Resubmissions
04-04-2024 10:25
240404-mf9csada39 1004-04-2024 10:18
240404-mcec8scc31 1002-04-2024 03:00
240402-dhm3wsfb76 1002-04-2024 02:52
240402-dc3w6aee8s 1031-05-2022 01:49
220531-b8vjjseeep 10Analysis
-
max time kernel
295s -
max time network
275s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
Resource
win7-20240221-en
General
-
Target
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe
-
Size
917KB
-
MD5
6b5410cf5fa90e28d32077088f3a3514
-
SHA1
321a8ad1d6ec06af69ab4515e523f5d31261814d
-
SHA256
0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547
-
SHA512
6107132f44b4b72e5019425a7536b953bdaa3c1cf46a28cfbcccae4a00dae95489dd2bcbdbbf387eff494a15c049f0e30597e3018662722ef37a533311ca2ecd
-
SSDEEP
24576:aEjzOm1ixlvxuYejDEmq75NICHpVpuNgda6bU:VrixlE34mq75NICH/iYpbU
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Loads dropped DLL 1 IoCs
pid Process 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
resource yara_rule behavioral1/memory/2760-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-23-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-32-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-33-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-43-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-44-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-45-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-46-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-47-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-48-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-49-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-51-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-52-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-53-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-54-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-55-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-56-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-57-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 2760 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1892 wrote to memory of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1892 wrote to memory of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1892 wrote to memory of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28 PID 1892 wrote to memory of 2760 1892 0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"C:\Users\Admin\AppData\Local\Temp\0774ee18a57ee8a20d7f355f23a6b7f049dd93c251e2cc9af0100e92a3526547.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89