 740 1788 aiibsshjsova.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aiibsshjsova.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" aiibsshjsova.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe"C:\Users\Admin\AppData\Local\Temp\cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\aiibsshjsova.exeC:\Windows\aiibsshjsova.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1788 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\CBEB10~1.EXE2⤵PID:1904
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5a28a66e8a338631f3cfeb175cb843ff3
SHA150417f5223aa64f4b59df0f9bedf6b1eaabe5309
SHA256cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd
SHA512e18dff162e6b5924aa45c8dc784b47ac2812451b2ceae109b528ed63346028575c75447cd841091543c8cc315eeed29288bbadf86c9cc069c5f4135c975f6b56
-
Filesize
424KB
MD5a28a66e8a338631f3cfeb175cb843ff3
SHA150417f5223aa64f4b59df0f9bedf6b1eaabe5309
SHA256cbeb100c8ab60cffed6d0c26f7a54f03739c8401ac5417b9780bbd9e9d6963fd
SHA512e18dff162e6b5924aa45c8dc784b47ac2812451b2ceae109b528ed63346028575c75447cd841091543c8cc315eeed29288bbadf86c9cc069c5f4135c975f6b56