Resubmissions
18-03-2024 13:43
240318-q1nhlaag4w 10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10v2004-20240226-en
General
-
Target
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
-
Size
947KB
-
MD5
39217b125403ff7c755622ef9bbef974
-
SHA1
9fc607b7c17919c83999bdd119e9cd6bf413101a
-
SHA256
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816
-
SHA512
1252ea94931eaf4426ca1eb94a070645238775c447a09286109fe894c569de29ca502882a0fa34e97e09109c43c486a3aa32081e3a3afef0b6557db59c71fc50
-
SSDEEP
12288:3+Zn/gJtKaNIBpB+iMMOD30ZnZ47m0T3JF9j3GOF0l7B2FzqL2aZa7rf58bs:3+RYeaNILZi/JDLG60y1aZvs
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
UPX dump on OEP (original entry point) 17 IoCs
resource yara_rule behavioral2/memory/620-6-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-15-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-18-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-19-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-28-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-29-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-30-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-31-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-32-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-35-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-36-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-37-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-38-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-39-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-40-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-41-0x0000000000400000-0x00000000005DE000-memory.dmp UPX behavioral2/memory/620-42-0x0000000000400000-0x00000000005DE000-memory.dmp UPX -
resource yara_rule behavioral2/memory/620-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-18-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-32-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/620-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2876 620 WerFault.exe 88 4504 620 WerFault.exe 88 1492 620 WerFault.exe 88 4612 620 WerFault.exe 88 892 620 WerFault.exe 88 3008 620 WerFault.exe 88 2008 620 WerFault.exe 88 4580 620 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 620 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 9922⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 11522⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12322⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12722⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 8962⤵
- Program crash
PID:892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12322⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12722⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 13322⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 620 -ip 6201⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 620 -ip 6201⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 620 -ip 6201⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 620 -ip 6201⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 620 -ip 6201⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 620 -ip 6201⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 620 -ip 6201⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 620 -ip 6201⤵PID:4348