Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 11:48

General

  • Target

    VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe

  • Size

    356KB

  • MD5

    a8e0b0186e5159aa8a772e8d4169d3f3

  • SHA1

    7c1f0f6fc4fd2669717e632652ff8a99fb093e69

  • SHA256

    1cf433abd42285879b502b2d01958fff3fe4ad687a0e7c1fba243ffbffe7f34e

  • SHA512

    01fa49ff7921b380f0390a1ba9c4beff61278685d9caabe188d84977b73fffe7ffe51360677fbaa0319c0e4d4387804c665a7671ad63e4f8a8bc6c8ae0fe55fa

  • SSDEEP

    6144:rOWcl+ocAAe1EAnT43osv0pnzKK+PDncAuLELquaWVzsHA93Wo8nswPm22fwh:rFeq0F+PzcOLyWRsHA93/oswe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+bsriw.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F34FF5952998CB68 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F34FF5952998CB68 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/F34FF5952998CB68 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/F34FF5952998CB68 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F34FF5952998CB68 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F34FF5952998CB68 http://yyre45dbvn2nhbefbmh.begumvelic.at/F34FF5952998CB68 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/F34FF5952998CB68
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F34FF5952998CB68

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F34FF5952998CB68

http://yyre45dbvn2nhbefbmh.begumvelic.at/F34FF5952998CB68

http://xlowfznrg4wf7dli.ONION/F34FF5952998CB68

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (419) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_a8e0b0186e5159aa8a772e8d4169d3f3.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\orgntvvwpnxi.exe
        C:\Windows\orgntvvwpnxi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\orgntvvwpnxi.exe
          C:\Windows\orgntvvwpnxi.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2896
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2392
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:2568
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2732
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2760
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\ORGNTV~1.EXE
            5⤵
              PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
          3⤵
          • Deletes itself
          PID:2952
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2108
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2560

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+bsriw.html

            Filesize

            12KB

            MD5

            2b9f74bf71c30656e396207dc4c46be8

            SHA1

            2a3ed5b2fcf814e300233012589b1a94c7f7ed76

            SHA256

            c0ddf5e4f4420a792779f8e4f4b35c5b2fd921bc0ca4b87b9822b192bab9213a

            SHA512

            4f34285ba64cc10d9118c4fb1cf789760a91b60d33582753fcff9e8a32d9af2754a81a7a80e4f2182352b35e0f77e5adc2ec5f1144f37fc5a8a12fcf95375903

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+bsriw.png

            Filesize

            64KB

            MD5

            27cbaddbb76c3b7a7ade7f74eaffc880

            SHA1

            d4bb70e79412fd0cbbf467022de39f032b3841ce

            SHA256

            178f9bfba27ae41feeec2f6866f46a63176c8ce16412f4456605a56541af652f

            SHA512

            282047fe44d9221aab9ba7003f35a9dfb0d2d0a34963a0e303b6edabed714696ddbaa3e685a891ff1c4ada5308dcc2b07e07e2f3599b0606b01f293c88f82327

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+bsriw.txt

            Filesize

            1KB

            MD5

            a150219ff752029c2bb2154b12392b58

            SHA1

            2277aa81f0f3b4bdee6ae3b3b5538f8d483b7bfc

            SHA256

            ac7a353d743c3d0791459b046dfd9481196f9b22112bee50df142745fed904df

            SHA512

            82d021765fdf694c7959bdac7f1e6802c6603039a1ff3baaf4f02597926886455b813c4de3b26695db1e52e80f02cdb9e89dda9765f6cd936e97d036bc6cd579

          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

            Filesize

            11KB

            MD5

            d169d20b24035e1dbed31f4ba78a219a

            SHA1

            d7e59c42ff60111689b0483f88c4a076ee0fe388

            SHA256

            e3d1c8c05e0d54d544a23e5ca52b23d830629265cf75421d1bf4dcb4e7e87432

            SHA512

            9c6ca576b914a9fdfc6fef630ce635d21ed225050d1b891d66e01bd96bbcf598160373280615bcf8e57984be8631ff3ac262720f3c96625e1eb89aed20e90a8a

          • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

            Filesize

            109KB

            MD5

            92837aaae7924d102ba2500cc4e9112a

            SHA1

            a1703c7611169c72164b59aac82304ce796112c9

            SHA256

            6549e8a4c7cc7f1dd8f66672ccf20f83f6d009b2d22daef0d4bd10e864a984d5

            SHA512

            193ce5c308241aa74fc59e76d1be0ada94981a4575f122e3e7b572c450d39486dbbb76e8e528bdb35835f263819949c31d99354b6364a1bc0759875e3987e0a7

          • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

            Filesize

            173KB

            MD5

            531fef986ed5652ce7d171a86ccf7a57

            SHA1

            9e34527ce94bab531a4f1302bd1ce1664c3db6e6

            SHA256

            56294f6fa449dc38dac574bf4b9caa1f680b92421b70e68ec80a467a69611497

            SHA512

            974e292b655995f75c6b814f95b4d7ed0c6bdc67b4f8861bd872b5b8f58d1e89d21bbb6d1b6abc3b4977eef48bef5051282b6620ac823f228298276ee08adcae

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            226cf12e956dff77574dd6b708e6c4ce

            SHA1

            82e02c36f6c6c62e736fbc681b0ce4b8e5a1bf5b

            SHA256

            125eb7050e5930fdaa3c1e12d41f1386384b33725648ca6b8fb87b49c026a077

            SHA512

            6ef3e1d22a02670e0b6daf0ed6fd6f4222c7ca4812c84880a364316be6297971289806109887af357e8401bd429663bf341307e2d6a7a39726c39a38f2030cc4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f7cb2ad6fac19d01866e193d2abf4a6c

            SHA1

            e06b650d16ae4788ead57043e929f20cf1336fb8

            SHA256

            6868ba7155554bf1bbd9ccb8b7b25a35121511f6f6bc526cab8a4a3a2faec0a2

            SHA512

            bdc5a553a141e4118c344dd13faa35676cb05795801b07479c3656aadbb40fd58faea24970c4cce6a730f044b8216bcffeb36cb3766a92f6d39e2ee9daccd691

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            127084e49b19d7bcfb8c78fcda3985ec

            SHA1

            1190e4baf1a4beb3f84dc1fa44f032d03e70040a

            SHA256

            d1d9a30d9aa366727b1c6a634165671474eaf4b69c366fa2191b2a3c48ece12f

            SHA512

            392e454add4e55257c14d042d1e3867c5980aed04b810283eada80200328247c290bb35531c86ba8aab46b3211629ea04f6bbb660fc29914d2704a0e90b83c49

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6de88ec45c9d1351259ea41d25c265c7

            SHA1

            bbf3219a0bbf1cdbd6ed1acb53e0fef51f24940b

            SHA256

            e6d55993f7feb70fd84623bf012c773813c9ab1a7892e685635db283e69b80e0

            SHA512

            b60a92a712cf2521aa3af06e600f3d105860f611f4ee9ad94e87f3316a75f23741ab99fb3d79d3ae2a458365c0ce6524cbf87668c67e8a3b8fe2347098b361e6

          • C:\Users\Admin\AppData\Local\Temp\Tar886A.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Windows\orgntvvwpnxi.exe

            Filesize

            356KB

            MD5

            a8e0b0186e5159aa8a772e8d4169d3f3

            SHA1

            7c1f0f6fc4fd2669717e632652ff8a99fb093e69

            SHA256

            1cf433abd42285879b502b2d01958fff3fe4ad687a0e7c1fba243ffbffe7f34e

            SHA512

            01fa49ff7921b380f0390a1ba9c4beff61278685d9caabe188d84977b73fffe7ffe51360677fbaa0319c0e4d4387804c665a7671ad63e4f8a8bc6c8ae0fe55fa

          • memory/2124-0-0x0000000000220000-0x0000000000224000-memory.dmp

            Filesize

            16KB

          • memory/2124-17-0x0000000000220000-0x0000000000224000-memory.dmp

            Filesize

            16KB

          • memory/2124-1-0x0000000000220000-0x0000000000224000-memory.dmp

            Filesize

            16KB

          • memory/2560-6020-0x00000000001F0000-0x00000000001F2000-memory.dmp

            Filesize

            8KB

          • memory/2620-28-0x0000000000400000-0x00000000004DF000-memory.dmp

            Filesize

            892KB

          • memory/2696-8-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-13-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-19-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-20-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-16-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-29-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2696-5-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-2-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-6-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2696-10-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-4952-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6027-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6013-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6019-0x0000000002BC0000-0x0000000002BC2000-memory.dmp

            Filesize

            8KB

          • memory/2896-49-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6022-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6023-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-5684-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-6030-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-2136-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-684-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-50-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-55-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-53-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB

          • memory/2896-51-0x0000000000400000-0x0000000000486000-memory.dmp

            Filesize

            536KB