Resubmissions
07-04-2024 06:30
240407-g9kcvsfa9t 1007-04-2024 06:30
240407-g9fpnsfe96 1007-04-2024 06:29
240407-g9bqqafa81 1007-04-2024 06:29
240407-g86vgafa8w 1013-05-2021 14:29
210513-hwsahb137j 10Analysis
-
max time kernel
128s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe
Resource
win7-20240221-en
General
-
Target
9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe
-
Size
1.0MB
-
MD5
7f9d970c685f7f33aa8a961f2a10173d
-
SHA1
11f93876dba467125556c04a85c19f4b93ed5e4c
-
SHA256
9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e
-
SHA512
fb57c9f3caf4d39c8ea3f3cb12536fae6baa874c89c84af5fa08853f56436d269d09c7a45467624009d54dc5af77bef903d1a9dd63502aa147c30cc606acef5e
-
SSDEEP
12288:3i94bywx1Dj5+h7ZCn0P5T7lHDbIi9dszYjN5HbPiLsptcyx7tbFEujtgw:3Hx13SZW0x5j5dsYnHeYpuyx7tx/tgw
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/804-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-7-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-12-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/804-13-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 804 9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe 804 9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 804 9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe"C:\Users\Admin\AppData\Local\Temp\9fd59ba40c26b3161642d5ebb85796b4262e5d5aa5d1e5eceb919b52a8f9b00e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:804