Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
TROLDESH.exe
Resource
win7-20241010-en
General
-
Target
TROLDESH.exe
-
Size
1004KB
-
MD5
5294b2851a648c51de94fa83b68bb0df
-
SHA1
09e38aad31ae8d15a59bceb3e07e7f8a4b58189c
-
SHA256
1dcf33ce009b879ce5d5197904151dc32112476f84e50f808bf55e8c9ea2130d
-
SHA512
87c4b6b73248e167bf55b8f5b892ab15f1c5546709d0e120f1f96efda6b9ffd058e1b0b685c1596022632f603c07505a6a0af5757c679e256b4564201e91d7b7
-
SSDEEP
12288:09MHwMVR8EyH4Aj6fRljL2NkKwb50UmqtLQgvgFgR8S83sX+2vuiq8mKU/5k7s:0qwwWHh6ZljGG5Zn9GsX/uib6S7s
Malware Config
Signatures
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" TROLDESH.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1156 set thread context of 2156 1156 TROLDESH.exe 30 -
resource yara_rule behavioral1/memory/2156-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-7-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-8-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-5-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2156-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TROLDESH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TROLDESH.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 TROLDESH.exe 2156 TROLDESH.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30 PID 1156 wrote to memory of 2156 1156 TROLDESH.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TROLDESH.exe"C:\Users\Admin\AppData\Local\Temp\TROLDESH.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\TROLDESH.exe"C:\Users\Admin\AppData\Local\Temp\TROLDESH.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156
-