Overview
overview
10Static
static
30774ee18a5...47.exe
windows7-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3SignUp.css
windows7-x64
3Uninstall.exe
windows7-x64
7confidence.fjo
windows7-x64
3global_ie9.css
windows7-x64
3jquery.tooltip.css
windows7-x64
3landing-gas-icon.png
windows7-x64
3nivo.css
windows7-x64
3noFlying.css
windows7-x64
3photo.jpg
windows7-x64
3Resubmissions
04-04-2024 10:25
240404-mf9csada39 1004-04-2024 10:18
240404-mcec8scc31 1002-04-2024 03:00
240402-dhm3wsfb76 1002-04-2024 02:52
240402-dc3w6aee8s 1031-05-2022 01:49
220531-b8vjjseeep 10Analysis
-
max time kernel
297s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240319-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
SignUp.css
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
confidence.fjo
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
global_ie9.css
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
jquery.tooltip.css
Resource
win7-20240220-en
Behavioral task
behavioral11
Sample
landing-gas-icon.png
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
nivo.css
Resource
win7-20231129-en
Behavioral task
behavioral13
Sample
noFlying.css
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
photo.jpg
Resource
win7-20240221-en
General
-
Target
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
-
Size
917KB
-
MD5
6b5410cf5fa90e28d32077088f3a3514
-
SHA1
321a8ad1d6ec06af69ab4515e523f5d31261814d
-
SHA256
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547
-
SHA512
6107132f44b4b72e5019425a7536b953bdaa3c1cf46a28cfbcccae4a00dae95489dd2bcbdbbf387eff494a15c049f0e30597e3018662722ef37a533311ca2ecd
-
SSDEEP
24576:aEjzOm1ixlvxuYejDEmq75NICHpVpuNgda6bU:VrixlE34mq75NICH/iYpbU
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Loads dropped DLL 1 IoCs
pid Process 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
resource yara_rule behavioral1/memory/2580-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-17-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-34-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-43-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-44-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-45-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-46-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-47-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-48-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-49-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-51-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-52-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-53-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-54-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-55-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2580-56-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 2580 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1900 wrote to memory of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1900 wrote to memory of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1900 wrote to memory of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1900 wrote to memory of 2580 1900 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89