Malware Analysis Report

2024-09-22 12:54

Sample ID 240705-t7y5fs1hpl
Target 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA256 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
Tags
troldesh persistence ransomware trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

Threat Level: Known bad

The file 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f was found to be: Known bad.

Malicious Activity Summary

troldesh persistence ransomware trojan upx

Troldesh, Shade, Encoder.858

UPX packed file

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-05 16:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-05 16:42

Reported

2024-07-05 16:45

Platform

win10v2004-20240704-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe

"C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
NL 194.109.206.212:443 tcp
N/A 127.0.0.1:57240 tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
SG 76.73.17.194:9090 tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 8.8.8.8:53 240.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 208.83.223.34:80 tcp
US 8.8.8.8:53 udp

Files

memory/644-0-0x0000000002360000-0x000000000242E000-memory.dmp

memory/644-1-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-2-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-4-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-6-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-3-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-9-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-10-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-11-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-12-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-13-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-16-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-17-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-18-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-19-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-20-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-21-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-22-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-23-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/644-24-0x0000000000400000-0x00000000005DE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-05 16:42

Reported

2024-07-05 16:45

Platform

win11-20240704-en

Max time kernel

141s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe

"C:\Users\Admin\AppData\Local\Temp\2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f.exe"

Network

Country Destination Domain Proto
SE 171.25.193.9:80 tcp
N/A 127.0.0.1:49738 tcp
US 8.8.8.8:53 9.193.25.171.in-addr.arpa udp
DE 131.188.40.189:443 tcp
NL 52.111.243.30:443 tcp

Files

memory/4376-0-0x0000000002500000-0x00000000025CE000-memory.dmp

memory/4376-1-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-2-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-4-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-3-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-5-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-9-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-10-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-11-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-12-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-13-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-16-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-17-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-18-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-19-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-20-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-21-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-22-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-23-0x0000000000400000-0x00000000005DE000-memory.dmp

memory/4376-24-0x0000000000400000-0x00000000005DE000-memory.dmp