Analysis
-
max time kernel
101s -
max time network
98s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 10:59
Static task
static1
Behavioral task
behavioral1
Sample
70BC.tmp.exe
Resource
win7
Behavioral task
behavioral2
Sample
70BC.tmp.exe
Resource
win10v200430
General
-
Target
70BC.tmp.exe
-
Size
676KB
-
MD5
07566fb66073abafbd438f08fa1c7245
-
SHA1
e73eed815412a3cb1929add64b3ba7639006eb2e
-
SHA256
6eb60af3c1f6688fee7286b384fd107552bdf95dc951101df4a1d4f861623134
-
SHA512
fd853360ba32b8f8c23fbda55b88fa66c802b53e33c169a8a4d1d87ba84e4895640a5ef3b341d67e3733e76c379598490167ad4ae486262eba5e2cf098d79f24
Malware Config
Extracted
C:\_readme.txt
https://we.tl/t-q9ro1midUb
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1684 70BC.tmp.exe 1960 70BC.tmp.exe 852 powershell.exe 852 powershell.exe 540 5.exe 540 5.exe 540 5.exe 540 5.exe 852 powershell.exe 1484 powershell.exe 1484 powershell.exe 1840 powershell.exe 1544 70BC.tmp.exe 1544 70BC.tmp.exe 1960 70BC.tmp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 1812 taskkill.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1936 icacls.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe -
Executes dropped EXE 5 IoCs
pid Process 1788 updatewin1.exe 1652 updatewin2.exe 1644 updatewin1.exe 540 5.exe 1544 70BC.tmp.exe -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 29 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 5.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 5.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 5.exe -
Loads dropped DLL 16 IoCs
pid Process 1960 70BC.tmp.exe 1788 updatewin1.exe 1788 updatewin1.exe 1788 updatewin1.exe 1960 70BC.tmp.exe 1788 updatewin1.exe 1788 updatewin1.exe 1644 updatewin1.exe 1644 updatewin1.exe 1644 updatewin1.exe 1960 70BC.tmp.exe 1960 70BC.tmp.exe 540 5.exe 540 5.exe 540 5.exe 540 5.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c42e8cab-cd9d-48c8-b29f-415312a6feb3\\70BC.tmp.exe\" --AutoStart" 70BC.tmp.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Suspicious use of WriteProcessMemory 77 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1936 1684 70BC.tmp.exe 26 PID 1684 wrote to memory of 1936 1684 70BC.tmp.exe 26 PID 1684 wrote to memory of 1936 1684 70BC.tmp.exe 26 PID 1684 wrote to memory of 1936 1684 70BC.tmp.exe 26 PID 1684 wrote to memory of 1960 1684 70BC.tmp.exe 27 PID 1684 wrote to memory of 1960 1684 70BC.tmp.exe 27 PID 1684 wrote to memory of 1960 1684 70BC.tmp.exe 27 PID 1684 wrote to memory of 1960 1684 70BC.tmp.exe 27 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1788 1960 70BC.tmp.exe 28 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1960 wrote to memory of 1652 1960 70BC.tmp.exe 29 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1788 wrote to memory of 1644 1788 updatewin1.exe 30 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1644 wrote to memory of 852 1644 updatewin1.exe 31 PID 1960 wrote to memory of 540 1960 70BC.tmp.exe 34 PID 1960 wrote to memory of 540 1960 70BC.tmp.exe 34 PID 1960 wrote to memory of 540 1960 70BC.tmp.exe 34 PID 1960 wrote to memory of 540 1960 70BC.tmp.exe 34 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1644 wrote to memory of 1484 1644 updatewin1.exe 35 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1484 wrote to memory of 1840 1484 powershell.exe 37 PID 1644 wrote to memory of 1936 1644 updatewin1.exe 39 PID 1644 wrote to memory of 1936 1644 updatewin1.exe 39 PID 1644 wrote to memory of 1936 1644 updatewin1.exe 39 PID 1644 wrote to memory of 1936 1644 updatewin1.exe 39 PID 540 wrote to memory of 1100 540 5.exe 41 PID 540 wrote to memory of 1100 540 5.exe 41 PID 540 wrote to memory of 1100 540 5.exe 41 PID 540 wrote to memory of 1100 540 5.exe 41 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1644 wrote to memory of 1752 1644 updatewin1.exe 42 PID 1100 wrote to memory of 1812 1100 cmd.exe 45 PID 1100 wrote to memory of 1812 1100 cmd.exe 45 PID 1100 wrote to memory of 1812 1100 cmd.exe 45 PID 1100 wrote to memory of 1812 1100 cmd.exe 45 PID 1076 wrote to memory of 1544 1076 taskeng.exe 53 PID 1076 wrote to memory of 1544 1076 taskeng.exe 53 PID 1076 wrote to memory of 1544 1076 taskeng.exe 53 PID 1076 wrote to memory of 1544 1076 taskeng.exe 53 -
Kills process with taskkill 1 IoCs
pid Process 1812 taskkill.exe -
Disables Task Manager via registry modification
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1936 mpcmdrun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe"C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe"C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe" --Admin4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all5⤵
- Deletes Windows Defender Definitions
PID:1936
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""5⤵PID:1752
-
-
-
-
C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin2.exe"C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin2.exe"3⤵
- Executes dropped EXE
- Drops file in Drivers directory
PID:1652
-
-
C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe"C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
- Executes dropped EXE
- Checks for installed software on the system
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe & exit4⤵PID:1100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Suspicious use of AdjustPrivilegeToken
- Kills process with taskkill
PID:1812
-
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1532
-
C:\Windows\system32\taskeng.exetaskeng.exe {2FD03FDA-C3C3-4F9D-A658-165E3D5B9DB4} S-1-5-21-1131729243-447456001-3632642222-1000:AVGLFESB\Admin:Interactive:[1]1⤵PID:1076
-
C:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3\70BC.tmp.exeC:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3\70BC.tmp.exe --Task2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1544
-