Analysis
-
max time kernel
82s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 10:08
Static task
static1
1 signatures
9 signatures
150 seconds
General
-
Target
-
Size
1.4MB
-
MD5
63210f8f1dde6c40a7f3643ccf0ff313
-
SHA1
57edd72391d710d71bead504d44389d0462ccec9
-
SHA256
2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
-
SHA512
87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
SSDEEP
12288:WZgSKWk54jeg6lL5assQHtzV2KoLJ+PwXxwuLSJ8slf1zMr6iL/KNDx2PIXe2Q:KgoLetlLS8tz6V+PwD0XVMrXCNDxtK
Score
10/10
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral1/memory/4484-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-57-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-58-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4484-59-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4484 [email protected] 4484 [email protected] 4484 [email protected] 4484 [email protected] 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe 1696 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3944 1696 AcroRd32.exe 108 PID 1696 wrote to memory of 3944 1696 AcroRd32.exe 108 PID 1696 wrote to memory of 3944 1696 AcroRd32.exe 108 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2056 3944 RdrCEF.exe 109 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110 PID 3944 wrote to memory of 2596 3944 RdrCEF.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1388
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=67988AF953F4907FA373E13991EB5E3F --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=76D25264F18E3423EA258FE2FCAB71B6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=76D25264F18E3423EA258FE2FCAB71B6 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵PID:2596
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B984C9A0F0382B68107846924D641053 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3264
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6C2322EA7B11B1240C0E1DD0AED82101 --mojo-platform-channel-handle=1864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:776
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532