Resubmissions

18-03-2024 13:43

240318-q1nhlaag4w 10

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 13:43

General

  • Target

    3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe

  • Size

    947KB

  • MD5

    39217b125403ff7c755622ef9bbef974

  • SHA1

    9fc607b7c17919c83999bdd119e9cd6bf413101a

  • SHA256

    3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816

  • SHA512

    1252ea94931eaf4426ca1eb94a070645238775c447a09286109fe894c569de29ca502882a0fa34e97e09109c43c486a3aa32081e3a3afef0b6557db59c71fc50

  • SSDEEP

    12288:3+Zn/gJtKaNIBpB+iMMOD30ZnZ47m0T3JF9j3GOF0l7B2FzqL2aZa7rf58bs:3+RYeaNILZi/JDLG60y1aZvs

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • UPX dump on OEP (original entry point) 19 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
    "C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\catroot2\dberr.txt

    Filesize

    154KB

    MD5

    b23c2dca8d4a176f3af63c3a1cabf94b

    SHA1

    1957e744ca7e229efd58b9daa7b114e638c34fa5

    SHA256

    6e51f3bf3cbc646eaa89af7435513eb2e52bc4ae47d2c901baaf88fda4a54c0d

    SHA512

    fd0b733e134cb6c6c65d5b784c452db1ec7cddf8b8a0ce8d66bc7026e2289a6c2031f291284a079d711d9b255974ef0273f07cdedf8a43c7b2b933d86bd84d93

  • C:\Windows\System32\catroot2\dberr.txt

    Filesize

    112KB

    MD5

    2928bbac0d98feb8de1d649b741df66d

    SHA1

    7cd75031a0ea48cb6d7b9e8e460d4ef94dd2f7a9

    SHA256

    ec0aa2156b26df68f0a86f9515f766f748714807cb422be4fbdd57d7d2c1b420

    SHA512

    527e6823e2460de259498c131885f808d96367f2455df2c2deccd478ce0d592440b153574a6a682259e08d384c449e6b1883d5fab6862c4713d7826504b211df

  • memory/2876-5845-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5832-0x0000000003660000-0x0000000003728000-memory.dmp

    Filesize

    800KB

  • memory/2876-5846-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5831-0x0000000003660000-0x0000000003728000-memory.dmp

    Filesize

    800KB

  • memory/2876-5847-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5834-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5833-0x0000000003660000-0x0000000003728000-memory.dmp

    Filesize

    800KB

  • memory/2876-5836-0x0000000003660000-0x0000000003728000-memory.dmp

    Filesize

    800KB

  • memory/2876-5837-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5839-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5842-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5848-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5844-0x0000000003660000-0x0000000003661000-memory.dmp

    Filesize

    4KB

  • memory/2876-0-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5830-0x0000000003660000-0x0000000003661000-memory.dmp

    Filesize

    4KB

  • memory/2876-5829-0x0000000002570000-0x0000000002680000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-5843-0x0000000002570000-0x0000000002680000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-5849-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5850-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5851-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5854-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5855-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5856-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5857-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5858-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5859-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5860-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5861-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/2876-5862-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB