Resubmissions
18-03-2024 13:43
240318-q1nhlaag4w 10Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win11-20240412-en
General
-
Target
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
-
Size
947KB
-
MD5
39217b125403ff7c755622ef9bbef974
-
SHA1
9fc607b7c17919c83999bdd119e9cd6bf413101a
-
SHA256
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816
-
SHA512
1252ea94931eaf4426ca1eb94a070645238775c447a09286109fe894c569de29ca502882a0fa34e97e09109c43c486a3aa32081e3a3afef0b6557db59c71fc50
-
SSDEEP
12288:3+Zn/gJtKaNIBpB+iMMOD30ZnZ47m0T3JF9j3GOF0l7B2FzqL2aZa7rf58bs:3+RYeaNILZi/JDLG60y1aZvs
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral3/memory/1600-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-18-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-25-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-34-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-39-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-40-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-43-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-44-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-45-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-46-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-47-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-48-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-49-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-51-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-52-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-53-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-54-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-55-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-56-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral3/memory/1600-57-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 2908 1600 WerFault.exe 91 4940 1600 WerFault.exe 91 5048 1600 WerFault.exe 91 3576 1600 WerFault.exe 91 4472 1600 WerFault.exe 91 4956 1600 WerFault.exe 91 1088 1600 WerFault.exe 91 1576 1600 WerFault.exe 91 804 1600 WerFault.exe 91 3408 1600 WerFault.exe 91 2596 1600 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 1600 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 9882⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 11082⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 12242⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 12682⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8962⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 12762⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13042⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 12842⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13442⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13882⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13122⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1600 -ip 16001⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1600 -ip 16001⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1600 -ip 16001⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1600 -ip 16001⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1600 -ip 16001⤵PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1600 -ip 16001⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1600 -ip 16001⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1600 -ip 16001⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1600 -ip 16001⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1600 -ip 16001⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1600 -ip 16001⤵PID:404