Analysis
-
max time kernel
151s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 06:23
Static task
static1
Behavioral task
behavioral1
Sample
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe
Resource
win10v2004-20220812-en
General
-
Target
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe
-
Size
314KB
-
MD5
08ed3a82b107e945abbdf43a03f7bf06
-
SHA1
c1413fe082a18a5b895c9c8ddebb3b684cb22dd8
-
SHA256
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc
-
SHA512
07a126e3584a1c0ee88d2ea31b2062191854e006fe2443d3e9f76ceee97213aecfce036ff96b7c0a9fd3971580d216bb74afac551ebdbfe936438ba689180fce
-
SSDEEP
6144:IYmRAwCvZWJDQKTARjABxuPZvFSZVdWeLVgfksUQft+YJ:ISwUZDMyB8Xh0Ua1J
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\_RECoVERY_+prrho.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/3ADDB11A68AD489E
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/3ADDB11A68AD489E
http://yyre45dbvn2nhbefbmh.begumvelic.at/3ADDB11A68AD489E
http://xlowfznrg4wf7dli.ONION/3ADDB11A68AD489E
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
qlapqftcwghp.exepid Process 280 qlapqftcwghp.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 956 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
qlapqftcwghp.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run qlapqftcwghp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ymntarlqdkxx = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\qlapqftcwghp.exe\"" qlapqftcwghp.exe -
Drops file in Program Files directory 64 IoCs
Processes:
qlapqftcwghp.exedescription ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_SelectionSubpicture.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\CircleSubpicture.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\203x8subpicture.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask_PAL.wmv qlapqftcwghp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+prrho.html qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_RECoVERY_+prrho.html qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_ButtonGraphic.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground_PAL.wmv qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\ado\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-static.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\_RECoVERY_+prrho.html qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotsdarkoverlay.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-over-DOT.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECoVERY_+prrho.html qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\_RECoVERY_+prrho.html qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\rollinghills.png qlapqftcwghp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lt.pak qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\huemainsubpicture2.png qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\_RECoVERY_+prrho.txt qlapqftcwghp.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\_RECoVERY_+prrho.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG.wmv qlapqftcwghp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png qlapqftcwghp.exe -
Drops file in Windows directory 2 IoCs
Processes:
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exedescription ioc Process File created C:\Windows\qlapqftcwghp.exe aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe File opened for modification C:\Windows\qlapqftcwghp.exe aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qlapqftcwghp.exepid Process 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe 280 qlapqftcwghp.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exeqlapqftcwghp.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe Token: SeDebugPrivilege 280 qlapqftcwghp.exe Token: SeIncreaseQuotaPrivilege 516 WMIC.exe Token: SeSecurityPrivilege 516 WMIC.exe Token: SeTakeOwnershipPrivilege 516 WMIC.exe Token: SeLoadDriverPrivilege 516 WMIC.exe Token: SeSystemProfilePrivilege 516 WMIC.exe Token: SeSystemtimePrivilege 516 WMIC.exe Token: SeProfSingleProcessPrivilege 516 WMIC.exe Token: SeIncBasePriorityPrivilege 516 WMIC.exe Token: SeCreatePagefilePrivilege 516 WMIC.exe Token: SeBackupPrivilege 516 WMIC.exe Token: SeRestorePrivilege 516 WMIC.exe Token: SeShutdownPrivilege 516 WMIC.exe Token: SeDebugPrivilege 516 WMIC.exe Token: SeSystemEnvironmentPrivilege 516 WMIC.exe Token: SeRemoteShutdownPrivilege 516 WMIC.exe Token: SeUndockPrivilege 516 WMIC.exe Token: SeManageVolumePrivilege 516 WMIC.exe Token: 33 516 WMIC.exe Token: 34 516 WMIC.exe Token: 35 516 WMIC.exe Token: SeIncreaseQuotaPrivilege 516 WMIC.exe Token: SeSecurityPrivilege 516 WMIC.exe Token: SeTakeOwnershipPrivilege 516 WMIC.exe Token: SeLoadDriverPrivilege 516 WMIC.exe Token: SeSystemProfilePrivilege 516 WMIC.exe Token: SeSystemtimePrivilege 516 WMIC.exe Token: SeProfSingleProcessPrivilege 516 WMIC.exe Token: SeIncBasePriorityPrivilege 516 WMIC.exe Token: SeCreatePagefilePrivilege 516 WMIC.exe Token: SeBackupPrivilege 516 WMIC.exe Token: SeRestorePrivilege 516 WMIC.exe Token: SeShutdownPrivilege 516 WMIC.exe Token: SeDebugPrivilege 516 WMIC.exe Token: SeSystemEnvironmentPrivilege 516 WMIC.exe Token: SeRemoteShutdownPrivilege 516 WMIC.exe Token: SeUndockPrivilege 516 WMIC.exe Token: SeManageVolumePrivilege 516 WMIC.exe Token: 33 516 WMIC.exe Token: 34 516 WMIC.exe Token: 35 516 WMIC.exe Token: SeBackupPrivilege 1356 vssvc.exe Token: SeRestorePrivilege 1356 vssvc.exe Token: SeAuditPrivilege 1356 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exeqlapqftcwghp.exedescription pid Process procid_target PID 1644 wrote to memory of 280 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 28 PID 1644 wrote to memory of 280 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 28 PID 1644 wrote to memory of 280 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 28 PID 1644 wrote to memory of 280 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 28 PID 1644 wrote to memory of 956 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 29 PID 1644 wrote to memory of 956 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 29 PID 1644 wrote to memory of 956 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 29 PID 1644 wrote to memory of 956 1644 aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe 29 PID 280 wrote to memory of 516 280 qlapqftcwghp.exe 31 PID 280 wrote to memory of 516 280 qlapqftcwghp.exe 31 PID 280 wrote to memory of 516 280 qlapqftcwghp.exe 31 PID 280 wrote to memory of 516 280 qlapqftcwghp.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
qlapqftcwghp.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qlapqftcwghp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qlapqftcwghp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe"C:\Users\Admin\AppData\Local\Temp\aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\qlapqftcwghp.exeC:\Windows\qlapqftcwghp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:280 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\AA12DE~1.EXE2⤵
- Deletes itself
PID:956
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD508ed3a82b107e945abbdf43a03f7bf06
SHA1c1413fe082a18a5b895c9c8ddebb3b684cb22dd8
SHA256aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc
SHA51207a126e3584a1c0ee88d2ea31b2062191854e006fe2443d3e9f76ceee97213aecfce036ff96b7c0a9fd3971580d216bb74afac551ebdbfe936438ba689180fce
-
Filesize
314KB
MD508ed3a82b107e945abbdf43a03f7bf06
SHA1c1413fe082a18a5b895c9c8ddebb3b684cb22dd8
SHA256aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc
SHA51207a126e3584a1c0ee88d2ea31b2062191854e006fe2443d3e9f76ceee97213aecfce036ff96b7c0a9fd3971580d216bb74afac551ebdbfe936438ba689180fce