Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-09-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
NoMoreRansom.zip
Resource
win11-20240802-en
General
-
Target
NoMoreRansom.zip
-
Size
916KB
-
MD5
f315e49d46914e3989a160bbcfc5de85
-
SHA1
99654bfeaad090d95deef3a2e9d5d021d2dc5f63
-
SHA256
5cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7
-
SHA512
224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e
-
SSDEEP
24576:+FhIdZxByAl+XiqNk6n3DaeCTLD1yilc7KrBVw1lFVFDqE/zQRsAOfySS:AhAgo2ikhryLD1hcerklFVhqEMiAuySS
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Executes dropped EXE 2 IoCs
Processes:
pid process 4924 [email protected] 3644 [email protected] -
Processes:
resource yara_rule behavioral1/memory/4924-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-5-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-7-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3644-14-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3644-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3644-17-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-23-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4924-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
description ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
pid process 4924 [email protected] 4924 [email protected] 4924 [email protected] 4924 [email protected] 3644 [email protected] 3644 [email protected] 3644 [email protected] 3644 [email protected] -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zG.exedescription pid process Token: SeRestorePrivilege 948 7zG.exe Token: 35 948 7zG.exe Token: SeSecurityPrivilege 948 7zG.exe Token: SeSecurityPrivilege 948 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid process 948 7zG.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\NoMoreRansom.zip1⤵PID:3332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4676
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5048
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\NoMoreRansom\" -spe -an -ai#7zMap14848:82:7zEvent283461⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:948
-
C:\Users\Admin\Desktop\NoMoreRansom\[email protected]"C:\Users\Admin\Desktop\NoMoreRansom\[email protected]"1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
C:\Users\Admin\Desktop\NoMoreRansom\[email protected]"C:\Users\Admin\Desktop\NoMoreRansom\[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5f315e49d46914e3989a160bbcfc5de85
SHA199654bfeaad090d95deef3a2e9d5d021d2dc5f63
SHA2565cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7
SHA512224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e
-
C:\Users\Admin\Desktop\NoMoreRansom\[email protected]
Filesize1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11