Analysis
-
max time kernel
65s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13/02/2021, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
8B59.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8B59.exe
Resource
win10v20201028
General
-
Target
8B59.exe
-
Size
684KB
-
MD5
7efdbcd2dda98974f89290ce0a02cdc7
-
SHA1
cbae61ac09fe75b570bee392aa70310ef4d94362
-
SHA256
eb8de87523800e3aa747857a06938f3af3856fbd42be025688e2ff50248ac197
-
SHA512
b9d334d10bc4c02007efcdd789a4fb91bffa3790c8d8357f438cd167c86097acc0b6d4889c1b81de77c42e8b7d5f04f3a8dffca80adc2a9148051b68d1215adc
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 3624 mpcmdrun.exe -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Executes dropped EXE 5 IoCs
pid Process 2092 updatewin1.exe 3892 updatewin2.exe 2100 updatewin.exe 3516 5.exe 416 updatewin1.exe -
Loads dropped DLL 2 IoCs
pid Process 3516 5.exe 3516 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 192 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b6bf5264-48bd-4191-982a-e842136d55f6\\8B59.exe\" --AutoStart" 8B59.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.2ip.ua 11 api.2ip.ua 21 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3744 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2528 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 8B59.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 8B59.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1028 8B59.exe 1028 8B59.exe 2552 8B59.exe 2552 8B59.exe 3516 5.exe 3516 5.exe 3516 5.exe 3516 5.exe 3516 5.exe 3516 5.exe 3516 5.exe 3516 5.exe 3156 powershell.exe 3156 powershell.exe 3156 powershell.exe 3156 powershell.exe 2964 powershell.exe 2964 powershell.exe 2964 powershell.exe 1336 powershell.exe 1336 powershell.exe 1336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3156 powershell.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1028 wrote to memory of 192 1028 8B59.exe 76 PID 1028 wrote to memory of 192 1028 8B59.exe 76 PID 1028 wrote to memory of 192 1028 8B59.exe 76 PID 1028 wrote to memory of 2552 1028 8B59.exe 77 PID 1028 wrote to memory of 2552 1028 8B59.exe 77 PID 1028 wrote to memory of 2552 1028 8B59.exe 77 PID 2552 wrote to memory of 2092 2552 8B59.exe 82 PID 2552 wrote to memory of 2092 2552 8B59.exe 82 PID 2552 wrote to memory of 2092 2552 8B59.exe 82 PID 2552 wrote to memory of 3892 2552 8B59.exe 83 PID 2552 wrote to memory of 3892 2552 8B59.exe 83 PID 2552 wrote to memory of 3892 2552 8B59.exe 83 PID 2552 wrote to memory of 2100 2552 8B59.exe 84 PID 2552 wrote to memory of 2100 2552 8B59.exe 84 PID 2552 wrote to memory of 2100 2552 8B59.exe 84 PID 2552 wrote to memory of 3516 2552 8B59.exe 85 PID 2552 wrote to memory of 3516 2552 8B59.exe 85 PID 2552 wrote to memory of 3516 2552 8B59.exe 85 PID 2100 wrote to memory of 984 2100 updatewin.exe 86 PID 2100 wrote to memory of 984 2100 updatewin.exe 86 PID 2100 wrote to memory of 984 2100 updatewin.exe 86 PID 984 wrote to memory of 3744 984 cmd.exe 88 PID 984 wrote to memory of 3744 984 cmd.exe 88 PID 984 wrote to memory of 3744 984 cmd.exe 88 PID 2092 wrote to memory of 416 2092 updatewin1.exe 89 PID 2092 wrote to memory of 416 2092 updatewin1.exe 89 PID 2092 wrote to memory of 416 2092 updatewin1.exe 89 PID 416 wrote to memory of 3156 416 updatewin1.exe 90 PID 416 wrote to memory of 3156 416 updatewin1.exe 90 PID 416 wrote to memory of 3156 416 updatewin1.exe 90 PID 3516 wrote to memory of 3704 3516 5.exe 92 PID 3516 wrote to memory of 3704 3516 5.exe 92 PID 3516 wrote to memory of 3704 3516 5.exe 92 PID 3704 wrote to memory of 2528 3704 cmd.exe 94 PID 3704 wrote to memory of 2528 3704 cmd.exe 94 PID 3704 wrote to memory of 2528 3704 cmd.exe 94 PID 416 wrote to memory of 2964 416 updatewin1.exe 95 PID 416 wrote to memory of 2964 416 updatewin1.exe 95 PID 416 wrote to memory of 2964 416 updatewin1.exe 95 PID 2964 wrote to memory of 1336 2964 powershell.exe 97 PID 2964 wrote to memory of 1336 2964 powershell.exe 97 PID 2964 wrote to memory of 1336 2964 powershell.exe 97 PID 416 wrote to memory of 3624 416 updatewin1.exe 99 PID 416 wrote to memory of 3624 416 updatewin1.exe 99 PID 416 wrote to memory of 3964 416 updatewin1.exe 101 PID 416 wrote to memory of 3964 416 updatewin1.exe 101 PID 416 wrote to memory of 3964 416 updatewin1.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8B59.exe"C:\Users\Admin\AppData\Local\Temp\8B59.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b6bf5264-48bd-4191-982a-e842136d55f6" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:192
-
-
C:\Users\Admin\AppData\Local\Temp\8B59.exe"C:\Users\Admin\AppData\Local\Temp\8B59.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin1.exe"C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin1.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin1.exe"C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin1.exe" --Admin4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all5⤵
- Deletes Windows Defender Definitions
PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""5⤵PID:3964
-
-
-
-
C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin2.exe"C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:3892
-
-
C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin.exe"C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:3744
-
-
-
-
C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\5.exe"C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\91e56562-83ae-415a-b654-9a352571132d\5.exe & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
-