Analysis
-
max time kernel
50s -
max time network
53s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
11/04/2025, 01:28
Static task
static1
General
-
Target
-
Size
1.4MB
-
MD5
63210f8f1dde6c40a7f3643ccf0ff313
-
SHA1
57edd72391d710d71bead504d44389d0462ccec9
-
SHA256
2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
-
SHA512
87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
SSDEEP
12288:WZgSKWk54jeg6lL5assQHtzV2KoLJ+PwXxwuLSJ8slf1zMr6iL/KNDx2PIXe2Q:KgoLetlLS8tz6V+PwD0XVMrXCNDxtK
Malware Config
Signatures
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Executes dropped EXE 1 IoCs
pid Process 5884 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
resource yara_rule behavioral1/memory/5324-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-13-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5884-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-50-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-72-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-89-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/5324-115-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 332 WINWORD.EXE 332 WINWORD.EXE 5092 vlc.exe 2436 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5324 [email protected] 5324 [email protected] 5324 [email protected] 5324 [email protected] 5884 csrss.exe 5884 csrss.exe 5884 csrss.exe 5884 csrss.exe 5876 EXCEL.EXE 5876 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5092 vlc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5092 vlc.exe 5092 vlc.exe 5092 vlc.exe 5092 vlc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5092 vlc.exe 5092 vlc.exe 5092 vlc.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 332 WINWORD.EXE 5092 vlc.exe 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 5876 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE 2436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 5884 4108 cmd.exe 82 PID 4108 wrote to memory of 5884 4108 cmd.exe 82 PID 4108 wrote to memory of 5884 4108 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Windows\csrss.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\ProgramData\Windows\csrss.exeC:\ProgramData\Windows\csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\RemoveCheckpoint.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:332
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SelectUnprotect.aiff"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5092
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SplitPush.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2436
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SplitPush.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5876
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
Filesize
8KB
MD5a07306f7996b0b3aa52740189ea280df
SHA1a88e93c0935795d6b4db41039c9ee268b46aac25
SHA256ccf8598fcfdd5834e5a26c9bba62917a244e840b186e778f275fcced974814c8
SHA51237fabb452469b8d1887133009a92ccbfa16a33ad0e02de73bbfb8af207113fedd685ccc6b7e2512cdd0ec77cf4bbd6ecdd6992a5ee49451d1c85fdf9d0c873f5
-
Filesize
316B
MD5158999db1252e3cdf4f9110d6ac06a95
SHA1790f51ce132502dd7e6455592c5c212d9411f60b
SHA2563e173a82119cd2a72bc1af7afeb3f5990b61b50816e9a4804841d5b1f8f3bdcc
SHA512c4b5827bc9181f423e41d6234b294ee1a634e9936ccbbdb7a42492c01a596f575d1e6e365cff901538a8c2d2f127b5610610e6f0a4e32a3f631e25b9138cd73c