Analysis

  • max time kernel
    101s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    13-07-2020 10:59

General

  • Target

    70BC.tmp.exe

  • Size

    676KB

  • MD5

    07566fb66073abafbd438f08fa1c7245

  • SHA1

    e73eed815412a3cb1929add64b3ba7639006eb2e

  • SHA256

    6eb60af3c1f6688fee7286b384fd107552bdf95dc951101df4a1d4f861623134

  • SHA512

    fd853360ba32b8f8c23fbda55b88fa66c802b53e33c169a8a4d1d87ba84e4895640a5ef3b341d67e3733e76c379598490167ad4ae486262eba5e2cf098d79f24

Malware Config

Extracted

Path

C:\_readme.txt

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-q9ro1midUb Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0240regyjnkjddrt97hMcutYnZzRfb1pNqZr7bo6DicLLuvLsmnacTL1
URLs

https://we.tl/t-q9ro1midUb

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Checks for installed software on the system 1 TTPs 29 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Suspicious use of WriteProcessMemory 77 IoCs
  • Kills process with taskkill 1 IoCs
  • Disables Task Manager via registry modification
  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Adds Run entry to start application
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1936
    • C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\70BC.tmp.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe
        "C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe
          "C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin1.exe" --Admin
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:852
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps1
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1840
          • C:\Program Files\Windows Defender\mpcmdrun.exe
            "C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all
            5⤵
            • Deletes Windows Defender Definitions
            PID:1936
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""
            5⤵
              PID:1752
        • C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin2.exe
          "C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\updatewin2.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Drivers directory
          PID:1652
        • C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe
          "C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Checks processor information in registry
          • Executes dropped EXE
          • Checks for installed software on the system
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\2c8f6bbf-3265-4e9f-8a67-aa77611502af\5.exe & exit
            4⤵
              PID:1100
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im 5.exe /f
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                • Kills process with taskkill
                PID:1812
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:1532
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {2FD03FDA-C3C3-4F9D-A658-165E3D5B9DB4} S-1-5-21-1131729243-447456001-3632642222-1000:AVGLFESB\Admin:Interactive:[1]
          1⤵
            PID:1076
            • C:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3\70BC.tmp.exe
              C:\Users\Admin\AppData\Local\c42e8cab-cd9d-48c8-b29f-415312a6feb3\70BC.tmp.exe --Task
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Executes dropped EXE
              PID:1544

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/540-39-0x0000000000E29000-0x0000000000E3A000-memory.dmp

            Filesize

            68KB

          • memory/540-40-0x0000000001100000-0x0000000001111000-memory.dmp

            Filesize

            68KB

          • memory/1544-70-0x0000000000220000-0x00000000002B1000-memory.dmp

            Filesize

            580KB

          • memory/1544-71-0x00000000011B0000-0x00000000011C1000-memory.dmp

            Filesize

            68KB

          • memory/1644-29-0x0000000002130000-0x0000000002141000-memory.dmp

            Filesize

            68KB

          • memory/1644-31-0x0000000000512000-0x0000000000513000-memory.dmp

            Filesize

            4KB

          • memory/1652-30-0x000000000052F000-0x0000000000530000-memory.dmp

            Filesize

            4KB

          • memory/1652-21-0x0000000002040000-0x0000000002051000-memory.dmp

            Filesize

            68KB

          • memory/1684-1-0x0000000000E60000-0x0000000000E71000-memory.dmp

            Filesize

            68KB

          • memory/1684-0-0x0000000000340000-0x00000000003D1000-memory.dmp

            Filesize

            580KB

          • memory/1788-17-0x00000000008F0000-0x00000000008F1000-memory.dmp

            Filesize

            4KB

          • memory/1788-16-0x0000000002100000-0x0000000002111000-memory.dmp

            Filesize

            68KB

          • memory/1960-5-0x00000000002E0000-0x0000000000371000-memory.dmp

            Filesize

            580KB

          • memory/1960-6-0x0000000001230000-0x0000000001241000-memory.dmp

            Filesize

            68KB

          • memory/1960-73-0x0000000003EF0000-0x0000000003F01000-memory.dmp

            Filesize

            68KB

          • memory/1960-74-0x0000000004300000-0x0000000004311000-memory.dmp

            Filesize

            68KB

          • memory/1960-75-0x0000000003EF0000-0x0000000003F01000-memory.dmp

            Filesize

            68KB