Resubmissions
17-04-2024 12:14
240417-pesdzsfh4y 1017-04-2024 12:14
240417-persfsfh4x 1017-04-2024 12:14
240417-peqv6aec97 1017-04-2024 12:14
240417-pedktsfh3z 1017-04-2024 12:14
240417-peczasec87 1017-04-2024 06:32
240417-ha37csfh67 10Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 12:14
Behavioral task
behavioral1
Sample
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Resource
win11-20240412-en
General
-
Target
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
-
Size
1.1MB
-
MD5
20cba77eaae04ca6623cbbe03f9a81d8
-
SHA1
fd989d3ba9ab0534f48b7cb1d11036a4ed08e431
-
SHA256
c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856
-
SHA512
e102e1902d224730fccce9cefc8d9c92471a35a49e64718d2dacd183d629fbc388fd6c6ae3fa5c59115cef061106459b767bec21628339bd712c291ea60a86f9
-
SSDEEP
24576:VVimLZikdvnYgTcH2JsjaCtxl7j7XFv+RC7WwQOvu+s:VVimLZiSfHJ8aCtxl7nVvwCa8uz
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral4/memory/4160-0-0x0000000000400000-0x000000000060B000-memory.dmp upx behavioral4/memory/4160-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral4/memory/4160-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral4/memory/4160-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral4/memory/4160-5-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral4/memory/4160-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral4/memory/4160-10-0x0000000000400000-0x000000000060B000-memory.dmp upx behavioral4/memory/4160-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4160 c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe 4160 c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe 4160 c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe 4160 c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe"C:\Users\Admin\AppData\Local\Temp\c4a48fbe5df0c9b765899f3edf6e1003fd3a2a6bcc39d1b3a0343bb246b78856.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2976