Overview
overview
10Static
static
3Scans43.scr
windows7-x64
10Scans43.scr
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
Scans43.scr
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Scans43.scr
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
Scans43.scr
-
Size
907KB
-
MD5
80c96b710a809cd0dc5d71ced520e343
-
SHA1
e628c2f5ca249987a860df0a5bd9225aff1f9553
-
SHA256
b38eb05b2bb722b2e9e4b6032645d07524da27629167578426918468aebf3d21
-
SHA512
0e7520e98435f96c4a3fee921d8468d1747308671911dfb6c9150acf978d6791e46831b1259d1a7a6bf1c3747836d79f8930931d2833f4554e5a84f7bb6f12f9
-
SSDEEP
12288:gb/bnp62fDpd0CsgoiLxgfGBQg4pHxR/76W6hiAomLGorkvzyv9o8UR7etQr7TCn:gb/bnoA3lsEQGrA/7B85qWkzG8r7HqN
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Loads dropped DLL 1 IoCs
pid Process 1136 Scans43.scr -
resource yara_rule behavioral1/memory/1720-7-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-8-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-13-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-14-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-23-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-30-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-32-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1720-33-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Scans43.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1136 set thread context of 1720 1136 Scans43.scr 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 Scans43.scr 1720 Scans43.scr -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1136 Scans43.scr -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1720 1136 Scans43.scr 28 PID 1136 wrote to memory of 1720 1136 Scans43.scr 28 PID 1136 wrote to memory of 1720 1136 Scans43.scr 28 PID 1136 wrote to memory of 1720 1136 Scans43.scr 28 PID 1136 wrote to memory of 1720 1136 Scans43.scr 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scans43.scr"C:\Users\Admin\AppData\Local\Temp\Scans43.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Scans43.scr"C:\Users\Admin\AppData\Local\Temp\Scans43.scr" /S2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD555a26d7800446f1373056064c64c3ce8
SHA180256857e9a0a9c8897923b717f3435295a76002
SHA256904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8
SHA51204b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b