Resubmissions

17-04-2024 14:30

240417-rt43faca49 10

17-04-2024 14:30

240417-rt4fxade5v 10

17-04-2024 14:29

240417-rtyknaca44 10

17-04-2024 14:29

240417-rtsz6sde3z 10

17-04-2024 14:29

240417-rtspeade3y 10

31-07-2022 05:21

220731-f17w5aade2 10

Analysis

  • max time kernel
    1196s
  • max time network
    1198s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-04-2024 14:30

General

  • Target

    94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02.exe

  • Size

    1.5MB

  • MD5

    6599f79e40a26186261b58aa89194e5b

  • SHA1

    0a44b71f930447d545de0f10b6f9c70d513acacc

  • SHA256

    94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02

  • SHA512

    9e4c8b704bdf6f69df693c40c323f069ac7b9900ab8486d7e5a8423670aa1ee686ccfb6c4026f903d0928145efeee04b0b4cded0000f918862208baba9913748

  • SSDEEP

    24576:4i9CFkYBMSUkGUbDkAv0f3BIykhWmRkLhKRahLo1ChjllyzD8k20ZItIhi4Gx:4ieMSU0bD7Q3Bfkh9k1VtKChpIzD/Std

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 26 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02.exe
    "C:\Users\Admin\AppData\Local\Temp\94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02.exe
      C:\Users\Admin\AppData\Local\Temp\94b88650ebf3fe56877d27316b51a4ddf27b4182892b167b5b03b35d84c95d02.exe
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe List Shadows
        3⤵
        • Interacts with shadow copies
        PID:1500
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2704
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe List Shadows
        3⤵
        • Interacts with shadow copies
        PID:2296
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5080
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Enumerates connected drives
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:256
  • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3564

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

4
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db
    Filesize

    1024KB

    MD5

    144cb45cc5eb58890e03fbd5dbe9c8e4

    SHA1

    e54a4fa554a5d2b11a5fad0576fa11cbf8cf22ca

    SHA256

    a66091414683d3c6b2379b7d4daf43fd7f5419cbf2eebdda80a890e5412a8c93

    SHA512

    6140c876d425ac9541714111ee5f4ab0358b6e8565263d426b2e0e448ba28ec320dcee7e17592bff164ad6a0f38710067c20dcbe47d7bf095417c57e50a37680

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
    Filesize

    7KB

    MD5

    e5094b4d83037cd93a09daafcd2ebe47

    SHA1

    c3abc9a3b956f630d1d5a758e97c302b53f729cf

    SHA256

    76c2fb11312934c8a8e0d355119770e4874018634f2b4341dabfe8ae20631426

    SHA512

    89c5fd3f1c33d7b5a476a9707895eb71c4f62c9efc33fa057d42e1aafeb00962a8614079098f9e1a1b72fd94ebca9b8727a71ce4b44bf6f68385d9ed81123402

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.db
    Filesize

    1024KB

    MD5

    037769dd102ede7112447cfe2cd70b7f

    SHA1

    f49b49f046d26f41779665741ddfb42cf3a0c446

    SHA256

    e0d48d51beb23724062e92cfd9907d9d0de52fe0d320923959639ae710097e49

    SHA512

    00fbdf76bf87fe629b1f25e827d0b24ae1b98977624aa263d783e92d6e937a99caf132e24ffd89df9ee305514bc3f94b926f7ef513fec282784fe9b3fef46d31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db
    Filesize

    24B

    MD5

    ae6fbded57f9f7d048b95468ddee47ca

    SHA1

    c4473ea845be2fb5d28a61efd72f19d74d5fc82e

    SHA256

    d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9

    SHA512

    f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
    Filesize

    7KB

    MD5

    b9550f07054a96b9d1b63297c6e3639d

    SHA1

    89a4b515b8bfb65c4687bd14d41bddb46aa5131f

    SHA256

    799c464b6b675b7d1979a5b4ffda48faf5f95adb08d329a991832ab1d7331159

    SHA512

    0a85d5ad22cd364fe60a4da4a978df74b9b563383a352f855d95727291b91fb800fccfabf3a3cdeadfe617e916c35e211457ddee6e135e0f061d6baf4936bd5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
    Filesize

    7KB

    MD5

    3e9353971069fe41c3c0bfad666f2232

    SHA1

    345a16b95670f4a64c79c4430d7f88a29acfaa40

    SHA256

    7331aa54dfcbf15c51c9bd8f0ab401aba6ce4ae797321691d91f0079b6a1bdf4

    SHA512

    52daefb23e68d1785ba97870bf724b261551edd5c7183e4dd97befb86e5c14d2d328dafbc5477197c02b6ce8df5c91f251e1c430c3fb5d266bbc57ef9927b3ab

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TA9PW42K\microsoft.windows[1].xml
    Filesize

    97B

    MD5

    dc5e6eb03269e129a9e8ccc9186161cd

    SHA1

    e28352f9f78534779a871064137a67aa777c6dd4

    SHA256

    01117b8e52792b6c29357873c3644dd78d7cc8d0be8ae8c52e4b89bb4ac6c20c

    SHA512

    7a8727587495d77b50862ed812fe8807d823a170e10c3f8aa8e7a0ab00d1f4e462814f0819a541541d8b56704c90b4a5c4c933b27492364a2530d27e3f05dbf7

  • C:\Users\Admin\AppData\Roaming\B773F55BB773F55B.bmp
    Filesize

    2.6MB

    MD5

    993cc909a89f0fb7fe90acc3703c2105

    SHA1

    f422cdcb426718b235a19080b0daf71c9b448768

    SHA256

    4aa6cdb9ce95410f85a05b21967d224cfd49cf8c7fa18d9998304a16d4e4b5d8

    SHA512

    5ec562b1e6f91f8774bf8fd00a6a413b4b4b5be2ede17ff9c417fce7097b7d313b136740e525c19a77f220e80fb0e92f8f4d1866ea185c9fc6755c3b41aa9762

  • memory/2768-0-0x0000000000400000-0x000000000062A000-memory.dmp
    Filesize

    2.2MB

  • memory/2768-10-0x0000000000400000-0x000000000062A000-memory.dmp
    Filesize

    2.2MB

  • memory/2768-12-0x0000000000C40000-0x0000000000C74000-memory.dmp
    Filesize

    208KB

  • memory/2768-7-0x0000000000C40000-0x0000000000C74000-memory.dmp
    Filesize

    208KB

  • memory/2768-3-0x0000000000400000-0x000000000062A000-memory.dmp
    Filesize

    2.2MB

  • memory/4564-45-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-53-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-20-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-21-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-22-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-25-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-26-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-27-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-28-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-29-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-30-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-31-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-32-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-33-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-34-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-35-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-36-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-37-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-38-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-39-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-40-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-41-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-42-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-43-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-44-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-18-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-46-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-47-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-48-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-49-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-50-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-51-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-52-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-19-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-54-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-55-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-56-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-57-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-58-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-59-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-60-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-61-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-62-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-63-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-64-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-65-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-66-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-67-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-68-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-69-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-70-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-71-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-72-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-73-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-74-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-75-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-76-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-17-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-16-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-11-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-9-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-8-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-77-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-78-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB

  • memory/4564-79-0x0000000000400000-0x0000000000608000-memory.dmp
    Filesize

    2.0MB