Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 11:37

General

  • Target

    VirusShare_58999b891c115ca4cd983c9675724890.exe

  • Size

    376KB

  • MD5

    58999b891c115ca4cd983c9675724890

  • SHA1

    8157379d1d1a40de5dfd00ea70c2cacc6b5d2f5e

  • SHA256

    ae50c1a234d07eb39859cf7aea9361d9b54397d477866ae38bb61ad904298315

  • SHA512

    6773b60e8ad7e940724daf5aa81cd1c08c113b4087c6ff69b21a12fd3c684e441007ab2968780ad5c0425a45ee1b2f3b8f486cc832415ce21f75da0b65e522ed

  • SSDEEP

    6144:ue3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:uY5hMfqwTsTKcmTV5kINEx+d

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+sokdh.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9DE9F4265976D689 2. http://kkd47eh4hdjshb5t.angortra.at/9DE9F4265976D689 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/9DE9F4265976D689 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/9DE9F4265976D689 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9DE9F4265976D689 http://kkd47eh4hdjshb5t.angortra.at/9DE9F4265976D689 http://ytrest84y5i456hghadefdsd.pontogrot.com/9DE9F4265976D689 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/9DE9F4265976D689
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9DE9F4265976D689

http://kkd47eh4hdjshb5t.angortra.at/9DE9F4265976D689

http://ytrest84y5i456hghadefdsd.pontogrot.com/9DE9F4265976D689

http://xlowfznrg4wf7dli.ONION/9DE9F4265976D689

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (426) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_58999b891c115ca4cd983c9675724890.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_58999b891c115ca4cd983c9675724890.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_58999b891c115ca4cd983c9675724890.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_58999b891c115ca4cd983c9675724890.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\fttokwwcmjmp.exe
        C:\Windows\fttokwwcmjmp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\fttokwwcmjmp.exe
          C:\Windows\fttokwwcmjmp.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2864
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:876
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2124
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1160
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1220
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
        3⤵
        • Deletes itself
        PID:2860
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+sokdh.html

    Filesize

    7KB

    MD5

    1cbf5b3b2316e3dbcd1022b59fd3af74

    SHA1

    6bef5f7104433b9d463e5f3f5db1f41ff3eb64c2

    SHA256

    90f834ab6f164714cc33abd97637dfc5421e895f765d036fe65180870db3989b

    SHA512

    3c1e41fb8e13bde3e99a64427a1256d0a0e9bf54953935d4fa41adfdd32bfbb20f31bd3e7659fbb01f5d18599f9c27065e289d35a2c9c1ee1e6f312d4aeac3b1

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+sokdh.png

    Filesize

    63KB

    MD5

    d96eccfd5b93f940255675c632657391

    SHA1

    70dd0f6b29cf1fa14b08fcc97e71be5e0209ca26

    SHA256

    d7d5fb85c2977fbda38227bf42c4d631bd247bbd5d70eef9c9e712b8efceca24

    SHA512

    2491240000ee385cb261347fd30191fc703919653092153af11117df22afb405a19eb45f231005ef0fdf1fc6f9c28694960a9349258c8be049681fb79c22971f

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+sokdh.txt

    Filesize

    1KB

    MD5

    207828465c7ad77ca44a13ac27fd1b8f

    SHA1

    5e2997a9d7eeaffbf4c99df186e9717d14766970

    SHA256

    fffeb6bc8b8057da286291c9bf2dc2aca31a0ec2b2ef741970b5f3fdd6d3a6fa

    SHA512

    b470d3b7459248d091beaea60823ee306d8de7b1b5f3be962d0d03d11ff2fe509787ed0ed3f1362ce4aeba6e98bf9cbad3677a8432a7ee92f6b0bc4acaec328c

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    94f541d622c730ba073e66295ce06cd5

    SHA1

    6155a98c32a4079d15bb6956d2c20c8a1bc1f529

    SHA256

    0937bc352babbd29a157fb0a54dd74ce6d15c0cc3d1f00eb7533689e7d650a6f

    SHA512

    3a44504d46302965b6023d0d58202f8605c86552259434a36a76e63565a440c01e2bcc5320d488758a58714da4ff7c7e647d42403da5c9db774a0371aab9126d

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    3fc4a97f4c26f0c7753c3d35c93d08a2

    SHA1

    494bc7245d6b5c7db197576ff1745de6b136a7d7

    SHA256

    6d505cb800abbada3d6a7dc39580a238c8d41731ab8e685e562e32480b16168a

    SHA512

    7611811818e866cf51772e12109b79b22c9f3f951256648c72f42cd3c3ecedab73756ce14a6ece759b1ca62fb9623a5f1660cc4a7b1206d2faa9ba4d3ffbab21

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    6467fca6edea8cad3497abc09667ad8b

    SHA1

    1116720d6f1d626fd2cb3be565d01e07412311c2

    SHA256

    097909fd2ff391d50c1737a2a8d20a944f6b44cebd51807c726ca6b8fb831ef1

    SHA512

    ededa7b46d5f08ea3afacf5215dd074bd4874417ff602ec10251f418ce8422f80f63278a97ca4d638d978aef25e73ec645b15e63e5b6331293831d41753e0f45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a9a35cfdb8213bfaee09499669c70ef

    SHA1

    3ce66012def7ab6e33a32f0733c33f35628e3198

    SHA256

    ff33b72b130f10c90058af466b2b1156dc607e1aa8bdf48e923addc3e08e9d3b

    SHA512

    14f687d91f9194124109921fee0bd23e3d648a217713a640ec2b64faab2c29e6c552da2a9ef7e412308cd102536fbf7bc494bd4159ab9f3b9a52732ace9e6994

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04a25188d6b4feb14251964cea766352

    SHA1

    46788aa232d8a2859d7c319cd06684b22900907b

    SHA256

    2cbd507d633c54cd0d5c38a60d0c2255b0a3a13fc11ac013458ae2dbd76a8af4

    SHA512

    b1fa69d75b108a568971278b939a3540bb24e985948d92ea2822d05d1b15449b1c06c3b3ae70849e713426d5d93aa5e13fb9001d09e6b57bfec5e7c41a10effa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcfae418b97834a17dbaa8e7422a9f86

    SHA1

    8715d4231fa4b4a68b9e3085a083e8b2245c34a0

    SHA256

    91326c70eb838c7834a371d834cdc9c825ef707b5534ba09ddef5accf7d0f1bf

    SHA512

    bf638c36e9c2b57584650d0754e5604a2071792ae99c276df30760a8e5aaefc1e740fa344728f0dae9e46e379f78a47eea096acfdaa895df899d5fe7d21e6352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf608c45954d795c0d7daaf55b285f6a

    SHA1

    2671fa12827f4813f4061273a3285c0e6e767ddc

    SHA256

    86d4847c13f9eb91509929f9db0b871537ff223b47451eb43620d8a08e192361

    SHA512

    3d3756702bcb6b5fba1f389051e728583f547f7ed71cbbd18ec6c02d95246569ccae7d5832356e739101410c8f8ce5ed3c7b05656981bd844dfd49760e0dfc1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e7a796b3ad8f81b8b764f5438c7a058

    SHA1

    362633d4675645945cb23c3f5f4364b4bbb5652f

    SHA256

    c3a569090177fd27814f0538a10a8a435157f1c37089e283fff68d751634c60d

    SHA512

    eff21fba59535d6d8bace4207dd917e5504a86e9e9e7388385c8697cff95dcda621ca6d40530c504ede721e92828464aedd48f6962b5394ff05acb3aeefb6d59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00ed036631075141c5ca0eedf1f5e4f3

    SHA1

    71ac8f300f92853fc295fe71e53e6dc18266f161

    SHA256

    1c03eff55a8008ec0bd85cea06f6d91caff9adb1651b8cdc245c131341e836bb

    SHA512

    a24fd5873d66eefa09219c10714e5850e1bfc5c358f24db67459c0e0e57b156b9ffe7ab1508e84a4820da1f36db9fc897e50f79ba93b26813c4aba8dc3eb9487

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87ff26d62ade0dca8f78d634e5b94aad

    SHA1

    fa2f86e687c4c42097e122b597ae398364a93b04

    SHA256

    2db4031a8e07df54ac7bb0dabaeab2f77d88ece8f27a128bdbaa2b8fff3c6635

    SHA512

    bdd8e225ebc40038e3391eb559198f956e7eba701c05074ffe0e708c5ca41b9269127c88bfab4c4285701385405747d60c660d4161e58f9b34bb24defc9fe340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31a9dcb568d459f35567fc06e98f7ddf

    SHA1

    ecf583901cddbb486fdcf48fee7935d6c955033f

    SHA256

    b3eeac7a13199d07d372830660d5a8734292e63ad68fb4d0e8e75a7088cbe30d

    SHA512

    4ee1217ba45bb81227da3bc9c9ff0c7eac6ef39e83d8e6a56bf678e481bf122ab95b9a12121f4282456cb4ff6a3e4fa8d37c2a37b704a2ae213d70568e9c32d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b864060abcd197399fa7ba901cdf5e41

    SHA1

    28c0a70cc7974d166e2157591f839078c1fc12ae

    SHA256

    76f60ffb5d7ba4c7dd125df995a0219158b2a4830b1ec3158e941420b2e763d4

    SHA512

    e272cdb3a3974805ea3d96edf4f8678567d294ef2df3981adb0b0d5223219d43a4771c3522f3371d7154e8882af723bafb1482f5a6dff0497a70782bcdc12e10

  • C:\Users\Admin\AppData\Local\Temp\Cab9560.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar95F4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\fttokwwcmjmp.exe

    Filesize

    376KB

    MD5

    58999b891c115ca4cd983c9675724890

    SHA1

    8157379d1d1a40de5dfd00ea70c2cacc6b5d2f5e

    SHA256

    ae50c1a234d07eb39859cf7aea9361d9b54397d477866ae38bb61ad904298315

    SHA512

    6773b60e8ad7e940724daf5aa81cd1c08c113b4087c6ff69b21a12fd3c684e441007ab2968780ad5c0425a45ee1b2f3b8f486cc832415ce21f75da0b65e522ed

  • memory/1640-0-0x00000000002E0000-0x00000000002E3000-memory.dmp

    Filesize

    12KB

  • memory/1640-18-0x00000000002E0000-0x00000000002E3000-memory.dmp

    Filesize

    12KB

  • memory/1640-1-0x00000000002E0000-0x00000000002E3000-memory.dmp

    Filesize

    12KB

  • memory/2268-28-0x0000000000400000-0x00000000005EB000-memory.dmp

    Filesize

    1.9MB

  • memory/2332-6082-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2712-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2712-31-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-2-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-6-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-12-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-19-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-17-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-10-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-9-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-20-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2712-4-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-52-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-50-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-51-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-6089-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-6088-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-6087-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-55-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-6081-0x0000000002CB0000-0x0000000002CB2000-memory.dmp

    Filesize

    8KB

  • memory/2864-6075-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-4737-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2864-1972-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB