Resubmissions

05-09-2023 09:36

230905-llcqbseg77 10

12-04-2023 15:55

230412-tc7s4sdc52 10

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-09-2023 09:36

General

  • Target

    suspect_file_2.exe

  • Size

    360KB

  • MD5

    9ce01dfbf25dfea778e57d8274675d6f

  • SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

  • SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

  • SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • SSDEEP

    6144:4qZbqZToxIizLBZ6R56VkGM4ceLJ5vs5JGJceO/QCErIiuNAvwu:4qZb8oR3D6R5QHXZJy/Q50imAvB

Malware Config

Extracted

Path

C:\PerfLogs\_RECOVERY_+sqemx.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EFA6EE942A4F3F4B 2. http://tes543berda73i48fsdfsd.keratadze.at/EFA6EE942A4F3F4B 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EFA6EE942A4F3F4B If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/EFA6EE942A4F3F4B 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EFA6EE942A4F3F4B http://tes543berda73i48fsdfsd.keratadze.at/EFA6EE942A4F3F4B http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EFA6EE942A4F3F4B *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/EFA6EE942A4F3F4B
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EFA6EE942A4F3F4B

http://tes543berda73i48fsdfsd.keratadze.at/EFA6EE942A4F3F4B

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EFA6EE942A4F3F4B

http://xlowfznrg4wf7dli.ONION/EFA6EE942A4F3F4B

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (883) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\suspect_file_2.exe
    "C:\Users\Admin\AppData\Local\Temp\suspect_file_2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\nbbkdkvlcafl.exe
      C:\Windows\nbbkdkvlcafl.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4932
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3420
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:4592
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\SUSPEC~1.EXE
      2⤵
        PID:3612
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2340
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3984
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4500
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4028
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4412
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:4996
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1188
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\_RECOVERY_+sqemx.html

      Filesize

      11KB

      MD5

      092693e2494176eb033815de999d7eac

      SHA1

      aecc51236f08b10ec55005fba4e0989a503c1042

      SHA256

      3d7b6bf66480a0f34a7d0635a5b555206ec64a838ff2e767e214a2252c75b944

      SHA512

      c28c5a2beb5490f9a707e70e08ba09ccc68245c1b2add301c86ac31160953dfa93730054b3d6f7725818363abc627bbf6f0a2675836de92d845909fbbad1e399

    • C:\PerfLogs\_RECOVERY_+sqemx.png

      Filesize

      62KB

      MD5

      d67e2bffb2b3799e019d35d8e2a2337b

      SHA1

      efcc9ea317383f138e04fe31d767c50f210e063a

      SHA256

      514aa12a44524e177681f3bd53ac75f48e943af79a0d643b477132a31ab5a37f

      SHA512

      a25b1943c107d3796232414123f9896865ec3d387e4fb734c6db98fc232d8627070679d5e8f8fe5900e2d01a2881ad7f215d8de59d97934d83a905e1a9dd4e57

    • C:\PerfLogs\_RECOVERY_+sqemx.txt

      Filesize

      1KB

      MD5

      f0e6d1fad778b28cac4cdf003da5392b

      SHA1

      edf73fcb57e770dafb06ef881ebd438f8c639480

      SHA256

      c02beef44d3831bb70eb4aaf75499a344c47623488a1f57dc74d1b681184ad66

      SHA512

      b1062f15d3cfb5ed5619f67d53b21212218671a52fa4874416fcbbf71226732dfe479c179a5b392e68a0b8f39b74e71e89036c4692032ec2bbf0a7f50e7abe15

    • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      78d1f94c5a7f1b000cdbe3ba8bf9d590

      SHA1

      3ac4c0b77d6305493a99ff36fca1bbe12d227ea8

      SHA256

      2ca10c21dc96bccf2bfabaa6a3d80e704066b5e52ce38f641a31f74d3a13c690

      SHA512

      38b96878c50bbdd82293deb7c2505192dd216f324fd1635eb8488ae3673cb6eb10e2518b3ce67811eacfc8764835bc7d1c81a023f8cc59b4d01ba356a7a5826d

    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      107KB

      MD5

      a6a43116c09c4ac59d580f5ca2b9aee8

      SHA1

      aacc2e6c31aaf190e7686d482e1e73519dc6d091

      SHA256

      3a3e407c920cc4646f050b22a12324ea3dadca2331a9125ec17eadc47294dc98

      SHA512

      e34f8f2dc32c537180e94c4f95bae896463cae10f11258142121016781b578939514885fe40ba4fbe79e553374623f924583f1987ecc4cb80a017012f4b032ee

    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      01b87d595762f19af990395536148bb9

      SHA1

      3c931dff3fadda83fbcd12e331c00215ca692b5a

      SHA256

      75f881c6797501865a3303b46a6b0d06505894f1713ba4babbf446ea16de819d

      SHA512

      6f6d0254dc3864fadc8c17e629210e04eac7f08424692bec5b68b20ed2502be8dfca1013ac79e7f8e534c3149925a5f31180a360b957242ed251c68ab37a1d7f

    • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

      Filesize

      416B

      MD5

      aca7774691269d7f02dc7f4cb7454fe8

      SHA1

      c476b39a70dbf80a1ae4723de06e5225c272dfb8

      SHA256

      c09a0e587bebac218ec3b647d2ff2bc2a40a8c0da17db261dd61d5e2f270a8cc

      SHA512

      8e65600d6fb6f096786720ae83f1b2c95e89b2dcac57bb80e64f71bf090044859621f8aa176ae51f1598faad9ba4b2f60665f4af14427968e329b80c63748a33

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      24be8a92460b5b7a555b1da559296958

      SHA1

      94147054e8a04e82fea1c185af30c7c90b194064

      SHA256

      77a3cfe6b7eb676af438d5de88c7efcb6abcc494e0b65da90201969e6d79b2a3

      SHA512

      ed8ef0453e050392c430fdcf556249f679570c130decd18057e077471a45ab0bc0fba513cb2d4d1c61f3d1935318113b3733dec2bc7828a169b18a1081e609a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      342B

      MD5

      e1f00148e4fe1ea7163406848a49dcbe

      SHA1

      a7b499816560c2e8f8f1a898d74f1e045b6437f8

      SHA256

      cda0f1e6d723a541e01b073ed0ee18a68051f645d49c1d167745030b11e3b429

      SHA512

      6db928a67380d0a48e8c004e632e72821a873d26f9a7f86bc5ffda3321c3fe3f0299714e6d3f417ece337dfd6032d0627c6ad107d410c9d8afa3395d85d8a221

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMAQ31I9\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{e4e6a5fa-1a96-4117-9cd4-0eccc1b24c1b}\0.0.filtertrie.intermediate.txt

      Filesize

      15KB

      MD5

      f68b7443797ad3eb20677d5c3a5ce254

      SHA1

      d35f1307f72e301cec6b97dc57201fa0aff49fbb

      SHA256

      4f4e5a57fa1bb13c738dbdf0b3a47a8c3c25010eec2bc83ea548f900a04f7832

      SHA512

      37e042b2c36d5766241c6f97b8d1e73440fa9e5d69f86361169b7d279542d66dc6473190ae033173789fbafa8f6e472a8cf19326c538c2b6896ee8b138e0d1b5

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133379810919710374.txt

      Filesize

      58KB

      MD5

      33c767981b548cd67f5a1aa6c041f453

      SHA1

      12aca00bbc3c3bec1c0ea7224a5a860e4ffc87d7

      SHA256

      46c2670f8b282ba836295ab671ecd927cb8e8c6024b68e83888e9e9c92c28cc2

      SHA512

      6809f153580e104d5fc5054d14258247a774d521c29582cd049204fa2d124e80b2c1411f7e422ffc8aae258ac84638516748bf3d1bee881e86243275a21d023b

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133379822127582862.txt

      Filesize

      91KB

      MD5

      751230d580291e05c7ccaf8aab88bb4f

      SHA1

      307db7a14a1cdf80b6e8cd3f8a1e584b97c9bcb8

      SHA256

      763bd4b6711969d9bff4cf0ed67e64170e5c0f281a51cd5a2914228d43090633

      SHA512

      deedcbbc14154da755e2d743a58e21771e37df8b45c1cf074f622e2fad41666c203bcc8cea69bf540d05718e97a36d59ba60206b72b8d5a10ff37f470b9a88e1

    • C:\Users\Admin\Desktop\RECOVERY.HTM

      Filesize

      11KB

      MD5

      092693e2494176eb033815de999d7eac

      SHA1

      aecc51236f08b10ec55005fba4e0989a503c1042

      SHA256

      3d7b6bf66480a0f34a7d0635a5b555206ec64a838ff2e767e214a2252c75b944

      SHA512

      c28c5a2beb5490f9a707e70e08ba09ccc68245c1b2add301c86ac31160953dfa93730054b3d6f7725818363abc627bbf6f0a2675836de92d845909fbbad1e399

    • C:\Users\Admin\Desktop\RECOVERY.TXT

      Filesize

      1KB

      MD5

      f0e6d1fad778b28cac4cdf003da5392b

      SHA1

      edf73fcb57e770dafb06ef881ebd438f8c639480

      SHA256

      c02beef44d3831bb70eb4aaf75499a344c47623488a1f57dc74d1b681184ad66

      SHA512

      b1062f15d3cfb5ed5619f67d53b21212218671a52fa4874416fcbbf71226732dfe479c179a5b392e68a0b8f39b74e71e89036c4692032ec2bbf0a7f50e7abe15

    • C:\Windows\nbbkdkvlcafl.exe

      Filesize

      360KB

      MD5

      9ce01dfbf25dfea778e57d8274675d6f

      SHA1

      1bd767beb5bc36b396ca6405748042640ad57526

      SHA256

      5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

      SHA512

      d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

    • C:\Windows\nbbkdkvlcafl.exe

      Filesize

      360KB

      MD5

      9ce01dfbf25dfea778e57d8274675d6f

      SHA1

      1bd767beb5bc36b396ca6405748042640ad57526

      SHA256

      5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

      SHA512

      d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

    • memory/3984-10454-0x0000018A6C620000-0x0000018A6C630000-memory.dmp

      Filesize

      64KB

    • memory/3984-10489-0x0000018A6CA40000-0x0000018A6CA42000-memory.dmp

      Filesize

      8KB

    • memory/3984-10470-0x0000018A6CF00000-0x0000018A6CF10000-memory.dmp

      Filesize

      64KB

    • memory/4740-9-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4740-1-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4740-0-0x0000000000AB0000-0x0000000000B35000-memory.dmp

      Filesize

      532KB

    • memory/4740-10-0x0000000000AB0000-0x0000000000B35000-memory.dmp

      Filesize

      532KB

    • memory/4932-559-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-10522-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-8276-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-6481-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-5025-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-3841-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-2664-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-12-0x0000000002140000-0x00000000021C5000-memory.dmp

      Filesize

      532KB

    • memory/4932-560-0x0000000002140000-0x00000000021C5000-memory.dmp

      Filesize

      532KB

    • memory/4932-1453-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4932-9944-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/4996-10518-0x00000212EA3E0000-0x00000212EA3E2000-memory.dmp

      Filesize

      8KB

    • memory/4996-10520-0x00000212EA400000-0x00000212EA402000-memory.dmp

      Filesize

      8KB

    • memory/4996-10516-0x00000212EA320000-0x00000212EA322000-memory.dmp

      Filesize

      8KB

    • memory/4996-10514-0x00000212EA300000-0x00000212EA302000-memory.dmp

      Filesize

      8KB

    • memory/4996-10512-0x00000212EA1E0000-0x00000212EA1E2000-memory.dmp

      Filesize

      8KB

    • memory/4996-10509-0x00000212EA1B0000-0x00000212EA1B2000-memory.dmp

      Filesize

      8KB