Analysis

  • max time kernel
    136s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 11:48

General

  • Target

    VirusShare_a5eb9cf3b138e8466071ec20a6722b5c.exe

  • Size

    336KB

  • MD5

    a5eb9cf3b138e8466071ec20a6722b5c

  • SHA1

    5b8db28fdc2e40fd67b3de164eb9d904122e5cef

  • SHA256

    ea7be43ae12bab3a5c3e00a568f3b3564c9225a056960048eda72f9f8f9f690e

  • SHA512

    499af2dfd9997cd737ebdd758d7c84e36084d5db5cf1f2eb032fd496b549e808303eb73275e9ddf378e966972c1ddbab03174ba5b9b97fd4c75c2ba1e5d14a24

  • SSDEEP

    6144:81w0U6D6x4kyjf+g0uc2RTqWmx7Ikw9NShXvSmk2OpXaP/EBySkQ4:8i0Uu6ikyjcuk5y0hXaxpKkB

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ohmmo.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64E65EAB38EE1FE3 2. http://tes543berda73i48fsdfsd.keratadze.at/64E65EAB38EE1FE3 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64E65EAB38EE1FE3 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/64E65EAB38EE1FE3 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64E65EAB38EE1FE3 http://tes543berda73i48fsdfsd.keratadze.at/64E65EAB38EE1FE3 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64E65EAB38EE1FE3 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/64E65EAB38EE1FE3
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64E65EAB38EE1FE3

http://tes543berda73i48fsdfsd.keratadze.at/64E65EAB38EE1FE3

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64E65EAB38EE1FE3

http://xlowfznrg4wf7dli.ONION/64E65EAB38EE1FE3

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (419) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_a5eb9cf3b138e8466071ec20a6722b5c.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_a5eb9cf3b138e8466071ec20a6722b5c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_a5eb9cf3b138e8466071ec20a6722b5c.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_a5eb9cf3b138e8466071ec20a6722b5c.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\pnxiwcsktuxo.exe
        C:\Windows\pnxiwcsktuxo.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\pnxiwcsktuxo.exe
          C:\Windows\pnxiwcsktuxo.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1740
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:296
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:3016
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:876
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2232
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\PNXIWC~1.EXE
            5⤵
              PID:2860
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
          3⤵
          • Deletes itself
          PID:2888
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2852
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ohmmo.html

      Filesize

      11KB

      MD5

      bf5f4a12712d68e360db27839d6c6888

      SHA1

      5a0367288c87c4cd802a6106cc845e3497b5c762

      SHA256

      5a8d43fd8366f85e6549dbaafcdc0857990e787c4c3043ee4166e4b469fae554

      SHA512

      8854706e478ecf246bccd63682853a0aa04aedc2dc6e20476deec45e0796ab0876f7f0b9b481b657581558b0f1e8443f99c92c455a1707c1ecf2d08997b927ff

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ohmmo.png

      Filesize

      62KB

      MD5

      c0c6ecb974dea3719e54347fbac49e36

      SHA1

      327fea1d93e7d8b0b35bc99ffcc56875ed8a89dd

      SHA256

      9166e42c799f9803bd68a8ad332f942f453a55331be929a7fb8c07f19219bfac

      SHA512

      566998cebae3803b099dd4bb46d4c74068e471a6fdf86a121217f0711b547bba4d0aeb1a05574110043f0bc5be7e71036f0d8726a977de4159cd57486312b70a

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ohmmo.txt

      Filesize

      1KB

      MD5

      7215225cfb7afc317a9301da5d58e6b2

      SHA1

      6a42c011508db197218126e4cafc33892c11755d

      SHA256

      c4062ef03274c8956c61c75d77ca3b91d250cfd700109ca5c9144b2d50080282

      SHA512

      289278aaf7544162a086645c5c5420ae55d5c618dd15b52af8ce4c914921444f17bda2a3007249c54f2acfdeb4894da24117e0a870e3c7156741eebdafd8f554

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      cef0ce4d612c3a266c2135f69cd86fa2

      SHA1

      bd4a60457332009a9227651d201e9322efd2ea12

      SHA256

      cf47ce6d42c8d2dc037236f7512d0f627f689ff0442aecdc7a67b0caca57f7a4

      SHA512

      728f609ba6231ae1f98c1fc76785cc5df8172334b8d7c57b0aac6ebf83bf57add028c78cf2113b2c38425066d13b8fa66ac512ff44a911e19d23e459d8c73f16

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      841d5907704ee6b9fce9d45865baf5ce

      SHA1

      6bff822283d615798a9e862184f87fe4de66da26

      SHA256

      52f093b5a8df03b6a4b089a591be5878e9e21c57a0ee31422785c879018e69bc

      SHA512

      1f363ee0df236b4622f8152a0bc01acc2259a8cb6f4526fcf8923c57871f3185c6dd155388f32d96fe7764181797fcd4b1b8c8548daef6f003ded150f1b73341

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      7989de6b23db4151b8356f5fd19d8a55

      SHA1

      96fcf51baf7ce40c4ed09fa37bf72dc79bca3dcb

      SHA256

      b83e934ebfedb0f2c3cb8b9ef96b737df8c95059bcea11a2e87c1f5f9b00491e

      SHA512

      bdf29684cf8d1986e7fed1cf541bf3c1c676481e540b7e020455413b19ce6424c6b109d3c6ced422e5e3fd6b1c65095cb8dd07ff6065cd5a3d09abe81bf42e64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ecc8a0cf696cdfa7fe4ac673c9d2bacf

      SHA1

      e8911b6cba84b3ac8b00d43a7462a6bc02882735

      SHA256

      0c060dae769e24383a2d971656a5ddb51aa47b47d02850b5c58ca81d1f391cf6

      SHA512

      72993b2c0ccda87df364aef61a55b0fa6cfc22041d947ea84168eb6921d1af799a7375fe81b9cf04fc7094ed939572e6d1deb0cce466adc1df682f933720c7f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b446865dc536d8c4e37b562b24518b95

      SHA1

      26f7a8b9ea63e62e84bcc86e088f8a23738955fb

      SHA256

      35d0a0824e122ea7b792c5d4131c87b7eb4fc25a188d1dfe68f53071c7d83424

      SHA512

      cc9a1bf2bfa628bea17be0f4130f707dbd83bab0cf1b9fd0304004eb432fdad8c0e1d79bd7bbafba9cc4f33ce09b04519b0b14ee5c752528cde1b0a188f48048

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      657c1c56779cf272d742e3e200c51e94

      SHA1

      2939042a01d917d713fa8b7293be8b753492c76d

      SHA256

      47db1174fca917b7c1d8ecd9a6d37a56a862c11f8488697b31db7d49b726559c

      SHA512

      0e9c3f325b58b7d133907aac8bf21066824b91a4199eb3085acbb2aec38a32493265f42c6da9b06c18f82db23ec21a546e8cd268a0885429f2fbf754e8bfe168

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b34958c6541107bc032e011a6f7995d

      SHA1

      a52862502814f28eb9f5a18cf66c54baef5cd296

      SHA256

      9cf1e25e660b62ad1eb55d703dbd3e6da36be1846b80ad1e93b605895811665a

      SHA512

      77c31934639773189c9127448e2cc98125f43951415f4d1370032723544ef7cc2dbe487da1c302753b4328cc90c8ae3deadf225d56628e6f4caea275ffad6a97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fdaaa8ea2495b2532903dcc04c5ec149

      SHA1

      17121fcf59a49c824aa93c7cdfe518937ca2faad

      SHA256

      f480883ae929806001a2c595b9254c64761abddd5e3384d4e30a85775fe6d7f7

      SHA512

      27cc7dd6e61e4c4453746ac0e1e3e5a6c9e03d82ab571269da879281ab2e9acfa175f413641dccf9d6f3b0ea032111f3d96bc2f53714fc2b06ca37b20fc888f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      11565d59a997a73d0379441be6dd8765

      SHA1

      3d26f7fe409be6c232e0dbdc4c620d839461a3b5

      SHA256

      412feef5112c8b242e2211fc3cf9ed4fc4d425941cea04a0c54b5d1623f65e7f

      SHA512

      f0a45edfeb7ce9570f74725da7eb7b1fb1a687ad5139b46eb3199e314220d9816ef1fa071f62247bb6bd1dc9f1f54dc6f03ebc37cadeadbfc67c08f6f5c9f70a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0460a867ac10439af7b4036e6b8c6f48

      SHA1

      19f17c55a8c5d05a0e53ebcfcc1b6bf429f9b3e5

      SHA256

      c37cba5cddd86839a95fe4ce81a20a917b174e69a10620102c74b2ece4f72988

      SHA512

      75b6b314a0c601599a054dee6c6646f213140b5cbbc0b40d493d265237f573ce27689beedf30af76e23561c3451178415d51db26f1c8b9795875f43a2be2ea24

    • C:\Users\Admin\AppData\Local\Temp\Cab84EC.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar856F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\pnxiwcsktuxo.exe

      Filesize

      336KB

      MD5

      a5eb9cf3b138e8466071ec20a6722b5c

      SHA1

      5b8db28fdc2e40fd67b3de164eb9d904122e5cef

      SHA256

      ea7be43ae12bab3a5c3e00a568f3b3564c9225a056960048eda72f9f8f9f690e

      SHA512

      499af2dfd9997cd737ebdd758d7c84e36084d5db5cf1f2eb032fd496b549e808303eb73275e9ddf378e966972c1ddbab03174ba5b9b97fd4c75c2ba1e5d14a24

    • memory/1660-0-0x0000000000260000-0x0000000000263000-memory.dmp

      Filesize

      12KB

    • memory/1660-15-0x0000000000260000-0x0000000000263000-memory.dmp

      Filesize

      12KB

    • memory/1664-13-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-1-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-5-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-17-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-7-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-28-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-16-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1664-9-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1664-3-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-45-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-5254-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-6434-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-46-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-520-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-6062-0x00000000044B0000-0x00000000044B2000-memory.dmp

      Filesize

      8KB

    • memory/1740-6056-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-6065-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-2213-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-51-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-47-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-50-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-6437-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/1740-6066-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2016-6063-0x00000000001A0000-0x00000000001A2000-memory.dmp

      Filesize

      8KB

    • memory/2680-26-0x0000000000400000-0x0000000000748000-memory.dmp

      Filesize

      3.3MB