Resubmissions
06-04-2024 15:13
240406-slp4zsda2y 1006-04-2024 15:12
240406-slhd5sdf75 1006-04-2024 15:12
240406-sk9r1adf68 1006-04-2024 15:11
240406-skt2jsch9s 1025-03-2024 14:17
240325-rl28wadd8t 10Analysis
-
max time kernel
1561s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 15:13
Static task
static1
General
-
Target
-
Size
1.4MB
-
MD5
63210f8f1dde6c40a7f3643ccf0ff313
-
SHA1
57edd72391d710d71bead504d44389d0462ccec9
-
SHA256
2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
-
SHA512
87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
SSDEEP
12288:WZgSKWk54jeg6lL5assQHtzV2KoLJ+PwXxwuLSJ8slf1zMr6iL/KNDx2PIXe2Q:KgoLetlLS8tz6V+PwD0XVMrXCNDxtK
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1908-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-5-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-33-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-34-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-43-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-44-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-45-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-47-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-46-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-49-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-48-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-51-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-53-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-52-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-54-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-56-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-57-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-55-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-58-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-59-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-60-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-61-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-62-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-63-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-64-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-65-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-66-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-67-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-68-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-71-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-70-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-69-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-73-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-72-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-77-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-76-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-75-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-74-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-78-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-79-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-80-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-82-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-81-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-84-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-85-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-83-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-87-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-88-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-89-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1908-86-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: [email protected] -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\1F8316411F831641.bmp" [email protected] -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\sk.txt [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\gadget.xml [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png [email protected] File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_CopyDrop32x32.gif [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-applemenu.xml [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\whitemenu.png [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_widescreen_Thumbnail.bmp [email protected] File opened for modification C:\Program Files\Windows Media Player\Media Renderer\connectionmanager_dmr.xml [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_sun.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_up.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\timeZones.js [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\gadget.xml [email protected] File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_title.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-down.png [email protected] File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup-impl.xml [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_VideoInset.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_top.png [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\bg_sidebar.png [email protected] File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.bmp [email protected] File opened for modification C:\Program Files\7-Zip\Lang\fa.txt [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\ehshellLogo.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_settings.png [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-compat.xml [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\7.png [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-next-static.png [email protected] File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json [email protected] File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Xusage.txt [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\RSSFeeds.html [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\flyout.css [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\settings.html [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm [email protected] File opened for modification C:\Program Files\7-Zip\Lang\kk.txt [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\gadget.xml [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\settings.html [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\RSSFeeds.css [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\settings.css [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png [email protected] File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi [email protected] File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookbig.gif [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground_PAL.wmv [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_MCELogo_mousedown.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\clock.js [email protected] File opened for modification C:\Program Files\7-Zip\Lang\an.txt [email protected] File opened for modification C:\Program Files\Mozilla Firefox\updater.ini [email protected] File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter_partly-cloudy.png [email protected] File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\40.png [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1980 vssadmin.exe 1104 vssadmin.exe 2040 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 [email protected] 1908 [email protected] -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1724 vssvc.exe Token: SeRestorePrivilege 1724 vssvc.exe Token: SeAuditPrivilege 1724 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1908 [email protected] -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1980 1908 [email protected] 30 PID 1908 wrote to memory of 1980 1908 [email protected] 30 PID 1908 wrote to memory of 1980 1908 [email protected] 30 PID 1908 wrote to memory of 1980 1908 [email protected] 30 PID 1908 wrote to memory of 1104 1908 [email protected] 34 PID 1908 wrote to memory of 1104 1908 [email protected] 34 PID 1908 wrote to memory of 1104 1908 [email protected] 34 PID 1908 wrote to memory of 1104 1908 [email protected] 34 PID 1908 wrote to memory of 2040 1908 [email protected] 36 PID 1908 wrote to memory of 2040 1908 [email protected] 36 PID 1908 wrote to memory of 2040 1908 [email protected] 36 PID 1908 wrote to memory of 2040 1908 [email protected] 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1980
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1104
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2040
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD551d9ddd59f6883c9f35fc6b6070741c1
SHA1e333b1890a2cbeedd31d8c0208eee7823bee6af0
SHA256ef160f21a59a26f8b849bfda21951e7fd7bf12589a38d9bea1c8d19ce5c37c33
SHA512842a09a6299cfac9a822b92184ffb528107eaaa6c53977503bf821f00f3eaad06aee2cde672ed35eb655fa81b851782f7131cc0a55cc2906cc2fa5378c750116