Resubmissions
18-03-2024 13:43
240318-q1nhlaag4w 10Analysis
-
max time kernel
591s -
max time network
395s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win11-20240412-en
General
-
Target
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
-
Size
947KB
-
MD5
39217b125403ff7c755622ef9bbef974
-
SHA1
9fc607b7c17919c83999bdd119e9cd6bf413101a
-
SHA256
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816
-
SHA512
1252ea94931eaf4426ca1eb94a070645238775c447a09286109fe894c569de29ca502882a0fa34e97e09109c43c486a3aa32081e3a3afef0b6557db59c71fc50
-
SSDEEP
12288:3+Zn/gJtKaNIBpB+iMMOD30ZnZ47m0T3JF9j3GOF0l7B2FzqL2aZa7rf58bs:3+RYeaNILZi/JDLG60y1aZvs
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral2/memory/2024-5832-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5834-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5836-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5849-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5850-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5851-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5852-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5861-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5862-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5863-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5866-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5867-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5868-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5869-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5870-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5871-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5872-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5873-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5874-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5875-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5876-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5877-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5878-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5879-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5880-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5881-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5882-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5883-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5884-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5885-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5886-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5887-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5888-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5889-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5890-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5891-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5892-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5893-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5894-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5895-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5896-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5897-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5898-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5899-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5900-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5901-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5902-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5903-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5904-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5905-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5906-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5907-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5908-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5909-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5910-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5911-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5912-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5913-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5914-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5915-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5916-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5917-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5918-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2024-5919-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 10060 2024 WerFault.exe 72 10108 2024 WerFault.exe 72 10164 2024 WerFault.exe 72 7640 2024 WerFault.exe 72 7716 2024 WerFault.exe 72 5000 2024 WerFault.exe 72 1832 2024 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2024 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 9562⤵
- Program crash
PID:10060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10922⤵
- Program crash
PID:10108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 11922⤵
- Program crash
PID:10164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 12082⤵
- Program crash
PID:7640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 12202⤵
- Program crash
PID:7716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 11722⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 12602⤵
- Program crash
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bfca410f6a21866be24873211e385650
SHA1f33e4e4680119b7fb37bc26668c05950d5936e54
SHA2565d32e8e988f77e8da5b892022b2bebf3f62ceb56d6faca8c2fb08fd23a000ae1
SHA512d833ee1e1e93600f2718f5c65b0e451667363565df18f87f0997eb2bd57790a4233805a37f36a38a786a340aea0a7001206fae65804fd1022f5a97c91d40362f
-
Filesize
25KB
MD5ec980bb131b4c8d221c428859fd170e0
SHA1410c1d26a6139c377a7f52a57ce5e7a9b0f5885a
SHA256c53040ada9c3fff355a9092e23855e4077aa8f6fea1c3b458b56660125e6b99f
SHA5123cfcc3961e8059118b85e28f7be8bb46df46e68401248c767c12198f9ec0b580c77dd2fa441c0424c721cd1e916a2634845a43098a837e64e0162dc32d35bc22
-
Filesize
155KB
MD524432dcb90205dbe5b991332b17044ef
SHA1a90461f6da07c85f52d9b0717b79bbe953df96e7
SHA2563a94e913f903c04b9cd61754cb1c9a0765544a4360468387ff6471758fc32079
SHA5125cf6ac4964b2fa4802e3f827803b35cd22f3a8430818ae778d23ee9d9da85c19f721a12fa75c3f437ae27599edbe84b81645b919c2508ad6184d4be2a6123053
-
Filesize
182B
MD5fb3d513f3cc93f691c61e68810b45562
SHA15fb4d6b5d8c5f0b2ff83e417a34c87211b9c8b79
SHA2567e5cd2717f8164e69b9e65198d44da416db4ebf57998f0377eb2cd4bd4535b67
SHA51294d56a3c46673df6116340c9af3ffb50b862fbea4529e757fd596014b0f4016eca1b6a5c50b6111c4c526223d6a8b02c118b8f4e15d753dbd4adb377ca5d4c88