Resubmissions
07-04-2024 06:22
240407-g46nxafd94 1007-04-2024 06:22
240407-g4x2rsfd88 1007-04-2024 06:21
240407-g4sgaafd85 1007-04-2024 06:21
240407-g4m7kaeh9t 1030-12-2023 12:23
231230-pkz11sgdal 10Analysis
-
max time kernel
127s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
186b16a81a4742afd8bd53590ff2e705.exe
Resource
win7-20240221-en
General
-
Target
186b16a81a4742afd8bd53590ff2e705.exe
-
Size
1.1MB
-
MD5
186b16a81a4742afd8bd53590ff2e705
-
SHA1
3ec4410a8598ef780b2eb4ac5f0dc3113619f0f5
-
SHA256
6d6089fee5f86170c5b3485a626cc6073631d09004f298da7b690b12a9482086
-
SHA512
6ba11e6a2dd9fa4db11acb39f7cf7924f0a3bc720592891f0293cf1f2b002c06c052717cb129182f39fbba32196b96f392ada1fb664933121ec0ccf16478b16f
-
SSDEEP
24576:0HtrdKYVVSrqGDohJ3STZG8vIn/sCBGnWsY03++:0HtV7GwBSTc8An/4YJ+
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/332-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-9-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-12-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/332-13-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 186b16a81a4742afd8bd53590ff2e705.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 332 186b16a81a4742afd8bd53590ff2e705.exe 332 186b16a81a4742afd8bd53590ff2e705.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 186b16a81a4742afd8bd53590ff2e705.exe