Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 00:35

General

  • Target

    demo_teslacrypt.exe

  • Size

    360KB

  • MD5

    9ce01dfbf25dfea778e57d8274675d6f

  • SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

  • SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

  • SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • SSDEEP

    6144:4qZbqZToxIizLBZ6R56VkGM4ceLJ5vs5JGJceO/QCErIiuNAvwu:4qZb8oR3D6R5QHXZJy/Q50imAvB

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+yrkky.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/89DF05129DE5C71 2. http://tes543berda73i48fsdfsd.keratadze.at/89DF05129DE5C71 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/89DF05129DE5C71 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/89DF05129DE5C71 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/89DF05129DE5C71 http://tes543berda73i48fsdfsd.keratadze.at/89DF05129DE5C71 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/89DF05129DE5C71 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/89DF05129DE5C71
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/89DF05129DE5C71

http://tes543berda73i48fsdfsd.keratadze.at/89DF05129DE5C71

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/89DF05129DE5C71

http://xlowfznrg4wf7dli.ONION/89DF05129DE5C71

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (177) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\demo_teslacrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\demo_teslacrypt.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\hcfhrexsntpa.exe
      C:\Windows\hcfhrexsntpa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2676
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2596
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\DEMO_T~1.EXE
      2⤵
      • Deletes itself
      PID:2172
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+yrkky.html

    Filesize

    11KB

    MD5

    f1e85c5f434e51617b253eac8464038b

    SHA1

    6a0ddd470cb1d5b961983ffa3508bdff754e1b40

    SHA256

    85925a0081b5a9f82fbf39e28e18b0927646160d18712a24bf8b7628695234b9

    SHA512

    da679ddb4009b1c9b2de156baa63b4a796ce2a022e8b77c996d1b173e0356f63c20386020059fade3bb643291e8029f925bae6908e722e69efdd82b9778033c3

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+yrkky.png

    Filesize

    62KB

    MD5

    96873dabc6f13826ba861d1598daa812

    SHA1

    419b9218434715fddc050bb7f930fc946e028cf6

    SHA256

    98c409031dce833a557317aaba2d31f45ff7656502e79ef7c5d56c6f6198f66d

    SHA512

    0f3bdcb62dac75e62a7b5fb0bb92853926976b14520e7e5fd997a5243638990dd62c53775bd205db58afbaf19398a5396dea4c073d10f465f2eb15bcacb0756e

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+yrkky.txt

    Filesize

    1KB

    MD5

    623d44fabc781dcae5704d1302ca02a8

    SHA1

    f908d83fd80792850ffbc39b8096c95889e56b9c

    SHA256

    9157ed0e40a7c16b5224d56bd3a12cef375258dc31a8c52f86cef5440540ec33

    SHA512

    da22f0016386b73000a956788b2f412088eba23e9a3c2230dfd3589210ee910634c145360a5fafe3107ba0a48ada45699f3998de1cdd34e88005e497ab96145f

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    877a65dde1d273aee342178032bd1cc3

    SHA1

    875d5c8832021e4d32a9a81632953f719d6dfe7d

    SHA256

    3e46872112e8581354b80eefebeb7de103c75b7a3ed1fc20344c445131c79455

    SHA512

    dfcf0dac3084012a7f38fd1a7b2b644c1b1f8df79494bd465855951262b35fd6a9c0b767f9aa7e6319210cdfaeb43ba65934f76f6db6d0093a05dc0845f019c9

  • C:\Windows\hcfhrexsntpa.exe

    Filesize

    360KB

    MD5

    9ce01dfbf25dfea778e57d8274675d6f

    SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

    SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

    SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • C:\Windows\hcfhrexsntpa.exe

    Filesize

    360KB

    MD5

    9ce01dfbf25dfea778e57d8274675d6f

    SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

    SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

    SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • C:\Windows\hcfhrexsntpa.exe

    Filesize

    360KB

    MD5

    9ce01dfbf25dfea778e57d8274675d6f

    SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

    SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

    SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • memory/2216-15-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2216-0-0x0000000000340000-0x00000000003C5000-memory.dmp

    Filesize

    532KB

  • memory/2216-1-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2216-17-0x0000000000340000-0x00000000003C5000-memory.dmp

    Filesize

    532KB

  • memory/2676-193-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-11-0x0000000000320000-0x00000000003A5000-memory.dmp

    Filesize

    532KB

  • memory/2676-100-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-18-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-196-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-208-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-612-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-737-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-745-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2676-19-0x0000000000320000-0x00000000003A5000-memory.dmp

    Filesize

    532KB

  • memory/2676-1225-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB