Resubmissions
04-04-2024 10:25
240404-mf9csada39 1004-04-2024 10:18
240404-mcec8scc31 1002-04-2024 03:00
240402-dhm3wsfb76 1002-04-2024 02:52
240402-dc3w6aee8s 1031-05-2022 01:49
220531-b8vjjseeep 10Analysis
-
max time kernel
297s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
Resource
win7-20240221-en
General
-
Target
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
-
Size
917KB
-
MD5
6b5410cf5fa90e28d32077088f3a3514
-
SHA1
321a8ad1d6ec06af69ab4515e523f5d31261814d
-
SHA256
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547
-
SHA512
6107132f44b4b72e5019425a7536b953bdaa3c1cf46a28cfbcccae4a00dae95489dd2bcbdbbf387eff494a15c049f0e30597e3018662722ef37a533311ca2ecd
-
SSDEEP
24576:aEjzOm1ixlvxuYejDEmq75NICHpVpuNgda6bU:VrixlE34mq75NICH/iYpbU
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Loads dropped DLL 1 IoCs
pid Process 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
resource yara_rule behavioral1/memory/2568-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-17-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-34-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-43-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-44-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-45-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-46-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-47-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-48-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-49-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-51-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-52-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-53-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-54-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-55-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-56-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2568-57-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2568 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 2568 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 2988 wrote to memory of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 2988 wrote to memory of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 2988 wrote to memory of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 2988 wrote to memory of 2568 2988 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89