Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 14:40

General

  • Target

    aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599.exe

  • Size

    243KB

  • MD5

    809123b31010dd10b62922a9064b0359

  • SHA1

    11cf7caf9883b7320bd9cff65382a29b72287eab

  • SHA256

    aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599

  • SHA512

    a73578897a84c8fbca63acd1b222d51f99e985e117b094bcb4faf349bd9fa00a47ce43b3e6f9f3342c4f7216ce49c421d9b4efa9fe168541ad25d64c370c6b1c

  • SSDEEP

    3072:veuwncJzi+g5vINX6ddryONC6VRZsHAOx+9+rgiz9R5Zhzs0NmUAlUa9S/OM90zO:AeoPXVRZX+Shiz9B5dlhGMaffBnASc

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\Recovery+hakeb.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/20727730DB423CB 2. http://tes543berda73i48fsdfsd.keratadze.at/20727730DB423CB 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/20727730DB423CB If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/20727730DB423CB 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/20727730DB423CB http://tes543berda73i48fsdfsd.keratadze.at/20727730DB423CB http://tt54rfdjhb34rfbnknaerg.milerteddy.com/20727730DB423CB *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/20727730DB423CB
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/20727730DB423CB

http://tes543berda73i48fsdfsd.keratadze.at/20727730DB423CB

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/20727730DB423CB

http://xlowfznrg4wf7dli.ONION/20727730DB423CB

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599.exe
    "C:\Users\Admin\AppData\Local\Temp\aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\idqohdxjshhw.exe
      C:\Windows\idqohdxjshhw.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2044
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1776
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:236
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\IDQOHD~1.EXE
        3⤵
          PID:584
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\AEF850~1.EXE
        2⤵
        • Deletes itself
        PID:1840
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\RECOVERY.HTM

      Filesize

      11KB

      MD5

      a71545d34774eaf490d67bbecb090b8b

      SHA1

      6e09e976c6d4aa5237f5fde48deb76259febf702

      SHA256

      5fc80681015bdf4fbc06d86ff9ce9ffa85079ca7b07debc8b5ac468636d66de6

      SHA512

      7da7b51aee40005b50aae4e3c4f0a328d7781f91c782a2b83a81d071e857723887233276e299012e097370228d4051a4fcb9bffaf2be09025223535cabb6aba8

    • C:\Users\Admin\Desktop\RECOVERY.TXT

      Filesize

      1KB

      MD5

      0a247972e1f0df44f801ce37cab0a1a3

      SHA1

      2b42698123952f35e9ff4822d00f5e04b13c4c4c

      SHA256

      8ebfba2975f130dd6bf705cd66ab0549ca2890a6aaeb776c19d2310d1e982360

      SHA512

      375ce972358fc942b35e138d7700e0a0c200bd838fb74d5a1c95ef91ec2044d524d15a1dc2d449141084202c25f21434edbc19312f00c4bab5c601e959034a0c

    • C:\Users\Admin\Desktop\RECOVERY.png

      Filesize

      63KB

      MD5

      d478e75a1338f36076bd8afd907576cc

      SHA1

      491ce1b87b5c4b20ac0c3f57be6d930e2de181ec

      SHA256

      409df1129ce7e32c24d3102a69e8c65b93b9843404a83278ced4c4f05792ded1

      SHA512

      338a9239e5d11f08d420b63e02d586da7232285c750d65392dab87ea8058d7f8a92c1594722e343a6d94b18130769cec65addc5b3b3dbf86388795b4761c9e2f

    • C:\Windows\idqohdxjshhw.exe

      Filesize

      243KB

      MD5

      809123b31010dd10b62922a9064b0359

      SHA1

      11cf7caf9883b7320bd9cff65382a29b72287eab

      SHA256

      aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599

      SHA512

      a73578897a84c8fbca63acd1b222d51f99e985e117b094bcb4faf349bd9fa00a47ce43b3e6f9f3342c4f7216ce49c421d9b4efa9fe168541ad25d64c370c6b1c

    • C:\Windows\idqohdxjshhw.exe

      Filesize

      243KB

      MD5

      809123b31010dd10b62922a9064b0359

      SHA1

      11cf7caf9883b7320bd9cff65382a29b72287eab

      SHA256

      aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599

      SHA512

      a73578897a84c8fbca63acd1b222d51f99e985e117b094bcb4faf349bd9fa00a47ce43b3e6f9f3342c4f7216ce49c421d9b4efa9fe168541ad25d64c370c6b1c

    • memory/1416-61-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1416-55-0x00000000003A0000-0x00000000003CF000-memory.dmp

      Filesize

      188KB

    • memory/1416-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

      Filesize

      8KB

    • memory/1416-56-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2044-64-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2044-62-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2044-74-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB