Analysis

  • max time kernel
    120s
  • max time network
    77s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-09-2024 08:55

General

  • Target

    VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe

  • Size

    418KB

  • MD5

    1a9ab9e924a6856d642bbe88064e4236

  • SHA1

    d9d445e9dcb8694398c7acb33f38d7261c95321c

  • SHA256

    69155f404a1482e4188726cb0f88b6c6fd6ca94d834b31e05f36e88662281e22

  • SHA512

    f41e93d25fe32248f55dbf5c1c721e4af5d2c28531816955094585a00afa94ea2dab0a6e25191abe8896a2185cdbc535d9dcf3beac14b683d05e1c8c7c6f80b2

  • SSDEEP

    6144:/lhEMsxe34/JTpHIOdX2JOVM8aSC4Zl7rOfT+yIaIWk3HtlE0/Ce+Mx62q2jQ1+d:7ssoJhf8JOqQC4/7CfTk/rsh2jQ1T0jv

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+hjcmb.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/FAA6A892722F429A 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/FAA6A892722F429A 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/FAA6A892722F429A If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/FAA6A892722F429A 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/FAA6A892722F429A http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/FAA6A892722F429A http://yyre45dbvn2nhbefbmh.begumvelic.at/FAA6A892722F429A Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/FAA6A892722F429A
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/FAA6A892722F429A

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/FAA6A892722F429A

http://yyre45dbvn2nhbefbmh.begumvelic.at/FAA6A892722F429A

http://xlowfznrg4wf7dli.ONION/FAA6A892722F429A

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (577) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\wrlxfgovuevc.exe
        C:\Windows\wrlxfgovuevc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\wrlxfgovuevc.exe
          C:\Windows\wrlxfgovuevc.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4544
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4936
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2060
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjcmb.html

    Filesize

    12KB

    MD5

    3b8d097c3942e8b6c24455fab3e2830f

    SHA1

    dec7b1646e71c2b3bd4aa9b69503bf6dc8d2079d

    SHA256

    d4929abec94a5231a03b276e827a01c2c52c188128b73be4a8562fcff2db0150

    SHA512

    bc0451990d69ce69e57a4c29228723cfe7b39b9ed2fa62b8f43c168a0da30981501f4264bb4a9fbb690b78931b441e173242ccaf65223354d03353c24fdcc830

  • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjcmb.png

    Filesize

    64KB

    MD5

    f1e41f6dcb3a176a9f1ade0db6b5e545

    SHA1

    8c32350b8d6ed2354c83bb1b9b5abafe166039a6

    SHA256

    6640b5415f482ecde1124730c5d81d954dafe5f6b3d605721f38230a9fe12611

    SHA512

    825ace4d7d59573a6e7424d000ab6c423db3c77870ce5ce229cc516ff079e05de6b1ee7083be45ea82d6b80f694ccc2e22eabf9f99c093d16faf42fc7cdac6ff

  • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjcmb.txt

    Filesize

    1KB

    MD5

    5374a61d9891790d9986c292adae6c9d

    SHA1

    002fb33f7ef0f484508276227ca2cec7e0a19046

    SHA256

    dc872b2bff87af735ef28007e923db47c9b4e7840a23823a2ffb6037c6c87bb9

    SHA512

    1a4d1bf378769494f41310413fa776faac98eb4bd3d85143b330e9bd1214d777d3799df2a5c5124153f47406a8ba0ef685c89bc61a851f591cbb3814c046134a

  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    560B

    MD5

    48d461611b9312014c7753b8f79f2d8b

    SHA1

    3bef7a85366f55a9ad9e767748533d4a06ad9e34

    SHA256

    4874df208b33eddbe9967625cc75ff9961419e357a8619f2f41b75f86ab3d1ed

    SHA512

    f2b06cc51e1d0272674c5178f574cf2d266d4eb7906dc01afb35bb04fbd52f756674db299bda0dda017b2245a6bbaa68e8cdbce8b7ff6e801f4e0b8c2f8485b8

  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

    Filesize

    560B

    MD5

    00ddb6ce3c85b3c46b65515f7544e5b1

    SHA1

    42d3239df856e3d335e91480b6f28edf278244a7

    SHA256

    b65fe2d1a5f49e27d202aeff36c915c95e6b70a93936d4728247128d66a594d6

    SHA512

    d76efa589dee41e7ff0f8676a64efc9403ea3f20547ea2d61a310b54d12f803a02df051847ddd058ca846519237fe0a59e93fcde0dd84e392b91b35279c30124

  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

    Filesize

    416B

    MD5

    563f13fa4eb5cad91c7c011b37727361

    SHA1

    ddcb4cb2ba109c65731d376a3af889abc1e6f9bd

    SHA256

    d5f8ccc3271616579b3dd19511301e86b45f01f1f00d56dc536af4df54f492ed

    SHA512

    03ab4360f6702d4cb220618173107dd4ef0364bcd05d6402d4c09e264dd8715f72f70aac8e0664c96d6d5f7c6215e4725fa21cfffa5d457b6eaab9566c61c482

  • C:\Windows\wrlxfgovuevc.exe

    Filesize

    418KB

    MD5

    1a9ab9e924a6856d642bbe88064e4236

    SHA1

    d9d445e9dcb8694398c7acb33f38d7261c95321c

    SHA256

    69155f404a1482e4188726cb0f88b6c6fd6ca94d834b31e05f36e88662281e22

    SHA512

    f41e93d25fe32248f55dbf5c1c721e4af5d2c28531816955094585a00afa94ea2dab0a6e25191abe8896a2185cdbc535d9dcf3beac14b683d05e1c8c7c6f80b2

  • memory/1536-4-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1536-15-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1536-6-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1536-3-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1536-2-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1628-5-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/1628-0-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/1628-1-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/4492-12-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/4544-23-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-105-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-25-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-21-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-585-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-586-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-668-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-20-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-18-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-19-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-1362-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-2466-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4544-3343-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB