Analysis
-
max time kernel
186s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 04:49
Static task
static1
Behavioral task
behavioral1
Sample
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe
Resource
win10v2004-20220812-en
General
-
Target
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe
-
Size
335KB
-
MD5
4ba3b368b7a30eec7084a087460cd4a5
-
SHA1
209abbe07dfa54439f93bfd1092006bcaa5dd83b
-
SHA256
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1
-
SHA512
f9e07f1e4809e6406804d6842b0a090d7dc30ce0679d5c4264cd15d11033e4235e1ecec30a9832f57aa6d1fa9273fb75d16b763944f416526a18112219d23332
-
SSDEEP
6144:cMlhTEzkFxLyQb7kmp76NYsYRnZa0dIa4Scb0a/8MH9CC4l:cMlhZFxVb7kIfsgxl4Nw+f9Dy
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2292972927-2705560509-2768824231-1000\_RECoVERY_+ufvyl.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D78898589F841FE
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D78898589F841FE
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/D78898589F841FE
http://xlowfznrg4wf7dli.ONION/D78898589F841FE
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
wdpadfnsthse.exepid Process 1464 wdpadfnsthse.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1340 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wdpadfnsthse.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run wdpadfnsthse.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ewwbwqbavgel = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\wdpadfnsthse.exe\"" wdpadfnsthse.exe -
Drops file in Program Files directory 64 IoCs
Processes:
wdpadfnsthse.exedescription ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG_PAL.wmv wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\huemainsubpicture2.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonIcon.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passportcover.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_mainImage-mask.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_left.png wdpadfnsthse.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\_RECoVERY_+ufvyl.html wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_SelectionSubpicture.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\_RECoVERY_+ufvyl.png wdpadfnsthse.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\_RECoVERY_+ufvyl.txt wdpadfnsthse.exe -
Drops file in Windows directory 2 IoCs
Processes:
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exedescription ioc Process File created C:\Windows\wdpadfnsthse.exe aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe File opened for modification C:\Windows\wdpadfnsthse.exe aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
wdpadfnsthse.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 wdpadfnsthse.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 wdpadfnsthse.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 wdpadfnsthse.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wdpadfnsthse.exepid Process 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe 1464 wdpadfnsthse.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exewdpadfnsthse.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe Token: SeDebugPrivilege 1464 wdpadfnsthse.exe Token: SeIncreaseQuotaPrivilege 1380 WMIC.exe Token: SeSecurityPrivilege 1380 WMIC.exe Token: SeTakeOwnershipPrivilege 1380 WMIC.exe Token: SeLoadDriverPrivilege 1380 WMIC.exe Token: SeSystemProfilePrivilege 1380 WMIC.exe Token: SeSystemtimePrivilege 1380 WMIC.exe Token: SeProfSingleProcessPrivilege 1380 WMIC.exe Token: SeIncBasePriorityPrivilege 1380 WMIC.exe Token: SeCreatePagefilePrivilege 1380 WMIC.exe Token: SeBackupPrivilege 1380 WMIC.exe Token: SeRestorePrivilege 1380 WMIC.exe Token: SeShutdownPrivilege 1380 WMIC.exe Token: SeDebugPrivilege 1380 WMIC.exe Token: SeSystemEnvironmentPrivilege 1380 WMIC.exe Token: SeRemoteShutdownPrivilege 1380 WMIC.exe Token: SeUndockPrivilege 1380 WMIC.exe Token: SeManageVolumePrivilege 1380 WMIC.exe Token: 33 1380 WMIC.exe Token: 34 1380 WMIC.exe Token: 35 1380 WMIC.exe Token: SeIncreaseQuotaPrivilege 1380 WMIC.exe Token: SeSecurityPrivilege 1380 WMIC.exe Token: SeTakeOwnershipPrivilege 1380 WMIC.exe Token: SeLoadDriverPrivilege 1380 WMIC.exe Token: SeSystemProfilePrivilege 1380 WMIC.exe Token: SeSystemtimePrivilege 1380 WMIC.exe Token: SeProfSingleProcessPrivilege 1380 WMIC.exe Token: SeIncBasePriorityPrivilege 1380 WMIC.exe Token: SeCreatePagefilePrivilege 1380 WMIC.exe Token: SeBackupPrivilege 1380 WMIC.exe Token: SeRestorePrivilege 1380 WMIC.exe Token: SeShutdownPrivilege 1380 WMIC.exe Token: SeDebugPrivilege 1380 WMIC.exe Token: SeSystemEnvironmentPrivilege 1380 WMIC.exe Token: SeRemoteShutdownPrivilege 1380 WMIC.exe Token: SeUndockPrivilege 1380 WMIC.exe Token: SeManageVolumePrivilege 1380 WMIC.exe Token: 33 1380 WMIC.exe Token: 34 1380 WMIC.exe Token: 35 1380 WMIC.exe Token: SeBackupPrivilege 1772 vssvc.exe Token: SeRestorePrivilege 1772 vssvc.exe Token: SeAuditPrivilege 1772 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exewdpadfnsthse.exedescription pid Process procid_target PID 1488 wrote to memory of 1464 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 27 PID 1488 wrote to memory of 1464 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 27 PID 1488 wrote to memory of 1464 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 27 PID 1488 wrote to memory of 1464 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 27 PID 1488 wrote to memory of 1340 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 28 PID 1488 wrote to memory of 1340 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 28 PID 1488 wrote to memory of 1340 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 28 PID 1488 wrote to memory of 1340 1488 aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe 28 PID 1464 wrote to memory of 1380 1464 wdpadfnsthse.exe 30 PID 1464 wrote to memory of 1380 1464 wdpadfnsthse.exe 30 PID 1464 wrote to memory of 1380 1464 wdpadfnsthse.exe 30 PID 1464 wrote to memory of 1380 1464 wdpadfnsthse.exe 30 -
System policy modification 1 TTPs 2 IoCs
Processes:
wdpadfnsthse.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wdpadfnsthse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" wdpadfnsthse.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe"C:\Users\Admin\AppData\Local\Temp\aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\wdpadfnsthse.exeC:\Windows\wdpadfnsthse.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1464 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\AA3C96~1.EXE2⤵
- Deletes itself
PID:1340
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD54ba3b368b7a30eec7084a087460cd4a5
SHA1209abbe07dfa54439f93bfd1092006bcaa5dd83b
SHA256aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1
SHA512f9e07f1e4809e6406804d6842b0a090d7dc30ce0679d5c4264cd15d11033e4235e1ecec30a9832f57aa6d1fa9273fb75d16b763944f416526a18112219d23332
-
Filesize
335KB
MD54ba3b368b7a30eec7084a087460cd4a5
SHA1209abbe07dfa54439f93bfd1092006bcaa5dd83b
SHA256aa3c96864225818340d549f429f9be3a474b94fafe19ec191e253dff358eabf1
SHA512f9e07f1e4809e6406804d6842b0a090d7dc30ce0679d5c4264cd15d11033e4235e1ecec30a9832f57aa6d1fa9273fb75d16b763944f416526a18112219d23332