Analysis

  • max time kernel
    163s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2024 20:46

General

  • Target

    VirusShare_b0c00390c9aebb41cfce74f7415bf210.exe

  • Size

    352KB

  • MD5

    b0c00390c9aebb41cfce74f7415bf210

  • SHA1

    62f3f37691303aed6a645631439dcc5c51c6e38d

  • SHA256

    d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8

  • SHA512

    0c199aec76be1fc318214c4fee5ef38773cd11d469c9221ddcd86c61c53d176b3a8b2d1cbbdd0c86f482be7c8d250bf9fd8e544c3995f96cc8472eb67aff6ee7

  • SSDEEP

    6144:QMeb/EDtpBx1aRXJub19pf3gOURaJmf+ubexB3wLaYZSzvF:QTb/wtN1aRXJg1f3gO9Jm+u2BgeYkzv

Malware Config

Extracted

Path

C:\PerfLogs\_ReCoVeRy_+fwoyk.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/33F5A43EE101125 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/33F5A43EE101125 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/33F5A43EE101125 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/33F5A43EE101125 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/33F5A43EE101125 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/33F5A43EE101125 http://yyre45dbvn2nhbefbmh.begumvelic.at/33F5A43EE101125 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/33F5A43EE101125
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/33F5A43EE101125

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/33F5A43EE101125

http://yyre45dbvn2nhbefbmh.begumvelic.at/33F5A43EE101125

http://xlowfznrg4wf7dli.ONION/33F5A43EE101125

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (152) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_b0c00390c9aebb41cfce74f7415bf210.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_b0c00390c9aebb41cfce74f7415bf210.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\iemscfahaiiq.exe
      C:\Windows\iemscfahaiiq.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2936
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4612
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
      2⤵
        PID:4472
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PerfLogs\_ReCoVeRy_+fwoyk.html

      Filesize

      12KB

      MD5

      8616c4c534c140ed5c596f5f29adfb2a

      SHA1

      533536d8ab71cc6b36d7fb6935bbfcc97a6751ed

      SHA256

      cfaa066b6b0ee2c69ad304db5d6e57111fd59c5a30e64b6086756b00193ce40e

      SHA512

      b68f5567c6cfb16912adb9a66b4063a6f36e07612ad6232928410cc13b1ebfe35072b36a5e1e5cf54edb65bfbb6c90cbcb630e8bd354cce1a284492c76a0e932

    • C:\PerfLogs\_ReCoVeRy_+fwoyk.png

      Filesize

      64KB

      MD5

      91d09da0daab4c4ea95f8c4940ebe4f4

      SHA1

      0553957d5f38db64579df91626d43a43f39c6a48

      SHA256

      147ed3a5345559c783a6eee7c74d22165f6226b2ff3c8e053f456038b0e9e050

      SHA512

      dd9a92ef3a717947ec5cd859025a72270454c85127ece55325caf363aea5161c12117bcb0fbec52c55f708fc42793341caab2c742616c5b842b7678f48fd9e70

    • C:\PerfLogs\_ReCoVeRy_+fwoyk.txt

      Filesize

      1KB

      MD5

      71a10d1f030282be3c2d80bd21182630

      SHA1

      ce7ab70688a689d7c46697efe12e3edea158e0d3

      SHA256

      a327d3648aef3b4451e58916d70475be769577f59f6b280912f24970d133fc87

      SHA512

      129e70824cdd639c403e3dd57518a68f925d13909e0985914109f6a50dfb622cb398f44849da2f618f6fb5d1d3c7048e133b11fa8ac7d9b1ae2b791efadf8b3f

    • C:\Windows\iemscfahaiiq.exe

      Filesize

      352KB

      MD5

      b0c00390c9aebb41cfce74f7415bf210

      SHA1

      62f3f37691303aed6a645631439dcc5c51c6e38d

      SHA256

      d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8

      SHA512

      0c199aec76be1fc318214c4fee5ef38773cd11d469c9221ddcd86c61c53d176b3a8b2d1cbbdd0c86f482be7c8d250bf9fd8e544c3995f96cc8472eb67aff6ee7

    • memory/2936-200-0x0000000002180000-0x0000000002206000-memory.dmp

      Filesize

      536KB

    • memory/2936-12-0x0000000002180000-0x0000000002206000-memory.dmp

      Filesize

      536KB

    • memory/2936-35-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/2936-193-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/2936-231-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/2936-271-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/2936-597-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/2936-608-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/4572-11-0x00000000022B0000-0x0000000002336000-memory.dmp

      Filesize

      536KB

    • memory/4572-10-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/4572-9-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/4572-1-0x0000000000400000-0x000000000049C000-memory.dmp

      Filesize

      624KB

    • memory/4572-0-0x00000000022B0000-0x0000000002336000-memory.dmp

      Filesize

      536KB