Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 08:32
Static task
static1
Behavioral task
behavioral1
Sample
ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe
Resource
win10v2004-20220812-en
General
-
Target
ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe
-
Size
424KB
-
MD5
3c34bab015acf45fa967c6791c7d3008
-
SHA1
809cae36f97ec02da41be75e94d09ff109bd7702
-
SHA256
ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e
-
SHA512
107ecba2cc00bac27b0be70433ce31e65f2be13a24f465ffcf697782e12108fc3797dd6bf15c474ebcf24ba3484da8f578080f8f26c196949ed44387c2a47a18
-
SSDEEP
6144:GVA8n+saFT1r1Xu0MUHbhgD1fbVaQaYBK58vgVz8G8xypctxTmroXbftChXW3Ax4:GXJa71e01hqf8y46GYicnblCJxfS6
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\_RECoVERY_+sbqkl.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/8B158BF975474E6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8B158BF975474E6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/8B158BF975474E6
http://xlowfznrg4wf7dli.ONION/8B158BF975474E6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 4308 kgprafooqshp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation kgprafooqshp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run kgprafooqshp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tklhuiojyuxp = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\kgprafooqshp.exe\"" kgprafooqshp.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\Services\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\_RECoVERY_+sbqkl.html kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\System\ado\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\_RECoVERY_+sbqkl.txt kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\_RECoVERY_+sbqkl.png kgprafooqshp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\_RECoVERY_+sbqkl.html kgprafooqshp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\kgprafooqshp.exe ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe File opened for modification C:\Windows\kgprafooqshp.exe ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe 4308 kgprafooqshp.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe Token: SeDebugPrivilege 4308 kgprafooqshp.exe Token: SeIncreaseQuotaPrivilege 4072 WMIC.exe Token: SeSecurityPrivilege 4072 WMIC.exe Token: SeTakeOwnershipPrivilege 4072 WMIC.exe Token: SeLoadDriverPrivilege 4072 WMIC.exe Token: SeSystemProfilePrivilege 4072 WMIC.exe Token: SeSystemtimePrivilege 4072 WMIC.exe Token: SeProfSingleProcessPrivilege 4072 WMIC.exe Token: SeIncBasePriorityPrivilege 4072 WMIC.exe Token: SeCreatePagefilePrivilege 4072 WMIC.exe Token: SeBackupPrivilege 4072 WMIC.exe Token: SeRestorePrivilege 4072 WMIC.exe Token: SeShutdownPrivilege 4072 WMIC.exe Token: SeDebugPrivilege 4072 WMIC.exe Token: SeSystemEnvironmentPrivilege 4072 WMIC.exe Token: SeRemoteShutdownPrivilege 4072 WMIC.exe Token: SeUndockPrivilege 4072 WMIC.exe Token: SeManageVolumePrivilege 4072 WMIC.exe Token: 33 4072 WMIC.exe Token: 34 4072 WMIC.exe Token: 35 4072 WMIC.exe Token: 36 4072 WMIC.exe Token: SeIncreaseQuotaPrivilege 4072 WMIC.exe Token: SeSecurityPrivilege 4072 WMIC.exe Token: SeTakeOwnershipPrivilege 4072 WMIC.exe Token: SeLoadDriverPrivilege 4072 WMIC.exe Token: SeSystemProfilePrivilege 4072 WMIC.exe Token: SeSystemtimePrivilege 4072 WMIC.exe Token: SeProfSingleProcessPrivilege 4072 WMIC.exe Token: SeIncBasePriorityPrivilege 4072 WMIC.exe Token: SeCreatePagefilePrivilege 4072 WMIC.exe Token: SeBackupPrivilege 4072 WMIC.exe Token: SeRestorePrivilege 4072 WMIC.exe Token: SeShutdownPrivilege 4072 WMIC.exe Token: SeDebugPrivilege 4072 WMIC.exe Token: SeSystemEnvironmentPrivilege 4072 WMIC.exe Token: SeRemoteShutdownPrivilege 4072 WMIC.exe Token: SeUndockPrivilege 4072 WMIC.exe Token: SeManageVolumePrivilege 4072 WMIC.exe Token: 33 4072 WMIC.exe Token: 34 4072 WMIC.exe Token: 35 4072 WMIC.exe Token: 36 4072 WMIC.exe Token: SeBackupPrivilege 3924 vssvc.exe Token: SeRestorePrivilege 3924 vssvc.exe Token: SeAuditPrivilege 3924 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4308 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 83 PID 4960 wrote to memory of 4308 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 83 PID 4960 wrote to memory of 4308 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 83 PID 4960 wrote to memory of 4432 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 84 PID 4960 wrote to memory of 4432 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 84 PID 4960 wrote to memory of 4432 4960 ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe 84 PID 4308 wrote to memory of 4072 4308 kgprafooqshp.exe 86 PID 4308 wrote to memory of 4072 4308 kgprafooqshp.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kgprafooqshp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" kgprafooqshp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe"C:\Users\Admin\AppData\Local\Temp\ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\kgprafooqshp.exeC:\Windows\kgprafooqshp.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4308 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\EA5D8E~1.EXE2⤵PID:4432
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD53c34bab015acf45fa967c6791c7d3008
SHA1809cae36f97ec02da41be75e94d09ff109bd7702
SHA256ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e
SHA512107ecba2cc00bac27b0be70433ce31e65f2be13a24f465ffcf697782e12108fc3797dd6bf15c474ebcf24ba3484da8f578080f8f26c196949ed44387c2a47a18
-
Filesize
424KB
MD53c34bab015acf45fa967c6791c7d3008
SHA1809cae36f97ec02da41be75e94d09ff109bd7702
SHA256ea5d8e3d92e5002b075f573e43fef7ff356ab1bfb7e6e638d0f39fa318a0dc2e
SHA512107ecba2cc00bac27b0be70433ce31e65f2be13a24f465ffcf697782e12108fc3797dd6bf15c474ebcf24ba3484da8f578080f8f26c196949ed44387c2a47a18